IJSRET » Blog Archives

Author Archives: vikaspatanker

Where Are All The Men In The Morning ShowGender, Power, And The Reconfiguration Of Broadcast Television?

Uncategorized

Authors: Ms Sujata Sinha

Abstract: This article questions the narrative displacement of men in The Morning Show (2019–present), Apple TV+ by using the lens of feminist television criticism and post-#MeToo cultural discourse. Although the series is usually understood as a timely investigation of workplace harassment and the corporate complicity, the author here is arguing that the most radical intervention of the series is the structural side-lining of male authority. The fall of Mitch Kessler is a metaphor for the decline of patriarchal charisma while those secondary male characters like Chip and Cory, as examples of marginal or alternative masculinities, do not bring male power back. However, the lack of men is not an indication that the patriarchy has been eradicated: the power of men is still there in the corporate boards that are faceless, legal frameworks, and financial imperatives, even if it is in its apparent invisibility. The series by focusing on women's agency, conflict, and solidarity in the newsroom, first, reconstructs broadcast journalism as a feminized space and, secondly, it allows the empowerment contradictions under neoliberal capitalism to be visible. This article, by comparing The Morning Show with contemporaneous texts like Bombshell, She Said, and Succession, is pointing out how televisual narratives are dealing with the afterlives of patriarchy in the wake of #MeToo.

Published by:

EV Charger Sharing Platform

Uncategorized

Authors: Megha Garud, Lalit Gaikwad, Prakash Mane, Ranjit Misal, Amey Phatak

Abstract: The rapid growth of Electric Vehicles (EVs) has increased the demand for efficient and accessible charging infrastructure. However, limited availability of public charging stations and uneven distribution create challenges for EV users. This paper proposes an EV Charger Sharing Platform that enables private charger owners to share their charging stations with EV users through a web-based application. The platform acts as a bridge between charger owners, EV users, and administrators by providing features such as charger listing, location-based search, booking, and usage management. Developed using HTML, CSS, and JavaScript, the system improves charger utilization, reduces charging wait time, and supports sustainable transportation. The proposed solution promotes a sharing economy model while enhancing convenience, cost efficiency, and scalability in EV charging infrastructure.

Published by:

Beyond Infrastructure Integrating IT Fundamentals And Risk Management In Wireless Cloud And IoT Systems

Uncategorized

Authors: Sasikanth Reddy Mandati

Abstract: The rapid growth of Internet of Things (IoT) technologies has introduced significant challenges related to system scalability, interoperability, performance, and security. Traditional architectures often address IT infrastructure and risk management separately, leading to fragmented controls and increased vulnerability exposure. This paper proposes an integrated framework that unifies IT fundamentals with structured risk management processes to support secure, scalable, and resilient IoT environments. The framework is designed around key principles including modularity, interoperability, security-by-design, and fault tolerance, enabling seamless integration of heterogeneous devices and platforms. It incorporates edge and cloud computing for efficient data processing, along with continuous monitoring and proactive risk mitigation mechanisms. The framework is evaluated through use case analyses in smart city deployments, wireless cloud-based healthcare systems, and industrial IoT scenarios. The results indicate improved system performance, reduced latency, enhanced security, and effective risk reduction across all use cases. The study demonstrates that integrating risk management directly into IT architecture significantly improves operational reliability and adaptability. The proposed framework provides a practical foundation for developing robust IoT systems capable of supporting complex, large-scale digital ecosystems.

DOI: https://doi.org/10.5281/zenodo.18000025

Published by:

Invisible Risks In Connected Worlds An IT Risk Management Framework For Cloud Enabled IoT Systems

Uncategorized

Authors: Sasikanth Reddy Mandati

Abstract: The rapid proliferation of cloud-enabled Internet of Things (IoT) systems has transformed modern infrastructure, enabling real-time data collection, intelligent automation, and interconnected services across domains such as smart cities, healthcare, and industrial IoT. However, the increasing complexity and interdependence of these systems also expose them to invisible risks latent, cascading, and systemic vulnerabilities that are often overlooked by conventional risk management approaches. This paper presents a comprehensive IT risk management framework designed to detect, assess, and mitigate such hidden risks in cloud-enabled IoT environments. The framework integrates real-time data analytics, anomaly detection, and proactive mitigation strategies to improve system resilience and operational reliability. A case study in a smart city scenario demonstrates the framework’s effectiveness, showing significant improvements in risk coverage, mitigation efficiency, and stakeholder confidence compared to baseline methods. The results highlight the critical importance of addressing invisible risks to ensure secure, reliable, and resilient IoT-enabled systems.

DOI: https://doi.org/10.5281/zenodo.17999954

Published by:

Determinants Of Cyber Incident Severity: Exploratory Evidence And Benchmark Prediction Of Financial Loss

Uncategorized

Authors: Prajwal Chinchmalatpure, Suyash Chinchmalatpure, Sudeep Konde

Abstract: Cyber incidents vary significantly in the mechanisms, targets, and economic impacts they have, so it is significant to determine the factors which are connected to the severity and the economic effects of the incident. This paper is a data-driven analysis of world cybersecurity incidents, 2015-2024 (N=3000), focusing on contextual factors, e.g. country, type of attack, industry, source of attack, type of vulnerability, defensive mechanism, and operational outcomes, e.g. time to resolve the incident, victims, and financial loss (million USD). To surface patterns of incident occurrence and severity-linked outcomes, we describe the threat landscape in the first instance by exploratory distributional analysis, and in the second instance by relational analysis. We subsequently create a financial loss predictive pipeline by estimating a mixed data (categorical encoding and train/test analysis) predictor using common preprocessing of mixed data and a comprehensible baseline regression model. The combination of the empirical and benchmark results allows a clear point of departure to quantitative cyber risk profiling, showing which incident characteristics are too correlated with severity and defining a repeatable baseline to proceed with more detailed features and non-linear modelling methods in future studies.

Published by:

Online Conferencing Application

Uncategorized

Authors: Karthiban .R, Sabaripriya .S, Suganthi .R

Abstract: Online Conferencing Application is designed to be a communication platform in real time, which allows users to connect via video, audio, and chat from anywhere. The primary objective of this project is to build a system that is fast, secure, and user-friendly for online meetings, virtual classrooms, and remote collaboration.React.js is used to create the frontend, which gives a responsive and interactive user interface for smooth communication. Node.js is used for the backend, which handles server-side operations, user authentication, and data exchange in an efficient manner. In order to have an instant communication in real-time, Socket.io is brought in which makes it possible to have a live chat, notifications, and user synchronization without any waiting time. This set of modern technologies is what makes the system stable, with low latency, and scalable. To sum up, the Online Conferencing Application is an efficient, dependable, and userfriendly tool for virtual communication, which is in line with the increasing demand of online communication in this digital era. The Online Conferencing Application is a comprehensive web- based platform developed to enable users to conduct virtual meetings, conferences, and collaborative discussions in real time. With the increasing need for remote communication and online collaboration, this application provides an effective solution that integrates multiple technologies to deliver high-quality video, audio, and data transmission over the internet. The frontend of the application is built using React.js, which provides a responsive and interactive user interface for smooth navigation and dynamic updates. The backend is implemented with Node.js and Express.js, which handle API requests, authentication, and socket connections. The system uses Socket.IO to maintain low-latency bidirectional communication between the client and server, ensuring real-time synchronization of audio, video, and messages among all participants.

Published by:

Deepfake And AI-Scam Protection

Uncategorized

Authors: Siddhi Ekawade, Apurva Jate, Arya Kamble, Sharvari Kate, Tejal Panmand

Abstract: We have seen an rapid increase in the Artificial Intelligence (AI) and Deepfake, due to that it has become very easy for online scams and frauds. It is good but when its in correct hands but they are misused in voice cloning, fake video impression, fraud message it has became a serious cybersecurity concern. This paper reviews different deepfake and AI-driven scams and examines the detection and protection methods. While the precautions are taken to keep the user safe from all scams they still face challenges. The paper focuses on the need of improved solutions along with the awareness measures. There are existing methods show results but struggles with advance deepfakes. Through all the complaints and reviews its seen there should be double verification or multi-layer security to secure the user. The study is mainly focused on analyzing how deepfakes are created using Generative Adversarial Networks (GANs) and previously published papers and reports. The current finding has shown that there is face limitation in identifying the advanced deepfakes. And to tackle this issue this paper highlights the need for combined approach to improve AI-based detection, system review, user awareness to reduce scams an increase the security of the device and realism.

Published by:

Loan Utilization Tracking Via Mobile

Uncategorized

Authors: Vedant Pawar, Hasnain Pathan, Sujal Thombare, Yash Kondake, Aarti Gohade

Abstract: Loan utilization tracking is an important element of responsible lending to ensure that borrowers utilize loan funds strictly for their intended purposes. Traditional monitoring techniques such as physical inspections, manual reporting, and post-disbursement audits are often slow, expensive, and prone to inaccuracies. With the rapid growth of mobile technology, digital finance platforms have transformed loan monitoring through mobile applications, GPS tagging, cloud-based dashboards, digital receipts, photo/video verification, USSD/SMS reporting, and AI-based analysis. This survey paper provides an in-depth review of existing mobile-based loan utilization tracking approaches, studies their benefits in reducing fraud, examines their effectiveness in improving transparency and repayment rates, and analyzes challenges such as privacy issues, digital literacy, and connectivity limitations. The paper also proposes a robust mobile-based framework for lenders to track loan utilization efficiently and discusses future innovations including blockchain, biometric authentication, and advanced analytics to strengthen monitoring systems.

Published by:

Survey Paper On Xaanaax: A Digital Emergency Backup And Information Access System

Uncategorized

Authors: Hemant Khatpe,, Ayush Pilane, Sahil Choudhari, Chaitanya Jam, Tejal Panmand

Abstract: The rapid dependence on smartphones for storing personal and professional information has introduced new risks during emergencies such as device loss, battery failure, or network unavailability. Xaanaax is a digital emergency backup and information access system designed to ensure uninterrupted availability of essential files, contacts, and notes anytime and anywhere. The platform offers secure, centralized cloud-based storage with 24/7 accessibility across devices. This survey paper reviews existing digital storage and backup solutions, identifies their limitations in emergency scenarios, and analyzes how Xaanaax addresses these gaps through its architecture, security mechanisms, and user-centric design.

Published by:

Multilingual Chat Application

Uncategorized

Authors: Durvesh Mohan Kavire, Swaraj Pradeep Khade, Saurav Deepak Patankar, Abhijeet Shivraj Waghmar, Ms. Tejal Panmand

Abstract: A Multilingual Chat Application is a communication platform designed to allow users from different linguistic backgrounds to interact seamlessly by integrating real-time messaging with automatic language translation capabilities. The application enables users to send and receive messages in their native language while the system transparently translates the content into the recipient’s preferred language, thereby eliminating language barriers and promoting effective communication. It leverages advanced natural language processing and machine translation technologies to ensure accurate, fast, and context-aware translations, while maintaining message privacy and data security. The system typically supports multiple languages, user authentication, message synchronization, and an intuitive user interface to enhance usability across diverse user groups. Such an application is particularly valuable in global business collaboration, online education, customer support services, healthcare communication, and social networking, where participants may not share a common language. By fostering inclusivity and improving accessibility, the multilingual chat application plays a significant role in connecting people worldwide, enhancing cross-cultural interaction, and supporting efficient information exchange in today’s globally interconnected digital environment.

Published by:
× How can I help you?