Category Archives: Uncategorized

Survey On Customer Behavior Data Analysis For Product Purchasing

Uncategorized

Authors: Keerti Pal, Prof. Jayshree Boaddh, Prof. Rahul Patidar

Abstract: Product Sales Dataset is a comprehensive collection of sales data for a wide range of products available on the E-commerce e-commerce platform. This kind of dataset provides invaluable insights into customer behavior, product performance, and market trends, making it an essential resource for data analysis, market research, and business strategy development. This dataset is indispensable for market research, allowing businesses to discern market trends, consumer preferences, and competitive landscapes. This paper presents a comprehensive approach to customer behavior analysis and predictive modelling within the context of supermarket retail. This paper finds techniques that extract patterns in shopping data for the learning and prediction of user preference. This work list different proposed models with techniques. Paper has list various evaluation parameters of user purchase prediction models.

DOI: http://doi.org/10.5281/zenodo.17542512

Published by:

Optimization Of Biodiesel Production From Water Hyacinth Via Transesterification And Kinetic Modeling`

Uncategorized

Authors: Nweke James, Emenike Wami, Awajiogak Anthony Ujile, T.O. Goodhead

Abstract: This study evaluates biodiesel production from water hyacinth (WH) via transesterification, highlighting its potential as a sustainable renewable energy source. Lipids were extracted from WH using Soxhlet and maceration methods, yielding modest oil content. Five methanol-to-oil molar ratios (4:1, 5:1, 6:1, 7:1, 8:1) were tested, with the 6:1 ratio in combination with a NaOH catalyst producing the highest biodiesel yield of 88.21%. The biodiesel obtained exhibited a cetane number of 57.66, meeting ASTM D6751 standards and indicating excellent ignition quality suitable for high-efficiency diesel engines. Kinetic modelling. of the transesterification reaction was conducted to determine rate constants and conversion efficiencies, providing critical data for process optimization and scale-up. Using Python 3.11 with the Levenberg–Marquardt algorithm, the kinetic model closely fitted the experimental data, enabling accurate prediction of reaction progress and substrate conversion. These results demonstrate that water hyacinth is a viable feedstock for biodiesel production, offering both energy recovery and environmental management benefits. The study provides validated operational parameters and kinetic insights for the development of cost-effective, scalable biofuel production from aquatic biomass.

DOI: https://doi.org/10.5281/zenodo.17542202

 

Published by:

Analysis Of Drinking Water Of Different Places BHOHAPARA Janjgir Champa. C.G.

Uncategorized

Authors: Pradeep Kumar Jaiswal, Rakesh Kumar Yadav, Manish Kumar Tiwari

Abstract: The study is based on the analysis of drinking water parameters in an Educational institute situated in BHOHAPARA area, jajngir champa C.G. In this paper, different authors’ papers are summarized on water analysis and their treatment processes in different region, which is helpful to know the different treatment processes and parameters used in the study.

 

Published by:

Blood Bank And Donor Locator Website

Uncategorized

Authors: Ms. Dhivya, Dhanushya S, Akash S, Bharath Raj P, Mathan Kumar J

Abstract: The shortage and inefficient management of blood resources often lead to life-threatening delays in critical situations. To address this challenge, the Smart Blood Bank and Donor Locator Website has been developed as an integrated, intelligent web-based system that connects donors, hospitals, and recipients under one unified digital platform. The system uses SQLite databases for storing donor, hospital, stock, and request information efficiently. By integrating Google Maps API, it enables real-time location tracking and the display of nearby donors and hospitals based on blood group compatibility. Email notifications powered by Brevo are automatically triggered for key events such as donor registration, request confirmation, stock updates, and periodic reminders after three months for eligible donors. The multilingual support feature powered by Google Translate API ensures accessibility to users across various linguistic backgrounds. The system aims to create a digital ecosystem for managing blood donation, enhancing communication between hospitals and donors, and promoting awareness about blood donation in an efficient, transparent, and user-friendly manner. Future integration of IoT-based sensors for blood storage monitoring can further enhance the intelligence and automation of the system

DOI: http://doi.org/10.5281/zenodo.17538993

Published by:

Product Verification System

Uncategorized

Authors: Anshika saxena, Ahmad Hussain Ansari, Lalit Chowhan, Ashutosh Vishwakarma, Gyanendra Maurya

Abstract: Counterfeit products continue to pose significant challenges for manufacturers, distribu- tors, and consumers worldwide. They contribute to revenue losses, erode customer trust, create safety hazards, and cause long- term brand damage. According to global trade reports, coun- terfeit goods account for billions of dollars in annual losses across industries, with pharmaceu- ticals, electronics, and consumer goods among the most affected sectors. Traditional methods of product authentication, including holograms, barcodes, and RFID tags, either lack robust security or remain too costly for large-scale deployment. To overcome these limitations, this study proposes a Product Verification System that inte- grates QR codes with a MongoDB-based backend for efficient product traceability. The system architecture employs ReactJS for a user-friendly and modular frontend, Node.js with Express for secure API management, and MongoDB as a centralized, scalable database. At the point of manufacture, each product is assigned a unique QR code linked to its database record. Con- sumers can verify authenticity instantly by scanning the code with a smartphone, while manu- facturers and sellers gain real-time visibility into the supply chain.s Unlike conventional approaches, the proposed framework not only ensures authenticity but also supports analytics and reporting features, enabling stakeholders to monitor product dis- tribution, detect anomalies, and analyze consumer interaction patterns. This capability makes the solution adaptable for diverse sectors, including pharmaceuticals, electronics, and cosmet- ics, where transparency and safety are critical. The proposed system is cost-effective, scalable, and reliable, offering a practical balance between security and affordability. By leveraging accessible technologies such as QR codes and a flexible NoSQL database, it provides an imple- mentation pathway that is both technically feasible and industry-ready, making it suitable for mass adoption across global markets.In addition, the system introduces role-based access control (RBAC), ensuring that only authorized users such as administrators, manufacturers, and sellers can access or modify sen- sitive product information. The Admin Dashboard provides centralized control for managing users, viewing verification statistics, generating audit logs, and detecting counterfeit attempts through anomaly tracking. The Seller Module enables sellers to register genuine products and upload production details, while the Consumer The platform is further enhanced with real-time data synchronization, secure authentica- tion (JWT-based login system), and RESTful APIs, which maintain seamless communication between the client and server. Data integrity is preserved through encrypted QR code gen- eration and verification processes, while reporting and analytics tools assist manufacturers in monitoring sales regions, scanning frequency, and product lifecycle performance. Future scalability options include integration with blockchain networks to achieve im- mutable product records, AI-based anomaly detection for identifying suspicious activities, and cloud deployment for handling high- volume data operations. By combining robust backend design with modern frontend usability, this system delivers a holistic solution that bridges the gap between product authenticity, supply chain visibility, and consumer trust.

DOI: https://doi.org/10.5281/zenodo.17529956

 

Published by:

Forensic Browser Monitoring System

Uncategorized

Authors: Mr. Karthiban R, Dhayalan K, Akshita K, Jerisha Flavio J, Kalaiselvi S

Abstract: As digital learning environments continue to evolve, maintaining secure and focused internet usage has become a critical requirement for institutions and organizations. Existing browser monitoring tools often lack real-time visibility and are unable to detect VPN-based evasion techniques, which users exploit to bypass access restrictions. To address these limitations, this work proposes an intelligent browser activity monitoring and VPN detection system featuring a centralized administrative dashboard. Built on a Flask-based backend, the system securely gathers and visualizes browsing data through interactive charts and tables. A machine learning model continuously refines detection by learning administrative preferences—distinguishing between authorized and unauthorized sites—and improving decision accuracy over time. The adaptive framework enhances detection precision by integrating AI-driven behaviour learning with network anomaly analysis. By evaluating parameters such as IP consistency, latency fluctuations, and metadata patterns, the system effectively identifies tunnelling or masked connections even in encrypted networks. Its modular and cross-platform architecture ensures seamless data flow between clients and the central dashboard while preserving privacy and performance. Designed for scalability and reliability, the solution provides administrators with actionable insights and real-time control, making it an effective tool for maintaining policy compliance and secure browser activity in educational and institutional environments.

DOI: http://doi.org/10.5281/zenodo.17529567

Published by:

Comparative Study Of Wired Vs. Wireless Communication Protocols For Industrial IoT Networks

Uncategorized

Authors: Haritha Bhuvaneswari Illa

Abstract: Industrial Internet of Things (IIoT) networks form the backbone of smart manufacturing and digital transformation under Industry 4.0. Efficient and reliable communication between sensors, controllers, and cloud systems is essential to ensure high productivity, safety, and automation efficiency. This paper presents a comparative study of wired and wireless communication protocols used in IIoT environments. It evaluates popular wired protocols such as Ethernet/IP, PROFINET, Modbus, and EtherCAT alongside wireless alternatives like Wi-Fi, ZigBee, LoRaWAN, Bluetooth Low Energy (BLE), and 5G. Each protocol is analyzed in terms of latency, bandwidth, reliability, scalability, security, and energy efficiency. The research employs both analytical comparison from literature and simulation-based performance evaluation using MATLAB and NS-3 environments. Results reveal that wired protocols offer superior deterministic performance and reliability suitable for real-time control applications, whereas wireless technologies provide flexibility and scalability for monitoring and mobility-driven scenarios. The study highlights that hybrid architectures integrating wired backbones with wireless edge nodes can balance performance and deployment costs. This comparative analysis aims to guide industries in selecting suitable communication frameworks aligned with their operational requirements.

DOI: http://doi.org/10.5281/zenodo.17528800

Published by:

Study of Swarming Logistics with Tactical Last Mile Delivery

Uncategorized

Authors: Maj Nilam Gorwade, Dr. John A

Abstract: Last-mile delivery in a military context can often be dangerous, putting personnel and the supplies they carry at risk. The emergence of aerial ‘delivery drones’ from the commercial delivery sector highlights the possibilities of uncrewed vehicles being used in last-mile delivery. However, demonstrations of such technology have been limited to single vehicle deliveries, where only small portions of supplies can be delivered at once. This paper explores the concept of low-cost, uncrewed vehicle swarming for tactical last-mile delivery in a deployed setting. The benefits of uncrewed swarming systems over conventional methods of resupply are discussed, as well as the vulnerabilities and challenges faced by such systems.

DOI: https://doi.org/10.5281/zenodo.17522385

 

Published by:

From Bare-Metal Servers To Einstein Copilot: Bridging Legacy Unix Systems With AI-Powered CRM Transformation

Uncategorized

Authors: Kamlesh Jangra

Abstract: The convergence of legacy Unix systems with AI-powered Customer Relationship Management (CRM) platforms, such as Salesforce Einstein Copilot, represents a critical strategy for modern enterprises seeking operational continuity and enhanced customer engagement. Legacy Unix servers, including AIX, Solaris, and older Linux distributions, continue to support mission-critical CRM workloads, storing historical data and managing transactional processes with high reliability. At the same time, AI-driven CRM introduces predictive analytics, automated workflows, and intelligent insights that enable personalized customer interactions and strategic decision-making. This review examines methodologies, architectures, and best practices for bridging legacy Unix infrastructure with AI-enhanced CRM, highlighting middleware solutions, API frameworks, hybrid deployment models, and automated data pipelines. It explores challenges related to data compatibility, infrastructure limitations, security, compliance, and organizational change management. Case studies from financial and healthcare sectors illustrate practical implementations and lessons learned, emphasizing phased migration, continuous monitoring, and performance optimization. By synthesizing technical strategies and industry examples, this review provides actionable guidance for IT architects, administrators, and decision-makers to modernize CRM operations, maintain data integrity, and ensure seamless integration of AI capabilities while leveraging the reliability of existing Unix environments. The discussion concludes with insights on emerging trends, including predictive analytics enhancements, cloud-first strategies, edge computing, and automation-driven Unix modernization, framing a future-ready approach to enterprise AI CRM adoption.

DOI: https://doi.org/10.5281/zenodo.17520771

 

Published by:

Implementing Disaster Recovery With Commvault And TSM While Maintaining CRM Continuity Across Salesforce Experience Cloud

Uncategorized

Authors: Deepika Sirohi

Abstract: In modern enterprise ecosystems, maintaining continuous operations of Customer Relationship Management (CRM) platforms like Salesforce Experience Cloud is critical for revenue, customer engagement, and regulatory compliance. Disaster recovery (DR) strategies are essential to ensure uninterrupted CRM services across hybrid IT environments, encompassing UNIX, Linux, Windows, and cloud platforms. This review examines the implementation of DR frameworks using Commvault and IBM TSM (Spectrum Protect), highlighting their capabilities, integration approaches, and complementary strengths. Commvault offers hybrid cloud replication, orchestration, and automated failover, while TSM provides efficient incremental backups, long-term retention, and reliable on-premises support. By combining these solutions in a hybrid DR model, enterprises can achieve defined Recovery Time Objectives (RTO) and Recovery Point Objectives (RPO) for Salesforce workloads. The review further explores risk assessment, backup strategies, multi-platform integration, DR testing, monitoring, and continuous improvement processes, emphasizing practical approaches for preserving CRM continuity. Additionally, emerging trends such as AI-driven automation and cloud-native DR strategies are discussed, illustrating how predictive and adaptive technologies can enhance operational resilience. This comprehensive analysis provides IT architects, administrators, and decision-makers with actionable insights to design, implement, and optimize disaster recovery frameworks that safeguard Salesforce Experience Cloud operations while maintaining business continuity, data integrity, and compliance.

DOI: https://doi.org/10.5281/zenodo.17520456

 

Published by:
× How can I help you?