Category Archives: Uncategorized

The Impact of Robotics on Modern Manufacturing

Uncategorized

The Impact of Robotics on Modern Manufacturing
Authors:-Rithwik Agarwal

Abstract-This paper dives into how robotics is transforming manufacturing today. It looks at how robots are making processes faster, safer, and more efficient while also tackling some challenges like high costs and technical complexity. By exploring industries like automotive and consumer goods, and through examples from companies like Toyota and Unilever, the paper highlights both the advantages and limitations of using robots. It also touches on important issues like job impacts and cybersecurity risks, suggesting that thoughtful planning is essential for making the most of robotics in manufacturing.

DOI: 10.61137/ijsret.vol.10.issue6.345

Published by:

AR Storytelling Application

Uncategorized

AR Storytelling Application
Authors:-Sakshi Davkhar, Sreya Kurup, Dipali Sanap

Abstract-This paper explores the transformative potential of an Augmented Reality (AR) storytelling application designed to enhance traditional storytelling methods by integrating interactive digital animations, text, and audio into physical environments. The app offers a dynamic and immersive experience, particularly for children, by enabling real-time interaction with animated characters, voice narration, and engaging, interactive scenes. Unlike static books or conventional digital content, this app allows users to actively participate in the narrative, creating a more engaging and educational experience. By overlaying digital elements onto the real world, the app fosters increased interactivity and encourages deeper emotional and cognitive engagement with the story. Children can interact with animated characters, explore rich 3D environments, and receive instant feedback through audio cues and animations that respond to their actions. The app also supports educational growth by offering interactive learning modules, promoting reading comprehension, and allowing customization of story elements to accommodate multiple learning styles. The application leverages cutting-edge AR technologies to transform traditional narratives into immersive experiences, providing both entertainment and educational value. By integrating AI-driven components for voice recognition and dynamic content generation, the app can offer personalized experiences and adaptable content based on user preferences and interactions. This survey examines the underlying technologies and design choices that contribute to the app’s ability to engage users, as well as the broader implications of AR in storytelling for enhancing educational tools and creative learning platforms.

DOI: 10.61137/ijsret.vol.10.issue6.344

Published by:

A Review Paper on Alumni Portal

Uncategorized

A Review Paper on Alumni Portal
Authors:-Ansari Ayaan Najmul Kalam, Shaikh Aliya Ambreen, Khan Abdul Rehman Mohammed Mukhtar

Abstract-This paper reviews current research on Alumni Portal, the connections between alumnus and students, college interaction between alumnus, past records, event updates and records. The review covers 30 research papers, investigating database of Alumnus, students, past and present events held, interaction of alumnus in college events, interaction of alumnus and students. For improving the previous Alumni portals and projects related to Alumni.

DOI: 10.61137/ijsret.vol.10.issue6.343

Published by:

Shoe Theory: Embracing Individual Differences in Management

Uncategorized

Shoe Theory: Embracing Individual Differences in Management
Authors:-Arjita Jaiswal, Manish Chaudhary

Abstract-The concept of Shoe Theory emphasizes that everyone is comfortable in their own shoes and should not be forced to wear someone else’s shoes. This theory posits that individual differences, including the effects of various elements such as time and generational perspectives, significantly impact workplace dynamics and organizational effectiveness. The theory highlights the importance of recognizing the unique experiences and backgrounds of team members to foster an inclusive and productive environment. Keeping creative destruction in mind, everything has its loophole to be breached. Although the answer may be yes or no, there always exists a condition of if/situation and but/exception.

DOI: 10.61137/ijsret.vol.10.issue6.342

Published by:

Enhanced Flower Recognition via Transfer Learning with ResNet-50

Uncategorized

Enhanced Flower Recognition via Transfer Learning with ResNet-50
Authors:-Md. Juniadul Islam, Syeda Aynul Karim

Abstract-This paper proposes a flower recognition system using transfer learning with the ResNet-50 architecture. By utilizing pre-trained weights from ResNet-50, the system classifies ten species of flowers, drawing on an extended dataset with over 8,000 labelled images. The study addresses challenges in deep convolutional neural networks, such as overfitting and local optimality, by fine-tuning the ResNet-50 model. Initially, only the final layers of the model are retrained on the flower dataset, while the pre-trained layers remain frozen. After achieving initial convergence, all layers are unfrozen for full model fine-tuning. The dataset is divided into training, validation, and test sets to evaluate the model’s performance, which is measured using accuracy, and F1-score. The experimental results demonstrate that the transfer learning approach significantly improves classification accuracy and generalization, outperforming traditional methods. This approach proves especially effective in handling visually similar flower species and diverse environmental conditions. The study highlights the potential of transfer learning in enhancing the efficiency and robustness of flower recognition systems, contributing to broader applications in image classification tasks.

DOI: 10.61137/ijsret.vol.10.issue6.341

Published by:

Virtual Security Realized: An In-Depth Analysis of 3D Passwords

Uncategorized

Virtual Security Realized: An In-Depth Analysis of 3D Passwords
Authors:-Md. Juniadul Islam, Syeda Aynul Karim, Ishtiaq Hoque Farabi

Abstract-The demand for robust authentication systems has risen significantly as cyberattacks become increasingly sophisticated. Current authentication mechanisms, such as textual passwords, biometrics, and graphical systems, each have unique vulnerabilities. This research explores the concept of a 3D password system, which integrates various authentication schemes into a virtual 3D environment to enhance security. The system allows users to interact with objects in a 3D space, forming unique and complex passwords based on sequences of interactions. This paper elaborates on the system’s design, implementation, and potential applications in critical and non-critical systems. Detailed analyses reveal that the 3D password provides superior resistance to timing attacks, brute force attempts, and well-studied schemes, while maintaining user-friendliness. Future research avenues include the incorporation of AR/VR and IoT technologies to further expand the utility of the 3D password system.

DOI: 10.61137/ijsret.vol.10.issue6.340

Published by:

Smart Shields against Cyber Threats: Machine Learning-Driven Phishing URL Detection

Uncategorized

Smart Shields against Cyber Threats: Machine Learning-Driven Phishing URL Detection
Authors:-Syeda Aynul Karim, Md. Juniadul Islam, Ishtiaq Hoque Farabi

Abstract-Phishing attacks remain a prevalent cybersecurity threat, exploiting vulnerabilities in digital platforms to compromise sensitive user data. This paper introduces a novel machine learning-based framework for phishing URL detection, combining advanced feature engineering techniques and classification algorithms. By integrating lexical attributes, WHOIS data, and ranking metrics like PageRank and Alexa Rank, our approach enhances detection accuracy and minimizes false positives. Experimental results demonstrate superior performance across classifiers, achieving an accuracy of 99.8% using Support Vector Machines. The framework’s modular design ensures adaptability to evolving phishing tactics and scalability for enterprise deployment. This research lays the foundation for future advancements in AI-driven cybersecurity solutions.

DOI: 10.61137/ijsret.vol.10.issue6.339

Published by:

From Survival to Thriving: AI-Powered Pathways for Homeless Children’s Adoption and Healing

Uncategorized

From Survival to Thriving: AI-Powered Pathways for Homeless Children’s Adoption and Healing
Authors:-Syeda Aynul Karim, Md. Juniadul Islam, Mir Faris

Abstract-The plight of homeless children remains one of the most urgent global challenges, with millions of vulnerable children deprived of basic human rights such as shelter, healthcare, and education. Despite the rapid advancement of technology, child welfare systems in many developing countries still face significant hurdles, marked by inefficiencies and fragmented services. This paper proposes an innovative AI-driven system for adoption and rehabilitation that aims to address these systemic challenges holistically. By harnessing cutting-edge artificial intelligence (AI) algorithms, the system streamlines the adoption process, delivers personalized healthcare recommendations, and optimizes resource allocation for child welfare organizations. Through the integration of predictive analytics, data-driven decision-making, and a robust ethical framework, the system ensures transparency, fairness, and scalability. Early simulations and case studies highlight the transformative potential of AI in enhancing adoption success rates and improving healthcare outcomes for homeless children. The findings emphasize the system’s ability to drive meaningful improvements in global child welfare efforts, offering a scalable, ethical solution that can have a lasting impact on vulnerable children worldwide.

DOI: 10.61137/ijsret.vol.10.issue6.338

Published by:

Summraize: Smart Meeting Assistant for Automated Summaries

Uncategorized

Summraize: Smart Meeting Assistant for Automated Summaries
Authors:-Assistant Professor Karmbir Khatri, Swastik Goomber, Sushil Verma, Shivam bansal, Piyush

Abstract-Virtual meetings have become an essential mode of communication in contemporary professional environments. However, the fast-paced nature of virtual meetings undermines the ability to remember critical information accurately as even making notes is an imperfect mundane task, manual note-taking is both time- consuming and error-prone, often resulting in overlooked decisions and action items. SummrAIze is an AI-powered meeting assistant designed to address these challenges by automating the transcription, [1]summarization, and extraction of actionable insights during virtual meetings on platforms like Google Meet and Microsoft Teams. Using advanced machine learning algorithms, SummrAIze produces real-time summaries, highlights key points, and identifies action items, enabling participants to engage fully in discussions without sacrificing documentation accuracy. Integrated with productivity tools, SummrAIze not only reduces manual effort but also ensures that all essential information is recorded and accessible, enhancing team collaboration and workflow continuity. This paper presents the design, methodology, and potential impact of SummrAIze, a tool that redefines productivity in the context of virtual meetings.

DOI: 10.61137/ijsret.vol.10.issue6.337

Published by:

Review: Cyber Insight – Illuminating Cyber Security for all

Uncategorized

Review: Cyber Insight – Illuminating Cyber Security for all
Authors:-Ayush Kore, Kushal Hirudkar, Palak Jaiswal, Shravani Ambulkar, Shaarav Kamdi, Shalini Kumari

Abstract-With the advent of the “e-” revolution starting in 2000, the issue of cyber security, cyber-attacks and cyber threats which included domains, but not e-business, e-government, e-; commerce etc. only occurred because for the issue of cybersecurity in e- learning is under-explored, the aim of this paper is to present methods that focus on monitoring cybersecurity issues related to e- learning processes on. In addition, this article aims to present some good examples of cybersecurity management strategies in e- learning and cybersecurity trends in this area.[2] This paper will present possibilities for increasing information security and cyber- security awareness in education and e-learning that will inspire future cybersecurity professionals to navigate their career path.[3].

DOI: 10.61137/ijsret.vol.10.issue6.336

Published by:
× How can I help you?