Category Archives: Uncategorized

Structural Performance Of Tall Buildings With Bracing And Infill Walls Under Lateral Loads: A Review

Uncategorized

Authors: Rahul Kumar Satbhaiya, Jitendra

 

Abstract: High-rise buildings are particularly susceptible to lateral forces induced by seismic and wind loads, which often govern their overall performance and safety. Conventional reinforced concrete (RC) frames, although effective in carrying vertical loads, lack sufficient stiffness to resist such lateral actions, making them prone to excessive displacement, inter-story drift, and even structural instability. To address these challenges, lateral load resisting elements such as masonry infill walls and steel bracing systems are increasingly incorporated into RC frames to enhance seismic resistance. This paper presents a comparative study on the effectiveness of different lateral load resisting systems in improving the seismic performance of high-rise buildings. The investigation considers three structural configurations: bare frame, masonry infilled frame, and externally braced frame with X-bracing. A 12-story reinforced concrete building model (R+12) with 3 m floor height is analyzed using CSI ETABS software under seismic Zone V conditions and response spectrum analysis for soft soil. Key performance parameters including base shear, lateral displacement, inter-story drift, and moment distribution are evaluated to assess the influence of each system on overall seismic behavior. The results reveal that the inclusion of masonry infill significantly reduces the demands on beams and columns by increasing lateral stiffness and redistributing forces. However, the most notable improvement is observed with the use of external steel bracing, particularly X-braces, which provide superior stability and effectively minimize displacements. Steel-braced frames also demonstrate greater cost-efficiency compared to masonry infill, while ensuring higher ductility and energy dissipation. In comparison, bare frames exhibit the least stability and maximum lateral displacements. Overall, the study confirms that lateral load resisting elements play a crucial role in enhancing the seismic performance of RC frames, with steel bracing emerging as the most effective solution, followed by masonry infill..

DOI: https://doi.org/10.5281/zenodo.16925530

 

Published by:

Cardiogenic Disease Using Ml

Uncategorized

Authors: Ass.Prof. Srinivas V, Chethan Kumar B AAbstract: Cardiogenic shock (CS) represents one of the most critical and life-threatening complications of cardiovascular disease, arising when the heart is unable to circulate sufficient blood to meet the body’s metabolic needs. It frequently develops as a consequence of acute myocardial infarction, acute decompensated heart failure, or advanced cardiomyopathy. Even with progress in modern critical care, CS remains linked to exceptionally high mortality rates—often surpassing 40–50% in cases related to acute coronary syndromes. The sudden onset, rapid physiological decline, and diverse clinical presentations make timely recognition and accurate risk assessment particularly challenging. Conventional diagnostic tools, though indispensable, often lack the precision and speed needed to initiate intervention before irreversible damage occurs. In recent years, the adoption of Machine Learning (ML) techniques in cardiology has emerged as a promising avenue to address these limitations. ML can process extensive datasets from electronic health records (EHR), continuous monitoring systems, and imaging modalities, uncovering patterns that may be imperceptible to human observation. By analyzing structured and unstructured information—such as laboratory results, hemodynamic parameters, ECG data, and clinician notes—ML models can detect early warning signals, classify patient subgroups, and forecast outcomes with notable accuracy. Studies have demonstrated the value of predictive algorithms, such as gradient boosting methods like XGBoost, trained on multi-year de-identified hospital datasets. These models have been able to anticipate CS onset several hours before formal diagnosis, achieving area-under-the-curve (AUC) scores near 0.90. They can notify healthcare providers while patients are still in the emergency department, intensive care unit, or general ward, enabling earlier interventions. Deep learning approaches—including convolutional and recurrent neural networks—have powered systems like “CShock,” which processes real-time patient data. Such systems have consistently outperformed traditional scoring tools, including the CardShock score, in predicting both occurrence and severity. Unsupervised learning techniques, such as clustering, have also been applied to categorize CS patients into distinct phenotypes based on physiological and biochemical profiles. This patient segmentation is essential, as it highlights variations in treatment responses and supports the development of personalized therapeutic strategies. Beyond detection, ML is being utilized for prognostication, including mortality and hospital readmission risk. National registry–based models have proven effective at predicting 7-day and 30-day readmissions, aiding in post-discharge planning and reducing the likelihood of recurrent hospitalization. Integrating time-series data from invasive arterial lines or wearable cardiac monitors further refines predictive capabilities by tracking evolving patient trends rather than relying solely on isolated measurements. The integration of Explainable AI (XAI) techniques—such as SHAP (Shapley Additive Explanations)—allows clinicians to identify which clinical features, like reduced systolic blood pressure, elevated lactate, or abnormal troponin levels, most strongly drive predictions, fostering greater trust in ML recommendations. Nonetheless, widespread clinical adoption faces obstacles. Data variability across institutions, stemming from differences in demographics, documentation standards, and care protocols, can limit model generalizability, underscoring the need for robust external validation. Moreover, many deep learning systems remain opaque “black boxes,” creating interpretability challenges in high-stakes decision-making. Ethical considerations—including data privacy, bias mitigation, and transparency—are equally critical. Future research will likely focus on multimodal ML systems that merge EHR data with imaging (e.g., echocardiography, cardiac MRI), genomic profiles, and continuous physiologic monitoring for a more comprehensive patient assessment. Adaptive learning models, which evolve alongside changes in treatment practices, could maintain accuracy over time. Implementation science will be crucial in integrating these tools into routine care without disrupting established workflows. Collaborative efforts among clinicians, data scientists, engineers, and industry partners will be needed to develop intuitive interfaces and ensure predictive insights are actionable at the bedside. Incorporating ML-driven decision support into telehealth and remote monitoring could further expand access to timely interventions in underserved regions. In summary, Machine Learning offers transformative potential for the early detection, classification, and management of cardiogenic shock. By enabling earlier action, supporting personalized care, and enhancing post-discharge outcomes, ML can markedly improve survival and recovery in this vulnerable population. However, its success will depend on rigorous validation, improved interpretability, strong ethical safeguards, and smooth integration into everyday clinical practice. As healthcare datasets grow in size and diversity, and computational capabilities advance, ML’s role in confronting the urgent challenges of cardiogenic shock is set to become increasingly vital.

Published by:

Quantitative and Ftir Spectroscopic Assessment of Phytochemical Constituents in Dacryodes Edulis Aqueous Leaf Extract

Uncategorized

Authors: Ejiogu C. C., Ojiaku A. A, , Oguzie E.E, Njoku-Tony R. F.

Abstract: – Plants contain natural medicinal resources that are beneficial to human health and well-being and offer health benefits to populations worldwide. Dacryodes edulis was explored for its antioxidant activity, quantitative determination and spectroscopic analysis of its phytochemical constituents of its crude leaf extract using Fourier Transform Infrared Spectroscopy (FTIR). The leaf extract was found to have good antioxidant activity (61.84%) using DPPH. It was also observed to contain absorption peaks at 2918.26 cm-1, 2850.24 cm-1, 1725. 98 cm-1, 1517.08 cm-1, 1164.61 cm-1 and 1032.79 cm-1 representing carboxylic, aliphatic groups, carbonyl, ester, phenolic compounds, tertiary alcohols and amino acids functional groups. This is evidenced by the presence of tannins, flavonoids, alkaloids, cyanogenic glycosides and anthraquinones. These functional groups are responsible for the therapeutic potential of the fruit tree and use in the treatment of acute and chronic infections and diseases.

DOI: https://doi.org/10.5281/zenodo.16918227

 

Published by:

Evaluating The Effectiveness Of Zero-Trust Architecture Principles In Reducing Cloud-Based Authentication Threats & Vulnerabilities

Uncategorized

Authors: Victor Otieno Mony, Anselemo Peters Ikoha, Roselida O. Maroko

Abstract: The increasing complexity of cyber threats and the widespread adoption of cloud-based services have significantly exposed traditional authentication mechanisms to evolving vulnerabilities. To try and reduce the veracity of these threats, several mitigation mechanisms such as Multifactor and Two Factor Authentication, Biometric Authentication, Key Hashing Protocols, among others, have been employed. However, existing mitigation strategies have proven insufficient in addressing the dynamic nature of CBS authentication threats and vulnerabilities. In response, this paper looks at alternative, better cloud-based authentication mitigation mechanisms through the adoption of Zero Trust Architecture paradigms. The Paper evaluates the five Zero Trust Principles against five cloud-based authentication attack vectors for effectiveness in reducing cloud-based threats and vulnerabilities. The cloud-based authentication-related Zero Trust principles evaluated by this paper are the principles of Least Privilege, Continuous Monitoring, Encryption, Strong Authentication, and Policy Enforcement. The five authentication threat categories whose attack vectors have been used in the evaluation process are Brute Force Attacks, Denial of Service Attacks, Social Engineering Attacks, Man-in-the-Middle Attacks, and Password Discovery Attacks. The evaluation process involves analysing the ZTA principles against the five authentication threats and vulnerabilities attack vectors to determine effectiveness. The results the evaluation indicate that the ZTA principle of Policy Enforcement has the broadest impact across all five threat categories, while the other evaluated Zero Trust principles offer only partial mitigation to cloud-based authentication threats. This is because the Zero Trust principle of Policy Enforcement has a deeper, comprehensive coverage across the selected threat vectors and encompasses a higher number of Zero Trust sub-principles. The paper thus concludes that the Zero Trust principle of policy enforcement is the most suitable foundation for designing a threat-responsive ZTA implementation scheme.

DOI: http://doi.org/10.5281/zenodo.16910750

Published by:

Advances In Dealing With Long-Term Dependencies: From Vanishing Gradients To Transformer Architectures And Beyond

Uncategorized

Authors: Poroni Koiknzi Fousseni, Elvis Thierry Sounna Vofo

Abstract: Long-term dependency modeling remains one of the fundamental challenges in sequence processing tasks across natural language processing, time series analysis, and sequential decision-making. This paper presents a comprehensive analysis of methods for handling long-term dependencies, examining the evolution from traditional recurrent neural networks (RNNs) to modern attention-based architectures. We provide theoretical foundations for the vanishing gradient problem, analyze key architectural innovations including Long Short- Term Memory (LSTM), Gated Recurrent Units (GRU), and Transformer models, and dis- cuss emerging approaches such as State Space Models and Linear Attention mechanisms. Our analysis includes mathematical formulations, computational complexity considerations, and empirical performance comparisons across various sequence modeling tasks. We identify current limitations and propose future research directions for improving long-range sequence modeling capabilities in deep learning systems.

DOI: https://doi.org/10.5281/zenodo.16908505

 

Published by:

Paper Publication

Uncategorized

Published by:

Archive Issue AI

Uncategorized

Published by:

The Impact Of AI On Back-Office Logistic Operations And Logistic Shared Service Operations: 6 Key Impacts In 2025

Uncategorized

Authors: Sandipan Chakraborty

Abstract: Back-office logistics and shared services are being re-architected by AI in 2025. Beyond warehouse robots and route optimizers, the largest productivity lift is happening in the “paperwork and pixels” of logistics: order capture, document processing, freight audit & pay, customer service, and compliance. Drawing on current India-market data and public programs (ULIP, GST e-invoicing, ONDC) and global benchmarks (World Bank LPI), this journal synthesizes six concrete AI impacts that leaders can deploy now: (1) intelligent document processing and touchless workflows; (2) predictive ETA and exception control towers; (3) dynamic rating, tendering, and contract optimization; (4) forecasting for capacity, working capital, and SLA staffing; (5) AI copilots for shared-services agents; and (6) digital compliance across GST/e-invoicing and trade. We quantify the opportunity, map enabling Indian rails/APIs, list risks and controls, and close with a practical upskilling and tools roadmap tailored to India..

DOI:

 

Published by:

F-HSRP: A Federated, Trust-Aware, And Energy-Efficient Secure Routing Protocol For Scalable And Privacy-Preserving IoT Networks

Uncategorized

Authors: Piyali Ghosh , Dr. Dhirendra Kumar Tripathi

Abstract: With the accelerated growth of the Internet of Things (IoT), providing secure, scalable, and privacy-preserving communication has become a serious issue. Current routing protocols such as AODV, DSR, and HSRP are incapable of addressing the complex needs of today's IoT systems, particularly in large-scale, heterogeneous, and energy-constrained systems. This paper introduces the Federated Hybrid Secure Routing Protocol (F-HSRP)—a new paradigm that combines federated learning, trust-based routing, AES-256 encryption, and blockchain-aided route verification to address these issues holistically. F-HSRP utilizes a light-weight Convolutional Neural Network (CNN) at the edge of IoT networks. With federated learning, local anomaly detection models are trained at the nodes, maintaining data privacy and facilitating real-time accurate threat detection. Routing decisions are informed through a composite trust score based on node behavior, residual energy, and anomaly scores. Secure data transfer is enabled by AES-256 encryption and a lightweight Proof-of-Authority (PoA) blockchain process that guarantees tamper-proof route verification without imposing substantial overhead. The protocol is tested with the Bot-IoT dataset and a hybrid simulation platform that integrates NS-3 and TensorFlow Federated. The results indicate F-HSRP outperforms conventional protocols with 96.3% anomaly detection rate, 27% energy efficiency improvement, and better packet delivery and delay metrics. It also successfully fights blackhole, replay, and Sybil attacks. By integrating federated intelligence, cryptographic security, and blockchain consensus, F-HSRP offers a strong, energy-efficient, and privacy-enhanced routing solution for real-time IoT applications in smart cities, industrial control, healthcare monitoring, and military systems.

Published by:
× How can I help you?