TEJAS Journal of Technologies and Humanitarian Science

ISSN : 2583-5599

Open Access | Quarterly | Peer Reviewed Journal

April, 2024 | Volume 03 | Issue 02

Paper 1: The art of Data Analysis: Review on Essential, Techniques and Methodologies

Dr. Shalini Lamba, Harsha Sahni and Aanya Sharma

Abstract:

This paper provides a comprehensive overview of the key processes and methodologies in data analytics, with a focus on knowledge discovery in databases (KDD). It explores the evolution of data analytics and its importance in today's data-driven world. The paper discusses the significance of each KDD operator, including selection, preprocessing, transformation, data mining, and interpretation/evaluation, in shaping the outcomes of data analytics processes. Through a detailed examination of these operations, the paper highlights the essential role of data analytics in gathering, analyzing, and presenting insights derived from data. Furthermore, the paper explores the challenges and advancements in big data analytics, emphasizing the importance of understanding computational complexities, information security, and computational methods for effective data analysis.

Download Full Paper

Paper 2: Beyond Cryptocurrency: Harnessing Blockchain for Cybersecurity

Dr. Shalini Lamba, Jatin Awasthi and Vikas Yadav

Abstract:

This paper aims to explore the role of blockchain in strengthening cyber security. In an era where cyber threats are at its peak, the blockchain technology has come out as a promising method to strengthen the defenses of cyber security. This paper highlights the impact of blockchain technology on cyber security. The paper starts by explaining the basics of blockchain and will then discuss its various key features when integrated with cyber security such as secure data storage and processing, user confidentiality, decentralization and many more. But using blockchain also has some limits such as scalability issues, regulatory issues etc. which are also discussed in this paper. At last, the conclusion will summarize the benefits of integrating blockchain technology with cyber security and what the future holds.

Download Full Paper

Paper 3: Enhancing Learning Through Intelligent Tutoring System: A Step Towards Smarter Education

Aditya Pandey, Abhishek Kumar,and Mrs. Shweta Sinha

Abstract:

Intelligent Tutoring Systems (ITS) have emerged as a promising tool for revolutionizing traditional educational paradigms by providing personalized and adaptive learning experiences. This paper explores the role of ITS in enhancing learning outcomes and advancing towards smart education. By leveraging artificial intelligence and machine learning algorithms, ITS can analyze students' learning behaviors, preferences, and performance to tailor instructional content and feedback in real-time. Such personalized interventions have been shown to improve student engagement, motivation, and knowledge retention. Additionally, ITS can facilitate continuous assessment and progress tracking, enabling educators to identify and address learning gaps more effectively. Furthermore, the integration of ITS into educational environments promotes active and self-directed learning, empowering students to take ownership of their learning journey. Despite the numerous benefits, challenges such as designing user-friendly interfaces, ensuring data privacy, and addressing equity concerns need to be addressed for widespread adoption of ITS. This paper concludes by discussing future directions and implications for the integration of ITS into educational practices, emphasizing the transformative potential of ITS in fostering smart education initiatives..

Download Full Paper

Paper 4: Impact of Blockchain in Social Networks

Rinku Raheja , Shagun Awasthi, Akashay Kumar Singh

Abstract:

This study explores the potential impact of blockchain technology on social networks. As social media evolves, so does the technology supporting it. Originally a tool for connecting people, social media has transformed into a platform for expressing opinions, promoting businesses, launching campaigns, and offering new career opportunities. With this evolution comes increased concerns regarding data security, privacy, and trust. Blockchain, known for its decentralized and immutable ledger, offers innovative solutions to address these concerns, thereby safeguarding freedom of speech and expression on social media platforms. While decentralized social media platforms also provide opportunities for users to earn cryptocurrencies, they are susceptible to criminal activities, necessitating regulations to ensure benefits outweigh harms. This study examines blockchain's applications in social networks, focusing on its impact on data protection, user empowerment, and the creation of decentralized social platforms, emphasizing trust, security, and user control.

Download Full Paper

Paper 5: AI-Powered Solutions in Healthcare and Transportation Overcoming Challenges and Shaping the Future

Mahesh Kumar Tiwari and Aditya Saxena

Abstract:

In current years, Artificial Intelligence (AI) has emerged as a transformative force, reshaping industries and revolutionizing conventional practices. In the domain of healthcare and transportation, AI holds great promise for advancing the quality, efficiency, and accessibility of services. This research paper explores the frontier of AI destiny improvements in healthcare and AI-powered transportation, delving into the contemporary improvements, challenges, and moral considerations. In healthcare, AI-pushed answers which include deep learning-primarily based totally scientific picture analysis, predictive modelling of affected person outcomes, and personalised remedy are paving the manner for greater correct diagnoses, personalised treatments, and progressed affected person care. Simultaneously, in transportation, AI is riding improvements in self- reliant vehicles, shrewd site visitors control systems, and concrete mobility answers, promising safer, greater efficient, and sustainable transportation networks. However, the huge adoption of AI in those domain names increases moral worries surrounding privacy, bias, cybersecurity, and public perception. Through a complete analysis, this paper goals to offer insights into the modern kingdom of AI in healthcare and transportation, even as additionally dropping mild on destiny trajectories and the results for studies, practice, and policy.

Download Full Paper

Paper 6: Mindful Scrolling: Nurturing Mental Health through Digital Citizenship in the Digital Deluge

Amit Srivastava, Devansh Saxena and Nitin Dwivedi

Abstract:

This research paper explores the concept of mindful scrolling as a means of nurturing mental health and promoting digital citizenship in the digital age. By examining the impact of excessive screen time and social media use on mental health, the benefits of mindful scrolling, and the role of digital citizenship, this paper offers strategies for maintaining a healthy balance between online and offline life. The findings highlight the importance of being present, setting boundaries, and practicing responsible online behavior for mental well-being. In our increasingly digital world, where screens dominate our walking hours, the concept of mindful scrolling emerges as a beacon of hope for preserving mental well-being. This abstract delves into the intersection of digital citizenship and mental health, exploring how intentional engagement with online content can positively impact our psychological state.

Download Full Paper

Paper 7: A COMPREHENSIVE EXAMINATION OF SUPPLY CHAIN APPLICATIONS INTEGRATING BLOCKCHAIN TECHNOLOGY AND ARTIFICIAL INTELLIGENCE

Mr. Rinku Raheja, Mr. Mahesh Tiwari, Manas Mehrotra and Ayush Kumar

Abstract:

The admixture of blockchain technology and artificial intelligence( AI) has garnered significant interest in recent times, primarily due to the eventuality for enhancing the security, efficacity, and productivity of operations within business settings that are marked by oscillations, unpredictability, intricacy, and vagueness. Supply chains, in particular, have been demonstrated to gain a great deal from blockchain and artificial intelligence. These technologies ameliorate information and process adaptability, grease briskly and more provident product delivery, and increase product traceability, to name a many benefits. This exploration does a slice- edge force chain analysis of blockchain and artificial intelligence. More precisely, we aimed to respond to the following three main queries Q1 What studies are now available on the integration of blockchain and artificial intelligence in force chains? Q2 What use cases for blockchain and AI are presently being delved in force chains? Q3 What avenues of exploration could be pursued in the future for studies involving the integration of blockchain and AI? Through the integration of blockchain and artificial intelligence, this paper's analysis has linked material exploration works that have conceptually and empirically contributed to the growth and accumulation of intellectual value in the force chain discipline.

Download Full Paper

Paper 8: Data Mining with Big Data Analysis Algorithm Tools, Application and Challenges

Dr. Shalini Lamba,, Shivam chaurasiya

Abstract:

Organizations now days gather and store vast volumes of data in the hopes that it may be valuable later. Big data can be utilized by enterprises to accomplish a range of goals where success depends on astute analysis, in addition to seeking greater insights for enhancing the quality of their services and profit. Measure mistakes, noise accumulation, spurious correlation, scalability or storage bottlenecks, and other special computing or statistical problems are brought about by big data. These problems are unique and need for a modern statistical and computational framework. This paper presents the literature criticism about the Big data Mining and the problems and challenges including emphasis on the distinguished features of Big Data. It also covers a few strategies for working with large amounts of data. An overview of big data, including its type, source, and features, is provided in this work. This research also includes an assessment of several large data mining platforms, techniques, and problems. However, big data also brings with it a number of obstacles, including those related to data storage, analysis, visualization, and capture. The purpose of this article is to provide an in-depth understanding of big data, including its applications, opportunities, and challenges. It also aims to showcase the cutting-edge approaches and technology that we now use to address big data issues.

Download Full Paper

Paper 9: Apply different Efficient Data Extraction Techniques in real world application

Aman Yadav, Princy Srivastava, and Dr. Anil Kumar Pandey

Abstract:

In this research paper, we are performing data extraction by using Efficient Data Extraction Techniques tool for the headache-free manner. We inspect various strategies for extracting valuable information form huge amounts of data. These techniques use from simple rules to more modern methods involving smart machines that can learn on their own. These tool work to save us time and effort by extracting the essential information of bits from the very large data landscape.

Download Full Paper

Paper 10: Bug Reconnaissance Tools – SQLi and XSS Recon Tools

Pankaj Mourya

Abstract:

The creation of a sophisticated XSS and SQL Injection bug detection tool with the goal of improving online application security is presented in the aforementioned study. Comprehensive technologies that can successfully identify and mitigate such risks are critically needed, especially given the constant danger landscape these vulnerabilities pose. Our method ensures a comprehensive check for XSS and SQL Injection vulnerabilities in web applications by combining automated scanning techniques with human verification. The tool contains novel methods of evading detection and circumventing security barriers, allowing for robust surveillance in a variety of contexts. Our tool's effectiveness and adaptability in identifying and addressing XSS and SQL Injection vulnerabilities are proven by means of extensive testing and assessment. The results emphasize the value of cutting-edge reconnaissance technologies in supporting web application security and offer developers and security experts useful information. This work adds to the continuing endeavors to improve web application security and lessen the dangers associated with SQL Injection and XSS vulnerabilities.

Download Full Paper

Paper 11: Cybersecurity Paradigms: Trends, Threats and Solutions

Mr. Amit Srivastava, Ridhima Manni and Ankita Pawar

Abstract:

In an era dominated by digital interactions, this research delves into the intricate web of cyber security, cybercrime, and the pivotal role of social media, with a keen eye on ethical considerations. As cyber threats continue to evolve, understanding the dynamics of cyber security becomes imperative. The study explores the escalating landscape of cybercrime, particularly in the context of social media platforms, which serve as breeding grounds for diverse cyber threats. Additionally, it investigates the ethical dimensions of cybersecurity, emphasizing the importance of responsible online behavior and adherence to ethical standards. This interdisciplinary exploration aims to unravel the complexities of safeguarding digital spaces, balancing technological fortification with ethical principles. In navigating the digital realm, the synergy of cyber security, cyber ethics, and social media resilience emerges as a linchpin for a secure and trustworthy online environment.

Download Full Paper

Paper 12: Interpretation of Huge Mobile Data Science using Handover Approach

Ambrish Kumar Mishra, Bineet Kumar Gupta, Satya Bhushan Verma

DoI: https://doi.org/10.5281/zenodo.12057472

Abstract:

Enabling seamless connectivity through user mobility is a critical challenge in mobile heterogeneous networks (HetNets). Future deployments of Fifth Generation (5G) and other mobile networks are predicted to exacerbate the situation and result in Ultra-Dense HetNets. The use of millimeter waves (mm Waves), the exponential growth in connected mobile devices, overlapping network deployments, and the utilization of dual High mobility speed possibilities are supported by connectivity (DC), carrier aggregation (CA), the proliferation of connected drones, and the widespread deployment of tiny cells. These are only a handful of the important elements that are behind this. There will thus be a higher probability of changeover failure, handover ping-pong, unnecessary handovers, interruption delays, and throughput degradation. The exponential growth in mobile connections is another expected challenge for next-generation mobile networks. The amount of linked mobile devices is increasing exponentially.IoT devices are also multiplying in number. A ubiquitous connection and additional network capacity will be required once a large number of mobile devices are added. Therefore, in organize to increase connectivity and decrease coverage gaps, it is recommended that various types of micro cells be employed in mobile networks in the future.

Download Full Paper