TEJAS Journal of Technologies and Humanitarian Science

ISSN : 2583-5599

Open Access | Fully Refereed | Peer Reviewed Journal

2022 | Volume 01

October 2022 | Volume 01 | Issue 01

Paper 1:Out of vocabulary words handling in morphological analysis

Amit Asthana, Ganesh Chandra

Abstract:

Morphological analysis is the first step in Natural Language Processing (NLP). It paves the way for future analysis and NLP procedures to be completed. Morphological analysis is the act of identifying morphemes in a phrase by studying each word individually. Out of vocabulary (OOV) words are words that are present in a phrase but for which the morphological analyzer is unable to discover a morpheme. In NLP, identifying OOV terms is a challenge. If OOV terms are not detected, it may be difficult to discern the sentence's true meaning. The goal of this research study is to provide a mechanism for identifying OOV words in Hindi during morphological analysis.

Download Full Paper

Paper 2:A study on Segmentation Techniques

Abhay Kumar Yadav

Abstract:

Segmentation is required to appropriately partition any picture into multiple tiny pieces, as well as to locate various image elements and extract relevant information. The digital image is segmented into numerous smaller segments (sets of pixels), each with its own set of opposing attributes such as texture, color, intensity, and a variety of other statistical properties. This work seeks to illustrate various typical pixel-based segmentation techniques used in image processing, such as thresholding, k-mean clustering, histogram, split & merge, and watershed transformation, as well as their benefits and drawbacks.

Download Full Paper

Paper 3:Study on Internet of Things

Satya Bhushan Verma

Abstract:

More than 9 billion �Things� (physical objects) are presently connected to the Internet, as of now. In the future, this number is predictable to rise to a enormous more than 20 billion. The Internet of Things (IoT) is the interconnected of physical devices that comprise electronics embedded within their architecture in order to communicate and sense interactions amongst each other or with respect to the external environment. In the upcoming years, IoT-based technology will offer advanced levels of services and practically change the way people lead their daily lives.

Download Full Paper

Paper 4:Medicinal Plants for Immunity Boosting in Covid-19

Mansi Dwivedi

Abstract:

The novel coronavirus disease (COVID-19) has spread over the globe infecting more than 164,000,000 populations leading to more than 3,000,000 deaths. Due to lower immunity, peoples are suffering from non-infectious and infectious diseases including hypertension, diabetes, kidney disorder are considered at more risk from this epidemiologic infection. Immunity (natural body system) enhancing may have the major influence as a prophylactic measure against multiple pathogenic situations as well as maintaining finest health. Ministry of AYUSH of the Government of India, in the interest of mass health promotion, recommends 'Ayush Kwath,' or �Kada,' or 'Ayush Joshanda,' which contains some medicinal herbs. In presented paper, discussed about these medicinal herbs.

Download Full Paper

Paper 5:Wireless Sensor Network: A Technical Review

Nidhi Tiwari

Abstract:

Sensor nodes in a WSN are powered by batteries and have the ability to sense, process information, and communicate. For analysts, the power consumption of sensor nodes presents a number of challenges. A battery provides limited vitality to the sensor nodes. Because of the large number of sensor nodes and their location in remote, dry, or hostile zones, it is extremely difficult to replace or revive the battery of a sensor node. The detecting and sending processes require energy from sensor nodes. It is necessary to build these nodes to be energy efficient in order to reduce the amount of energy used by the sensor node when the battery life is limited. In situations where a system must operate for a lengthy period of time on battery power, energy savings are critical.

Download Full Paper


2023 | Volume 02

January, 2023 | Volume 02 | Issue 01

Paper 1:Study of Type of images and Segmentation

Pankaj Kumar, Parth Kumar

Abstract:

More and more images, recordings, and illustrations are accessible to open with the fast advancement of electronic photography methods. It is easier to understand large amounts of data with the help of graphics and images. There are a number of elements that make up an image, known as picture elements or pixels, and these elements are what make up the image. The pixels are arranged in rows and columns according to a two-dimensional matrix, consisting of rows and columns of pixels.

Download Full Paper

Paper 2:A review of DC Micro-grid control Approaches

Mohd Shariq Ansari

Abstract:

A small dc grid has several benefits over a small ac grid and is better suited to accessing output power resources. With proper decoy methods, the dc bus voltage of the dc micro-grid should be regulated to prevent a revolving stream. This study presents four typical regulatory frameworks: breakdown control structure, stage control structure, and final control structure. Multiple agencies maintain an integrated administration system and a comprehensive administration structure. The power garage is critical for the regular functioning of a tiny dc grid. A power garage system that can sustain electricity supply supports the framework's dependability and proficiency, which is examined in this research.

Download Full Paper

Paper 3:An Observational Study: Ancient Approach on Bhasma as Principal Formulation of Rasashastra

Dr. Parul Rani, Dr Anil Kumar Varshney, Dr. Mandeep Jaiswal, and Dr. Nitin Sharma

Abstract:

Rasashastra, which deals with formulations based on minerals and metals, describes the manufacture of such medicines and their significant medicinal potential. To make these medications harmless and effective, particularly specialized processing methods are used during manufacture. The two fundamental processes involved in the creation of Rasa- Aushadhis are called Shodhana, which means purifying, and Marana, which means incineration/calcinations. The term "Bhasma Kalpana" refers to a preparation that is regarded to be herbo-metallic and is described in Ayurveda Samhitas from the Arsha Sampradaya. These herbal, mineral, and metallic formulations (Bhasma) are primarily made by several processes, including cleaning, grinding, combining, heating, incineration, and size reduction.These medications have the benefits of being palatable, having low dosage frequency, being very potent, having good bioavailability, having optimal absorption, and having a broad therapeutic spectrum. Bhasma is recommended for enhancing overall health and having revitalizing benefits in addition to being utilized for medicinal purposes. Commonly used bhasmas are Makshika bhasma, Swarna bhasma, Abhrak bhasma, Lauha bhasma, and Tamra bhasma. The bhasma is recommended for a variety of pathological illnesses, including as infections, skin diseases, digestive problems, and abnormalities of the sexual organs.

Download Full Paper

Paper 4:The Impact of social media on the Spread of Fake News and the Role of Machine Learning in Detection

Sushmita Goswami, Deepak Kumar Chaubey

Abstract:

he way people consume and share information has been significantly impacted by the proliferation of social media. Access to information has been democratized by social media platforms, but the spread of fake news has also been facilitated by them, which can have serious consequences for individuals and society. In this research paper, the impact of social media on the spread of fake news and the role of machine learning in detecting it are examined. The investigation of the impact of social media on the spread of fake news involves the review of existing literature and the provision of an overview of the different types of fake news and the factors that contribute to its spread. The potential consequences of fake news, including its impact on public opinion and its potential to fuel misinformation and extremism, are then explored. The role of machine learning in detecting fake news is delved into as well. An overview of the different machine learning techniques that have been used to identifying spurious information provided, and their effectiveness is evaluated. The potential biases that can be inherent in machine learning algorithms and the importance of human oversight in ensuring accuracy are also discussed. Finally, case studies of machine learning algorithms that have been developed to identifying spurious information news, including the work of researchers at institutions like MIT and Stanford, are presented. The effectiveness of these algorithms in detecting fake news is evaluated based on metrics such as accuracy and speed. Overall, the importance of understanding the impact of social media on the spread of fake news and the potential of machine learning algorithms to combat this problem is highlighted by our research.

Download Full Paper

Paper 5:Spending Tracker : A Desktop Application

Deepanshu Sharma

Abstract:

A spending tracker application is a piece of software created to assist people or organizations in keeping track of their expenditure and improving their financial management. Users can often manually enter their spending into this tool, categorize their expenses, and develop budgets or financial goals. We made an attempt to create the window programme so that the user would not have to exert much effort to use it. Users using Windows-based computers can use this programme. We utilize SQLyog Workbench and Java as the language databases to create this system. A GUI (Graphics User Interface) is used in this programme. You can download the application and utilise it if you use a Windows computer. Anyone can use this approach to manage their income and expenses, from daily necessities to annual expenses, also to monitor their spending. This programme is multilingual and very simple to use. This app's key feature is the ability to track by day and category. You might employ it in line with your category.

Download Full Paper

October, 2023 | Volume 02 | Issue 04

Paper 1:Simulation of Lid-Driven Cavity with Top and Bottom Moving Boundary Conditions using CFD

Souvik Maitya, Anjan Bhunia, Sribas Samanta, and Anupam Santra

Abstract:

CFD tools have a significant benchmark problem, and one of the most impressive tools is the lid-driven cavity. This study proposes a benchmark tool for CFD modeling of a lid-driven cavity with top and bottom changing boundary conditions. An unstable Navier-Stokes equation in a primitive variable formulation is employed as the governing equation. The implicit finite difference approach with fine meshing is used to solve the problem. As a result, a symmetrical vortex with half top and half bottom is formed. The Reynolds number was varied from 100, 500 and 1000. In this study, we also discuss the secondary vortex in particular situations. The velocity profile is also shown in quarter, half, and three-fourth full x and y axes.

Download Full Paper

Paper 2:The Critical Interpretation on Ahar (Food)-An Ayurvedic Prospective

Dr Saurabh Singh Yadav, Dr Shashank Nautiyal

Abstract:

Healthy diet is the foundation of a healthy life. The most significant aspect of existence is Aahar. Diseases and health are dependent on the Aahara. When taken correctly, Aahar can either promote improved health or cause sickness. For living things, food is the source of their Oja, power, life, and color. food in return. is derived from the six basic Flavors that are present in all foodcontaining ingredients. The unique tastes, characteristics, potencies, and digestive changes of the substances are what maintain the balance between dosha and dhatu. Food has a direct correlation to growth, health, complexion, and sensory awareness; inequity in nutrition leads to disease. According to Ayurveda, three characteristics of mind—Rajasika (quality of passion and manipulation), Tamsika (darkness, destruction), and satvika (quality of purity and harmony)—are supported and brought forth by food. The Satvik diet seems to be akin to a cautious, contemporary eating plan.

Download Full Paper

Paper 3:Hand Posture Detection and Mouse Controller

Lara Biswas

Abstract:

After the pandemic there is huge shift in technology field. The hand posture detection and mouse are one of those virtual technology research field. The virtual mouse controller has a functionality of the real mouse to let the user communicate with the system. It is a step towards Human Machine Interaction. Although there are different Bluetooth devices that perform the functionality of a mouse but it’s not completely physical free. This controller only requires a single hardware (webcam) that captures the frames, analyze them to predict the detection and perform mouse functionality using the gesture of user’s hand. This reduces the need of any external device to perform the functionality of the mouse and allows enhancing of computing experience.

Download Full Paper

July, 2023 | Volume 02 | Issue 03

Paper 1:Artificial Intelligence and Machine Learning for Healthcare Systems: A Study of COVID-19

Abdus Samad Ansari and Mohammad Faiz Umar

Abstract:

The COVID-19 global pandemic is a threat not only to the health of millions of individuals, but also to the stability of infrastructure and economies around the world. The disease will inevitably place an overwhelming burden on healthcare systems that cannot be effectively dealt with by existing facilities or responses based on conventional approaches. We believe that a rigorous clinical and societal response can only be mounted by using intelligence derived from a variety of data sources to better utilize scarce healthcare resources, provide personalized patient management plans, inform policy, and expedite clinical trials. In this work, we introduce five of the most important challenges in responding to COVID-19 and show how each of them can be addressed by recent developments in machine learning (ML) and artificial intelligence (AI). We argue that the integration of these techniques into local, national, and international healthcare systems will save lives, and propose specific methods by which implementation can happen swiftly and efficiently. We offer to extend these resources and knowledge to assist policymakers seeking to implement these techniques.

Download Full Paper

Paper 2:A Case Study on Spinal Canal Stenosis-An Ayurvedic Prospective

Vd. Sandeep Aggarwal, Dr. Balbir Singh

Abstract:

Usually a degenerative disorder, lumbar spinal stenosis affects the facets, joints, and ligamentum flavum of the vertebra. A typical cause of stenosis in younger people is a herniated disc. The patient in this condition feels the most discomfort in one direction, which is exacerbated by prolonged standing or lumbar extension. Although the region of stenosis determines how the pain is distributed in the lower limbs, discomfort is relieved when at rest. Based on similar clinical presentation, Ayurveda suggests that this illness may be connected to Gridhrasi. Observation - After completing the course of therapy, the patient reported relief from their Sharir Shoola, Stambha, and Spandan in Shakha symptoms, with a score of 4 (or 7.1%). The patient's "questionnaire" score was 20 (or 71%). The improvement on "The Spinal Cord Injury questionnaire" was 71%. When the patient began to experience noticeably more pain and suffering on the right side of the leg, Agnikarma and Kati Basti administered treatment on the painful point. Conclusion - Men are more prone than women to develop low back pain due to a number of etiological factors, and iatrogenic reasons are becoming increasingly common in addition to patient-related causes. This case involved hard work and a key cause of spinal canal constriction that hampered the patients' daily activities and caused them discomfort. The Ayurvedic-based technique had good therapeutic outcomes in a setting where surgical surgery is often suggested.

Download Full Paper

Paper 3: The Resilient Organization: How Leadership and Employee Resilience Drive Work Performance

B. Deepa Shree, Prof. R. Renisha Jerine

Abstract:

In the ever-changing and rapidly changing IT business environment, organizational performance is more important than ever. These resilient organizations have two components: leadership and employee engagement. This study aims to examine the relationship between employee empowerment and leadership and how this affects their work. The sample consists of adults aged 18 and over, including men and women from a variety of IT industries. To assess leadership skills, Peter G. created a Leadership Questionnaire. Northouse was used. It consists of 18 questions. For the examination of employee resilience, the Employee Resilience Scale (EmpRes) by Näswall, K., Kuntz, J., and Malinen, S. (2015), a 9-item scale, and the Employee Resilience in Organizations Scale by Amir & Standen (2012), a 15-item scale, were used. Finally, for work performance, the Individual Work Performance Questionnaire by Koopmans (2015), which contains 18 questions, was used. Research data was collected using probability sampling and regression analysis. Measure employee resilience and leadership using a large IT model. This measure focuses on actual reliability and validity. These findings may indicate that the employee's ability and leadership to perform well are related to his or her performance; Therefore, psychological interventions such as resilience training and leadership training can help improve people's performance.

Download Full Paper

Paper 4:Social Media Truculence In Early Adulthood Leads To Loneliness

B. Deepa Shree and Prof. R. Renisha Jerine

Abstract:

In general, it has been observed that people are highly prone to social media attention. People tend to project themselves way better than they are and hesitate to portray who they actually are. This study examines social media truculence in early adulthood, leading to loneliness. The sample comprises 113 young adults around the age group of 18 to 25 which includes 33 males and 80 females. To examine social media truculence, social networking addiction scale SNAS is used. 2020, M.G. Updated by. Shahnawaz and Usama Rehman. It consists of 21 questions and includes items such as expectation, emotional regulation, resilience, withdrawal, conflict and recovery. The UCLA Loneliness Scale was used to assess loneliness. Edited by: Russell, D, Peplau, LA & Ferguson, revised 1996. It consists of 20 questions designed to understand the psychology of loneliness. Snowball data collection method was used to collect data. Impact analysis shows the importance of anti-social behavior and loneliness. Interventions to reduce personal use of social media may help reduce loneliness. In addition to being addicted to social media and social networking sites, this study shows that people who participate in social networking sites tend to be lonelier, while those who use social networking sites tend to experience more loneliness. The findings showed a positive relationship between conflict and loneliness.

Download Full Paper

April, 2023 | Volume 02 | Issue 02

Paper 1:Decision Support System by Means of Virtual Assistant

Nishi Srivastava and Yogendra Pratap Singh

Abstract:

Virtual assistants are very useful to humans these days. It makes people's lives easier, just like operating a PC or laptop with just voice commands. The use of a virtual assistant is basically to save time. We can also perform other tasks and save time by using virtual assistants. Most popular of the time, virtual assistants are cloud-based application which needs an internet- connected device. Virtual assistants have freedom to pay for the services provided which they can actually require. By speaking, users may ask their assistant questions, manage all the basic activities like emails and to-do lists, open or dismiss any app, message anyone on WhatsApp, and more. Voice commands are now the sole way to operate home automation devices and media playing. Intelligent personal assistants, automated personal assistants, virtual digital assistants, and chatbots are some other varieties of voice assistants. In this paper, we have created a voice assistant that can successfully accomplish out other task, including changing user commands. There some features added in the support which is helpful to it, the fact that it just listens to the user’s voice and isn't get triggered by the noise of background. This project is more adaptable in nature and easy to grasp because of its modular structure. Without affecting functionality, we can increase functionality of the programs. This code is written using the VS Code integrated development environment (IDE), which has all the necessary loaded packages which are used for the Python programming language. The project's Python version is 3.x, and the data for several noises are attained from the virtual environment.

Download Full Paper

Paper 2: Consumer Sentiment Analysis Using Deep Learning

Neha and Yogendra Pratap Singh

Abstract:

This research focuses on sentiment analysis of Twitter data using various AI algorithms. The study explores the potential of decision trees for sentiment classification and examines the importance of emotion analysis in understanding public opinions. Challenges in sentiment analysis are discussed, including handling vague statements, expanding sentiment categories, and integrating image processing techniques. Future directions include developing web applications for user-friendly sentiment analysis and incorporating multimodal analysis to capture emotions from multiple sources. The findings underscore the significance of sentiment analysis in diverse fields like marketing, customer feedback analysis, and social research.

Download Full Paper

Paper 3: E-Commerce As a Tool for Economic Empowerment and Poverty Reduction

Gaurvi Shukla

Abstract:

TE-Commerce refers to the selling and buying things and services through the internet services. It has grown as a powerful tool for the economic growth of country and reduction of poverty of nation. Through this revolution the businesses of country have transformed and changed the way in to interact with customer. It offers numerous benefits for worldwide nation.

Download Full Paper


2024 | Volume 03

January, 2024 | Volume 03 | Issue 01

Paper 1:Government Agreement Impact of Export-Growth Relationship in India Region

Dimple Pappu Kumar Upadhyay

Abstract:

There is much debate about the impact (positive or negative) of regional trade agreements, trade agreements and free trade agreements. Many organizations today are trying to analyze whether there is a relationship between exports and India's overall development and whether the implementation of the agreement has led to change (good or bad). According to the export convention, Exports stimulate growth, but growth does not lead to the creation of exports. However, with the emergence of export contracts, this relationship was reversed and the relationship seems strong. In addition, in the pre-market contract, although exports lead to growth, their impact on growth is not significant; After the agreement, the government's GDP leads to exports, and this relationship is significant and negative (an increase in GDP leads to a decrease in exports). In this paper, we attempt to examine the causal relationship between exports and growth in India, with particular emphasis on the impact of the introduction of various agreements that put this relationship into business.

Download Full Paper

Paper 2:A Comparative Study of the current National Education Policy and National Policy on education 1986

Ragini Dixit

Abstract:

The very new policy of education in India that is NEP 2020 was accepted by the Human Resource Development as the Education Ministry of India on 29/07/2020. The Ministry of Human Resource Development has invited Dr. Director of ISRO to ask his vision for India's new education service. The committee was formed under the chairmanship of Kasturiranga. The new education policy addresses the problems facing the existing education system, such as excellence, access, evenhandedness, opportunity, and responsibility. NEP 2020 foresees an education service in India that provides quality education to all and straight contributes to making our country a smart, just, and empowered society.

Download Full Paper

Paper 3:Metaverse in Education: Beyond the Realm of Games and Entertainment

Gaurvi Shukla

Abstract:

To explain the application and challenges along with opportunities in metaverse here, we study different methods like mirror world, VR, lifelogging and AR. It creates a space for new education that provides the space to share innovative ideas for Gen Z. Possibility of impingement and weak social connection may be the limitation of metaverse. Beyond the world of games and entertainment metaverse play a vital role in education and improve the economy. While adopting metaverse for education we should keep in mind the privacy of data while developing projects and setting standard for class where augmented reality works effectively and collaboratively.

Download Full Paper

Paper 4:Impact of E-Commerce on Consumer Buying Behavior

Dr. Shalini Lamba, Atif Moin, and Desh Deepak Kushwaha

Abstract:

The use of electronic commerce, or e-commerce, has transformed a number of industries, including retail, business-to-business partnerships, procurement procedures, and customer service [1]. With the increasing popularity of online shopping, it is critical to understand consumer behaviour in this area. This paper explores the world of e-commerce, specifically online purchasing, with an emphasis on consumer attitudes, levels of satisfaction, and obstacles faced during the process. It looks at patterns of customer behaviour through a survey study, with the goal of offering quantitative insights into the rise of internet purchasing and how it affects consumer behaviour. The study emphasizes how important perceived risk and trust are in influencing consumers' decisions to buy online, with security and privacy issues being major determining factors. Beyond simple transactions, e-commerce is radically changing global business environments and lives, bringing in a new era with significant ramifications for numerous economies and businesses around the world. Therefore, it is critical for businesses navigating this dynamic terrain to stay up to date on developing trends and customer habits in e-commerce.

Download Full Paper

Paper 5:Analysis of SkillSphere: A Global Freelance Marketplace offering digital services to Customers

Avinash Yadav, Gunjan Mishra, Kartik Sharama, Alok Singh

Abstract:

In today's digital economy, online platforms such as emerged as pivotal hubs for freelance work, facilitating a diverse range of services across various domains. This paper presents a comprehensive analysis, focusing on the intricate dynamics of freelancer expertise and market trends within the platform. Furthermore, through sentiment analysis and user feedback examination, delve into the quality perception and satisfaction levels associated with that services. Our findings reveal the nuanced interplay between supply and demand factors, highlighting the influence of skill specialization, geographical location, and platform reputation on freelancer success. Moreover, identify emerging trends and potential implications for both freelancers and clients navigating the ecosystem. By offering insights into the evolving landscape of online freelance markets, this research contributes to a deeper understanding of digital labor dynamics and informs strategic decision-making for stakeholders operating within these platforms

Download Full Paper

Paper 6:A Comparative Study of debate speech analysis using Argumentation Mining in LLMs

Shweta Agarwal, Megha Agarwal, and Shobhit Sinha

Abstract:

IArgument mining (AM) is an automated course of mining arguments, their mechanisms, and relationships from textual data. As online debate platforms become increasingly prevalent, there is a growing demand for effective AM techniques, particularly to support subsequent analytical tasks. One specific area within AM is Relation-Based Argument Mining (RbAM), which aims to identify agreement (support) and disagreement (attack) relationships among arguments. However, RbAM presents significant challenges, and existing methods often fall short of achieving satisfactory performance in this domain. Our experiments focus on two open-source LLMs, namely Llama-2 and Mistral, which consist of ten files each. By harnessing the capabilities of these LLMs, we aim to address the limitations of current RbAM methods and pave the way for more effective and efficient argument mining techniques. Our findings underscore the potential of LLMs in advancing the state-of-the-art in RbAM and contribute to the broader goal of enhancing argument understanding and analysis in the era of online debates and discussions.

Download Full Paper

April, 2024 | Volume 03 | Issue 02

Paper 1: The art of Data Analysis: Review on Essential, Techniques and Methodologies

Dr. Shalini Lamba, Harsha Sahni and Aanya Sharma

Abstract:

This paper provides a comprehensive overview of the key processes and methodologies in data analytics, with a focus on knowledge discovery in databases (KDD). It explores the evolution of data analytics and its importance in today's data-driven world. The paper discusses the significance of each KDD operator, including selection, preprocessing, transformation, data mining, and interpretation/evaluation, in shaping the outcomes of data analytics processes. Through a detailed examination of these operations, the paper highlights the essential role of data analytics in gathering, analyzing, and presenting insights derived from data. Furthermore, the paper explores the challenges and advancements in big data analytics, emphasizing the importance of understanding computational complexities, informationsecurity, and computational methods for effective data analysis.

Download Full Paper

Paper 2: Beyond Cryptocurrency: Harnessing Blockchain for Cybersecurity

Dr. Shalini Lamba, Jatin Awasthi and Vikas Yadav

Abstract:

This paper aims to explore the role of blockchain in strengthening cyber security. In an era where cyber threats are at its peak, the blockchain technology has come out as a promising method to strengthen the defenses of cyber security. This paper highlights the impact of blockchain technology on cyber security. The paper starts by explaining the basics of blockchain and will then discuss its various key features when integrated with cyber security such as secure data storage and processing, user confidentiality, decentralization and many more. But using blockchain also has some limits such as scalability issues, regulatory issues etc. which are also discussed in this paper. At last, the conclusion will summarize the benefits of integrating blockchain technology with cyber security and what the future holds.

Download Full Paper

Paper 3: Enhancing Learning Through Intelligent Tutoring System: A Step Towards Smarter Education

Aditya Pandey, Abhishek Kumar,and Mrs. Shweta Sinha

Abstract:

Intelligent Tutoring Systems (ITS) have emerged as a promising tool for revolutionizing traditional educational paradigms by providing personalized and adaptive learning experiences. This paper explores the role of ITS in enhancing learning outcomes and advancing towards smart education. By leveraging artificial intelligence and machine learning algorithms, ITS can analyze students' learning behaviors, preferences, and performance to tailor instructional content and feedback in real-time. Such personalized interventions have been shown to improve student engagement, motivation, and knowledge retention. Additionally, ITS can facilitate continuous assessment and progress tracking, enabling educators to identify and address learning gaps more effectively. Furthermore, the integration of ITS into educational environments promotes active and self-directed learning, empowering students to take ownership of their learning journey. Despite the numerous benefits, challenges such as designing user-friendly interfaces, ensuring data privacy, and addressing equity concerns need to be addressed for widespread adoption of ITS. This paper concludes by discussing future directions and implications for the integration of ITS into educational practices, emphasizing the transformative potential of ITS in fostering smart education initiatives..

Download Full Paper

Paper 4: Impact of Blockchain in Social Networks

Rinku Raheja , Shagun Awasthi, Akashay Kumar Singh

Abstract:

This study explores the potential impact of blockchain technology on social networks. As social media evolves, so does the technology supporting it. Originally a tool for connecting people, social media has transformed into a platform for expressing opinions, promoting businesses, launching campaigns, and offering new career opportunities. With this evolution comes increased concerns regarding data security, privacy, and trust. Blockchain, known for its decentralized and immutable ledger, offers innovative solutions to address these concerns, thereby safeguarding freedom of speech and expression on social media platforms. While decentralized social media platforms also provide opportunities for users to earn cryptocurrencies, they are susceptible to criminal activities, necessitating regulations to ensure benefits outweigh harms. This study examines blockchain's applications in social networks, focusing on its impact on data protection, user empowerment, and the creation of decentralized social platforms, emphasizing trust, security, and user control.

Download Full Paper

Paper 5: AI-Powered Solutions in Healthcare and Transportation Overcoming Challenges and Shaping the Future

Mahesh Kumar Tiwari and Aditya Saxena

Abstract:

In current years, Artificial Intelligence (AI) has emerged as a transformative force, reshaping industries and revolutionizing conventional practices. In the domain of healthcare and transportation, AI holds great promise for advancing the quality, efficiency, and accessibility of services. This research paper explores the frontier of AI destiny improvements in healthcare and AI-powered transportation, delving into the contemporary improvements, challenges, and moral considerations. In healthcare, AI-pushed answers which include deep learning-primarily based totally scientific picture analysis, predictive modelling of affected person outcomes, and personalised remedy are paving the manner for greater correct diagnoses, personalised treatments, and progressed affected person care. Simultaneously, in transportation, AI is riding improvements in self- reliant vehicles, shrewd site visitors control systems, and concrete mobility answers, promising safer, greater efficient, and sustainable transportation networks. However, the huge adoption of AI in those domain names increases moral worries surrounding privacy, bias, cybersecurity, and public perception. Through a complete analysis, this paper goals to offer insights into the modern kingdom of AI in healthcare and transportation, even as additionally dropping mild on destiny trajectories and the results for studies, practice, and policy.

Download Full Paper

Paper 6: Mindful Scrolling: Nurturing Mental Health through Digital Citizenship in the Digital Deluge

Amit Srivastava, Devansh Saxena and Nitin Dwivedi

Abstract:

This research paper explores the concept of mindful scrolling as a means of nurturing mental health and promoting digital citizenship in the digital age. By examining the impact of excessive screen time and social media use on mental health, the benefits of mindful scrolling, and the role of digital citizenship, this paper offers strategies for maintaining a healthy balance between online and offline life. The findings highlight the importance of being present, setting boundaries, and practicing responsible online behavior for mental well-being. In our increasingly digital world, where screens dominate our walking hours, the concept of mindful scrolling emerges as a beacon of hope for preserving mental well-being. This abstract delves into the intersection of digital citizenship and mental health, exploring how intentional engagement with online content can positively impact our psychological state.

Download Full Paper

Paper 7: A COMPREHENSIVE EXAMINATION OF SUPPLY CHAIN APPLICATIONS INTEGRATING BLOCKCHAIN TECHNOLOGY AND ARTIFICIAL INTELLIGENCE

Mr. Rinku Raheja, Mr. Mahesh Tiwari, Manas Mehrotra and Ayush Kumar

Abstract:

The admixture of blockchain technology and artificial intelligence( AI) has garnered significant interest in recent times, primarily due to the eventuality for enhancing the security, efficacity, and productivity of operations within business settings that are marked by oscillations, unpredictability, intricacy, and vagueness. Supply chains, in particular, have been demonstrated to gain a great deal from blockchain and artificial intelligence. These technologies ameliorate information and process adaptability, grease briskly and more provident product delivery, and increase product traceability, to name a many benefits. This exploration does a slice- edge force chain analysis of blockchain and artificial intelligence. More precisely, we aimed to respond to the following three main queries Q1 What studies are now available on the integration of blockchain and artificial intelligence in force chains? Q2 What use cases for blockchain and AI are presently being delved in force chains? Q3 What avenues of exploration could be pursued in the future for studies involving the integration of blockchain and AI? Through the integration of blockchain and artificial intelligence, this paper's analysis has linked material exploration works that have conceptually and empirically contributed to the growth and accumulation of intellectual value in the force chain discipline.

Download Full Paper

Paper 8: Data Mining with Big Data Analysis Algorithm Tools, Application and Challenges

Dr. Shalini Lamba,, Shivam chaurasiya

Abstract:

Organizations now days gather and store vast volumes of data in the hopes that it may be valuable later. Big data can be utilized by enterprises to accomplish a range of goals where success depends on astute analysis, in addition to seeking greater insights for enhancing the quality of their services and profit. Measure mistakes, noise accumulation, spurious correlation, scalability or storage bottlenecks, and other special computing or statistical problems are brought about by big data. These problems are unique and need for a modern statistical and computational framework. This paper presents the literature criticism about the Big data Mining and the problems and challenges including emphasis on the distinguished features of Big Data. It also covers a few strategies for working with large amounts of data. An overview of big data, including its type, source, and features, is provided in this work. This research also includes an assessment of several large data mining platforms, techniques, and problems. However, big data also brings with it a number of obstacles, including those related to data storage, analysis, visualization, and capture. The purpose of this article is to provide an in-depth understanding of big data, including its applications, opportunities, and challenges. It also aims to showcase the cutting-edge approaches and technology that we now use to address big data issues.

Download Full Paper

Paper 9: Apply different Efficient Data Extraction Techniques in real world application

Aman Yadav, Princy Srivastava, and Dr. Anil Kumar Pandey

Abstract:

In this research paper, we are performing data extraction by using Efficient Data Extraction Techniques tool for the headache-free manner. We inspect various strategies for extracting valuable information form huge amounts of data. These techniques use from simple rules to more modern methods involving smart machines that can learn on their own. These tool work to save us time and effort by extracting the essential information of bits from the very large data landscape.

Download Full Paper

Paper 10: Bug Reconnaissance Tools – SQLi and XSS Recon Tools

Pankaj Mourya

Abstract:

The creation of a sophisticated XSS and SQL Injection bug detection tool with the goal of improving online application security is presented in the aforementioned study. Comprehensive technologies that can successfully identify and mitigate such risks are critically needed, especially given the constant danger landscape these vulnerabilities pose. Our method ensures a comprehensive check for XSS and SQL Injection vulnerabilities in web applications by combining automated scanning techniques with human verification. The tool contains novel methods of evading detection and circumventing security barriers, allowing for robust surveillance in a variety of contexts. Our tool's effectiveness and adaptability in identifying and addressing XSS and SQL Injection vulnerabilities are proven by means of extensive testing and assessment. The results emphasize the value of cutting-edge reconnaissance technologies in supporting web application security and offer developers and security experts useful information. This work adds to the continuing endeavors to improve web application security and lessen the dangers associated with SQL Injection and XSS vulnerabilities.

Download Full Paper

Paper 11: Cybersecurity Paradigms: Trends, Threats and Solutions

Mr. Amit Srivastava, Ridhima Manni, and Ankita Pawar

Abstract:

In an era dominated by digital interactions, this research delves into the intricate web of cyber security, cybercrime, and the pivotal role of social media, with a keen eye on ethical considerations. As cyber threats continue to evolve, understanding the dynamics of cyber security becomes imperative. The study explores the escalating landscape of cybercrime, particularly in the context of social media platforms, which serve as breeding grounds for diverse cyber threats. Additionally, it investigates the ethical dimensions of cybersecurity, emphasizing the importance of responsible online behavior and adherence to ethical standards. This interdisciplinary exploration aims to unravel the complexities of safeguarding digital spaces, balancing technological fortification with ethical principles. In navigating the digital realm, the synergy of cyber security, cyber ethics, and social media resilience emerges as a linchpin for a secure and trustworthy online environment.

Download Full Paper

Paper 12: Interpretation of Huge Mobile Data Science using Handover Approach

Ambrish Kumar Mishra, Bineet Kumar Gupta, Satya Bhushan Verma

DoI: https://doi.org/10.5281/zenodo.12057472

Abstract:

Enabling seamless connectivity through user mobility is a critical challenge in mobile heterogeneous networks (HetNets). Future deployments of Fifth Generation (5G) and other mobile networks are predicted to exacerbate the situation and result in Ultra-Dense HetNets. The use of millimeter waves (mm Waves), the exponential growth in connected mobile devices, overlapping network deployments, and the utilization of dual High mobility speed possibilities are supported by connectivity (DC), carrier aggregation (CA), the proliferation of connected drones, and the widespread deployment of tiny cells. These are only a handful of the important elements that are behind this. There will thus be a higher probability of changeover failure, handover ping-pong, unnecessary handovers, interruption delays, and throughput degradation. The exponential growth in mobile connections is another expected challenge for next-generation mobile networks. The amount of linked mobile devices is increasing exponentially.IoT devices are also multiplying in number. A ubiquitous connection and additional network capacity will be required once a large number of mobile devices are added. Therefore, in organize to increase connectivity and decrease coverage gaps, it is recommended that various types of micro cells be employed in mobile networks in the future.

Download Full Paper

July, 2024 | Volume 03 | Issue 03

Paper 1: A Review On the Research Development In Autonomous Vehicles: Self-Driving Cars

Khushi Maurya , Rishita Tiwari and Shweta Sinha

Abstract:

Autonomous driving is a profoundly ambitious project that doesn’t necessitate a human intervention to supersede power and has become an area of increasing fascination for service superseders, the industry, infrastructure corporations, and academia. Its development is interwined with e-mobility and voluntary portability concepts such as sharing a car. It could be a focalizer for technological innovations within the car sector. This paper examines an extensive expedition of the realm of auto-vehicles(AVs), exploring deep into their technological foundations, social consequences, and the evolving framework. In this paper, we discuss the technologies essential to build an AV, while also tackling critical obstacles and opportunities in the constantly advancing locomotion ecosystem. Public opinion and approval of autonomous driving are crucial for their successful social integration. This section explores the factors affecting public perceptions towards AVs and proposes ways for augmenting acceptance. We present self-driven cars featuring wide range of intelligent behaviors, including seamless trajectory generation, and examine tracking, lane changing and lane keeping; intersection processing, whether involving pedestrian, bicycle, and work zone detection, hasn’t been explicitly trained to identify road features, for example. However, the study highlights the technical difficulties in ensuring auto-vehicles safe. Research is currently in progress to lay the foundation for subsequent research and these identified potential vulnerabilities must be addressed as technology and vehicles advance. Aside from innovative challenges, on-screen characters in these frameworks must also bargain with economical, ethical, cybernetic, societal, lawful, and biological issues.

Download Full Paper

Paper 2: Methods based on several features of wireless sensor network clustering employing machine learning, optimization, and classical techniques: Review, taxonomy, discoveries from research, difficulties, and upcoming paths

Km Anjuman Bano and Sushil Kumar Sharma

Abstract:

Wireless Sensor Networks (WSNs) are pivotal in various applications ranging from environmental monitoring to smart cities. Clustering in WSNs is a crucial strategy for optimizing energy consumption, enhancing network longevity, and improving data aggregation efficiency. This paper presents a comprehensive review of clustering methods in WSNs, focusing on techniques incorporating machine learning, optimization, and classical approaches. We provide a detailed taxonomy of these methods, highlight significant research discoveries, discuss the challenges encountered, and propose potential future research directions

Download Full Paper

Paper 3: Mental Health Prediction Using Machine Learning Algorithms

Vishakha Pathak, Kanishka Dwivedi and Mahesh Kumar Tiwari

Abstract:

Different mental health issues, such as depression, stress, anxiety, and others, affect life in such a way that it is difficult for personal and professional life to not get severely ruined if not treated on time. The immediate recognition of the condition will ensure proper and best treatment for the patient so that they get the benefit of good health. This research applies Random Forest Classifier, Logistic Regression and Decision Tree Algorithms to evaluate their precision in mental health problem prediction and the stoppage of stress becomes the focus. The evaluation and comparison of their performance are, therefore, useful in bringing out the most reliable way to ensure early intervention for enhanced mental health and support for improved outcomes.

Download Full Paper

Paper 4: Exploring Blockchain Scalability: Techniques and Emerging Technologies

Khushi Naithani, Ayushi Gupta, Rinku Raheja

Abstract:

Blockchain systems have attracted considerable interest because of their applicability in numerous fields, but the system-level scalability is a major constraint restricting the use of blockchain technology. In this paper, the author examines the scalability solutions available in the modern world by examining the layers of the blockchain architecture, which are the Layer-0, Layer-1, and Layer-2. Other solutions like sharding, block compression, and privacy-preserving computation were suggested and still, there are no effective solutions that could solve all present issues with blockchain system scalability. Based on the findings of this paper, several open issues and directions for further research have been described which are as follows: The dissemination protocol should be further optimized, more efficient leader election algorithms should be developed, several incentive and punishment schemes should be more enhanced, and more robust quantitative models for evaluating the efficiency of blockchain should be established. Thus, the findings underlined that only the combination of advancements at several levels is possible to create a large-scale, secure, and decentralized blockchain environment.

Download Full Paper

Paper 5: From Narrow to General: Rethinking Benchmarking for Artificial General Intelligence

Ansh Tiwari, Ashmit Dubey, Mahesh Kumar Tiwari, Rinku Raheja

Abstract:

Artificial General Intelligence (AGI) represents the ultimate goal of AI research: in order to develop systems that possess cognitive characteristics similar to those of the human brain and can effectively solve problems in different fields without the need of being trained for a specific type of work. But there are numerous issues that attend the pursuit of AGI, one of which is that benchmark that are adequate comprehensive measures to track the progress towards this goal are absent. The current kinds of evaluation, which have received most of their evolution within the establishment of narrow AI, do not perform adequately when applied to AGI. The focus of this research paper is a historical perspective of the significance of AI assessment with focus on the modern techniques which aimed at proving the AI’s ability to think more widely. It discusses some of the inherent flaws present in existing benchmarks like biased sampling, overfitting and the so called “AI effect” in which solved tasks no longer measure intelligence. Looking at these challenges, this paper seeks to present the criteria towards formation of better benchmarks for the complexity and the range of capabilities needed in AGI.

Download Full Paper

October, 2024 | Volume 03 | Issue 04

Paper 1: Practical Approach Of Genetic Edge

Apurva Tiwari , Khushi Maurya and Mahesh Kumar Tiwari

Abstract:

The greedy algorithm effectively solves the Fractional Knapsack Problem (FKP) in linear scenarios. However, the problem's complexity increases, and the greedy approach fails to yield optimal solutions when additional constraints, such as weight and risk, are introduced. Our previous theoretical study highlighted the limitations of the greedy method in such multi-constraint environments. This paper presents the real-world application of a Genetic algorithm for these challenges. The FKP is not like 0-1 Knapsack problem, it allows fractional item selection offering greater flexibility in practical applications. The proposed GA optimizes item selection based on value while ensuring that both capacity and risk constraints are met. Experimental results validate the GA's effectiveness, producing optimal solutions with maximum value and controlled risk thresholds.

Download Full Paper


2025 | Volume 04

January, 2025 | Volume 04 | Issue 01

Paper 1:Building Back Stronger: A Strategic Model for Post-Supply Chain Attack Management

Shatakshi Singh, Shruti Trivedi, and Rinku Raheja

DOI: https://doi.org/10.5281/zenodo.14932577

Abstract:

In today's fast-paced, interconnected world, supply chains are essential to the smooth operation of any business. Yet, with this increased connectivity comes a hidden risk: vulnerabilities that cybercriminals are all too eager to exploit. Supply chain attacks, where attackers target the very systems and networks that companies rely on, have become more common, leading to disruptions, loss of sensitive data, and significant financial strain. These attacks are not only growing in frequency, but they are also becoming increasingly sophisticated, making it clear that prevention alone is no longer enough. Companies need a plan for what comes next – a way to recover quickly and learn from the experience. This paper delves into the growing threat of supply chain attacks and introduces a post-recovery model designed to help businesses manage the aftermath. By focusing on rapid recovery, strengthening security, and fostering long-term resilience, this model enables businesses to recover effectively and emerge more prepared for future challenges. In a world where things can change in an instant, it’s not just about preventing an attack – it’s about knowing how to recover and emerge even stronger when the unexpected happens.

Download Full Paper