Manuscripts

Recent Papers

Dissertations

A Support Vector Regression Model for Air Quality Prediction in Lucknow

Air quality significantly impacts public health, particularly in urban areas like Lucknow, where deteriorating air quality has been linked to severe health issues, especially in children and vulnerable groups. Accurate air quality prediction allows authorities to implement timely measures to shield these populations from harmful exposure. A lack of comprehensive data and robust algorithms has limited traditional forecasting methods. This study employs a Support Vector Regression (SVR) model to forecast pollutant levels and the Air Quality Index (AQI) in Lucknow using publicly available historical data from the Central Pollution Control Board (CPCB) and local monitoring stations. Among various configurations, the SVR model with a Radial Basis Function (RBF) kernel showed superior performance, achieving an accuracy of approximately 93.4%. Utilizing all available variables rather than relying on feature selection methods like Principal Component Analysis (PCA) improved prediction outcomes. The model effectively forecasts key pollutants, including sulfur dioxide (SO2), carbon monoxide (CO), nitrogen dioxide (NO2), particulate matter (PM2.5 and PM10), and ground-level ozone (O3). This research demonstrates the potential of advanced machine learning techniques to address air quality challenges in Lucknow, offering valuable insights for policymaking and urban environmental management.

Published by: Vivek Chauhan, Rahul kumar, Dr. Nidhi Saxena

Author: Vivek Chauhan

Paper ID: V10I6-1425

Paper Status: published

Published: December 21, 2024

Full Details
Research Paper

FastMonitor: Enhancing Data Access Control with Zero-Trust Architecture

As organizations grapple with the escalation of data breaches and sophisticated cyber threats, ensuring robust and adaptive data access control has become a top priority. Traditional perimeter-centric security frameworks, once the backbone of enterprise protections, have increasingly shown limitations against evolving adversarial tactics. In response, Zero-Trust Architecture (ZTA) has emerged as a dynamic paradigm, rejecting implicit trust and demanding continuous verification of every access request. This article introduces FastMonitor, a data-access control solution designed to operationalize ZTA principles to their full potential. Introduced in June 2022, FastMonitor rigorously authenticates and authorizes each data access request, consolidating granular policies, comprehensive audit trails, and real-time monitoring into a single coherent system. By bridging theoretical concepts of ZTA with practical enforcement mechanisms, FastMonitor significantly mitigates unauthorized access, supports compliance with stringent regulatory frameworks, and strengthens organizational resilience. This study elucidates the architectural design of FastMonitor, demonstrates its capacity to enhance security in sectors as diverse as healthcare and automotive, and examines its role in fostering greater national cybersecurity readiness.

Published by: Frank Mensah

Author: Frank Mensah

Paper ID: V10I6-1453

Paper Status: published

Published: December 21, 2024

Full Details
Review Paper

Zero Trust Architecture: A Comprehensive Review of Principles, Implementation Strategies, and Future Directions in Enterprise Cybersecurity

In an era characterized by digital transformation and increasingly sophisticated cyber threats, traditional perimeter-based security models have become inadequate for safeguarding modern enterprise IT infrastructures. Zero Trust Architecture (ZTA) emerges as a pivotal paradigm shift, fundamentally redefining organizational cybersecurity by eliminating implicit trust and enforcing continuous verification of every access request. This review paper provides an in-depth examination of ZTA, tracing its evolution from foundational principles articulated by Forrester Research and the National Institute of Standards and Technology (NIST) to its contemporary extensions addressing the complexities of diverse and decentralized digital environments. Key components of ZTA, including context-aware and continuous authentication, device authentication, and robust encryption mechanisms, are meticulously analyzed to elucidate their roles in enhancing security posture. The paper also explores the logical architecture of ZTA, highlighting the interplay between Policy Engine, Policy Administrator, and Policy Enforcement Points, which collectively enforce stringent access controls and monitor ongoing activities. Despite its advantages, the implementation of ZTA presents significant challenges, such as integration with legacy systems, operational overhead, and vulnerabilities related to policy decision processes and insider threats. Best practices for successful ZTA adoption are discussed, emphasizing comprehensive asset inventory, strong identity and access management, micro-segmentation, continuous monitoring, and phased implementation approaches. Furthermore, the review identifies emerging trends and future directions, including the integration of ZTA with 5G networks, Internet of Things (IoT), edge computing, artificial intelligence, machine learning, post-quantum cryptography, and blockchain technology. By synthesizing insights from recent studies and industry frameworks, this paper aims to provide a holistic understanding of Zero Trust Architecture, offering valuable guidance for organizations seeking to enhance their cybersecurity resilience in an ever-evolving digital landscape.

Published by: Frank Mensah

Author: Frank Mensah

Paper ID: V10I6-1452

Paper Status: published

Published: December 21, 2024

Full Details
Research Paper

Web Application for Paying Guest Accommodation System using Laravel Framework

The online paying guest system allows users to access a variety of lodging options near their work or desired location. In today’s digital age, web applications for rental purposes are including room accommodations, paying guest services, food services, and other daily needs are scattered across various platforms with separate modules. These modules can be complex and disjointed, making the process time-consuming and cumbersome. To address these issues, a unified solution is needed where users can manage and modify their rental accommodations efficiently using the Laravel tool for system design management. Overall, these advancements in web applications have greatly simplified the process of finding accommodations and accessing various rental services, Indeed, the convenience and flexibility offered by these online platforms have revolutionized the way people search for accommodations

Published by: Dr.K.Manikandan, Mrs.P.Caroline Priyanka Evelyne

Author: Dr.K.Manikandan

Paper ID: V10I6-1435

Paper Status: published

Published: December 18, 2024

Full Details
Research Paper

An Outlook on Polynomials

This study explores the complexity and relevance of teaching polynomials in mathematics education. By conducting a literature review and a small informal survey among students across various grades, the research examines their experiences and challenges in understanding polynomials. The findings highlight that many students perceive polynomials as one of the more difficult topics in mathematics. Furthermore, the practical applications of polynomials appear to be limited to specialized fields such as engineering, raising questions about their broader utility for most students. The study concludes that while polynomials have specific applications, their complexity may outweigh their benefits for general use in mathematics education, suggesting a need to reevaluate their emphasis in the curriculum.

Published by: Aatish Deepak Daryanani

Author: Aatish Deepak Daryanani

Paper ID: V10I6-1439

Paper Status: published

Published: December 18, 2024

Full Details
Research Paper

Metaverse: The Future of Recruitment and Talent Engagement

The Metaverse represents a groundbreaking frontier in recruitment, offering virtual environments that transcend geographical boundaries and reimagine the hiring process. This paper delves into the utilization of the Metaverse in recruitment, highlighting its transformative potential, key functionalities, and measurable impacts. By leveraging real-world data, we explore how organizations are capitalizing on this immersive technology to attract top talent, streamline operations, and enhance candidate experiences.

Published by: Aakash V

Author: Aakash V

Paper ID: V10I6-1427

Paper Status: published

Published: December 16, 2024

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X