Manuscripts

Recent Papers

Review Paper

Chrome extension to detect malicious URLs using support vector machine algorithm

There are a vast number of domains that leads the user to phishing websites for tricking the user to steal their sensitive information or inject malware into the system. In this paper, we will discuss about the support vector machine algorithm and how we have used the weights associated with each attribute of the trained SVM model in a chrome extension. This tool will identify the nature of the URL and avert the users from becoming a victim of phishing attack by notifying the user about the malicious URL on each page load via an alert box as safe or unsafe URL.

Published by: Dev Kumar, E.DeepanKumar, Aarya D Roy, Aftab Alam, Harsh Vardhan

Author: Dev Kumar

Paper ID: V10I1-1252

Paper Status: published

Published: March 14, 2024

Full Details
Research Paper

Cyber security and government: safeguarding the public sectors in the digital era

This publication emphasizes the critical importance of bolstering cybersecurity in the public sector due to the increasing reliance on digital technologies and the significant risks posed by cyber threats. It discusses the vulnerability of government agencies to cyberattacks, highlighting examples such as the OPM breach, the Colonial Pipeline ransomware attack, and the Solar Winds supply chain attack amongst others. The public sector's vulnerability to cyber threats is attributed to factors such as the wealth of sensitive data it holds, outdated technology and security measures, and the potential for public disclosure that can lead to widespread impact and public scrutiny. Moreover, geopolitical strategies and cyberwarfare play a significant role, with cyberattacks on government organizations having profound implications for national security and international relations. This publication also explores the strategies to safeguard the public sector in the digital era, including security awareness training, multi-factor authentication, endpoint security, network segmentation, regular patches, and updates, incident response planning, backup, disaster recovery, zero trust architecture, and continuous vulnerability assessments. Overall, it underscores the urgent need for robust cybersecurity measures to protect sensitive data and critical infrastructure from cyber threats.

Published by: Oluwasola Yunusa Smith

Author: Oluwasola Yunusa Smith

Paper ID: V10I1-1246

Paper Status: published

Published: March 13, 2024

Full Details
Research Paper

Plot pilot

The real estate industry is undergoing a significant transformation with the advent of digital technologies. Traditional real estate transactions often involve intermediaries, leading to high fees, lack of transparency, and inefficiencies. In response to these challenges, this paper proposes the development of a mobile application designed to revolutionize real estate transactions. The application aims to provide comprehensive information on available properties, eliminate the need for traditional brokers, and integrate seamlessly with government systems for land registration. By leveraging components such as database management systems, user interfaces, security measures, authentication and authorization systems, GIS integration, documentation management, and mobile accessibility, the proposed solution promises to enhance transparency, reduce costs, and improve efficiency in property dealings.

Published by: Himasai Munagala, Sumiran, Srija Chirutha, Karthik Nama

Author: Himasai Munagala

Paper ID: V10I1-1235

Paper Status: published

Published: March 12, 2024

Full Details
Research Paper

A Descriptive Exploratory Study To Assess The Risk Factors For the Development of bedsores among Lower Segment Fracture Patients Admitted In the Orthopedic Ward of JNM Hospital, Kalyani

The research study was conducted to assess the risk factors for the development of bedsore among lower-segment fracture patients admitted to the orthopedic ward, JNM Hospital, Kalyani. The aim of this study was to identify the risk factor for the development of bedsore among lower-segment fracture patients. A quantitative research approach was selected for the study. It was a methodological study conducted in one phase. In this study questionnaire method was followed to collect the data. The sample size for the study consisted of 60 samples who were admitted to the Orthopedic Word of JNM Hospital both male and female wards. The sampling technique was non-probability convenience sampling. Open questionnaires with 6 questions were used to assess the risk factors for the development of bedsore among lower-segment fracture patients. After analysis of the results and after reviewing the different literature from PubMed, Medline, nursing and health science, etc. The Study results showed that the higher risk of bedsore in the age group 51-60 years 23(38.33%) so adult age mainly acts as a risk factor for bedsores. And the other hand 48 (80%) persons are occasionally moisturized in moisture, and the incidence rate of bedsores is the highest in Orthopedic surgery ward it can be said that two aspects of demographic variables are family monthly income and nutritional status in our study. So from the association, we can say that the risk for bedsores is mostly present among the patient of orthopedic ward

Published by: Sarvendra Pratap, Anindita Tripathi, Manisha Maity, Susmita Sur, Tandra Bhattacharyya, Arpita Majhi, Puja Chongre, Rimpa Ghosh Roy, Sajjan Kumar

Author: Sarvendra Pratap

Paper ID: V10I1-1243

Paper Status: published

Published: March 12, 2024

Full Details
Research Paper

Enhancing Cybersecurity Resilience in a Multinational Semiconductor Organization: A Comprehensive Strategy for Threat Mitigation and Defense Strengthening

Tososu Semiconductors LLC, a multinational corporation specializing in semiconductor development for medical and automotive sectors, faced numerous cyber threats including ransomware, phishing, and DDOS attacks. This paper presents an in-depth analysis of the attacks experienced by the organization and proposes a comprehensive cybersecurity solution within the constraints of a $600,000 annual budget. The analysis reveals vulnerabilities in the company's network environment, including lack of security awareness among employees, absence of email security systems, and inadequate threat management infrastructure. Subsequently, a multi-faceted solution is proposed to address these vulnerabilities. The proposed solution encompasses the implementation of Unified Threat Management (UTM) systems, human awareness training, backup solutions, DDOS protection, DMZ implementation, password policy enhancement, multi-factor authentication, and phishing detection software. These solutions aim to fortify the organization's security posture, mitigate risks, and prevent future attacks. A detailed breakdown of costs and budget allocation is provided, ensuring adherence to financial constraints while maximizing security measures. Additionally, the paper discusses the implications of the proposed solutions, emphasizing the importance of employee vigilance and continuous security updates. Ultimately, this paper underscores the significance of proactive cybersecurity measures in safeguarding organizational assets and mitigating cyber threats in an evolving technological landscape.

Published by: Ugochukwu Eneh

Author: Ugochukwu Eneh

Paper ID: V10I1-1240

Paper Status: published

Published: March 12, 2024

Full Details
Review Paper

KRISHI-SADHAN platform for farmers for renting equipment’s

KRISHI-SADHAN is a MERN stack web application designed to revolutionize agriculture by addressing the intricate challenges faced by farmers. This transformative platform facilitates the seamless exchange and short-term rental of agricultural equipment, fostering a collaborative ecosystem among farmers. Leveraging React.js, Node.js, Express.js, and MongoDB, the system offers an intuitive and responsive interface, ensuring accessibility for users across diverse technological landscapes. The core objectives of Krishi-Sadhan encompass simplifying equipment exchange, enabling short-term rentals, fostering community collaboration, and empowering farmers through modern technology. The project's user-friendly interface goes beyond mere transactions, creating a dynamic marketplace where farmers can share knowledge, optimize resources, and contribute to sustainable agricultural practices. As Krishi-Sadhan embarks on its journey, the potential for positive change within the agricultural community is evident. By providing a comprehensive and secure platform, the project aims to empower farmers, promote efficient resource utilization, and contribute to the creation of a more connected and informed farming community. Krishi-Sadhan is not just a technological endeavour, it symbolizes a vision for a more sustainable and empowered future in agriculture, sowing the seeds of innovation for a resilient agricultural ecosystem

Published by: Parth Gandhi, Vishal Kumar, Md Dilshad, Raushan Kumar, Praveen Kumar S.

Author: Parth Gandhi

Paper ID: V9I6-1163

Paper Status: published

Published: March 11, 2024

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X