Manuscripts

Recent Papers

Research Paper

DAR – DEFENCE ADVANCE ROVER

A Rover is an IOT-based robot that is basically designed to detect Landmines, Smoke, Fire, Alignment, Obstacles, and Radar to detect Movement. In this research we prepare a Rover as a prototype of a multi-functional robot and the purpose of it is to go to dangerous areas like collapsed places, and areas attacked by terrorists to collect every possible data of the situation and send it via wireless communication system (Remotely), as well as manually for the further actions. The main phenomenon of this Rover is to help the army by providing various information which usually is difficult and risky for a person to collect and send to the control center. The whole system operates wirelessly and sends each and every piece of data to the control center through signals, and shows live video footage directly to the control center, even if the camera is damaged the remaining sensors keep providing the data.

Published by: Kaushik Wagh R., Sagar Katekhaye, Holachi Vaishnavi, Ayush kumar, Aman Kalavadia, MK Jayanthi Kannan

Author: Kaushik Wagh R.

Paper ID: V9I2-1178

Paper Status: published

Published: April 12, 2023

Full Details
Research Paper

Supply chain analytics on inventory management on small firms across Hyderabad

Small firms are mostly into retail operations in the very first stage of development. Inventory management describes the way resources are handled in the production process. Inventory management is a part of the supply chain which involves a sequence of activities starting from the procurement of raw materials from suppliers and ending with the distribution of products to the end customers. As inventory management is a subset of the supply chain, efficient management of inventory reduces the time taken for the movement of materials for operations. A study on Supply Chain Analytics on Inventory Management on Small Firms across Hyderabad. Efficient implementation of inventory management with respect to the supply chain helps organizations reduce the cost of operations and gain a competitive advantage in the industry

Published by: Dr. Aravinda Reddy M. N.

Author: Dr. Aravinda Reddy M. N.

Paper ID: V9I2-1177

Paper Status: published

Published: April 12, 2023

Full Details
Research Paper

A comparative overview of Ayurveda and Allopathy with special reference to efficiency and limitation

Ayurveda and Allopathy are two of the most popular systems of medicine in the world. Ayurveda, an ancient Indian system of medicine, is based on natural remedies and is widely used in India and neighbouring countries. Allopathy, on the other hand, is a modern system of medicine that uses synthetic drugs to cure diseases. The aim of this research article is to compare and contrast the two systems of medicine with special reference to their efficiency and limitations. The study employs a systematic review of existing literature on Ayurveda and Allopathy to compare the two systems of medicine.

Published by: Dr. Ragini Bhardwaj, Prakash Mehta

Author: Dr. Ragini Bhardwaj

Paper ID: V9I2-1171

Paper Status: published

Published: April 5, 2023

Full Details
Research Paper

A comparative overview of Ayurveda and Homeopathy with special reference to efficiency and limitation

This review article compares and contrasts Ayurveda and Homeopathy, two alternative systems of medicine that have been practiced for centuries. Ayurveda is an ancient Indian system of medicine that focuses on the balance between the mind, body, and spirit to promote overall health and wellness. Homeopathy, on the other hand, is a system of medicine developed in the late 18th century that uses highly diluted substances to stimulate the body's natural healing processes. The article presents a comprehensive review of the literature, discussing the efficiency and limitations of both Ayurveda and Homeopathy. While both systems have been found to be effective in treating various illnesses, Ayurvedic treatments can be time-consuming and require a significant lifestyle change, while Homeopathy has been criticized for its lack of scientific evidence to support its effectiveness. Therefore, patients should consult with a healthcare professional before choosing between Ayurveda and Homeopathy to ensure they receive the most appropriate treatment for their condition.

Published by: Dr. Ragini Bhardwaj, Prakash Mehta

Author: Dr. Ragini Bhardwaj

Paper ID: V9I2-1170

Paper Status: published

Published: April 5, 2023

Full Details
Research Paper

Machine Learning Based Network Intrusion Detection For Cyber Security

Machine Learning-based systems act on flow features derived through exporting flow procedures. The notable emergence of Machine Learning and Deep Learning (DL) based reports presuppose that the flow of information, such as the average packet capacity, is gleaned from every packet. On common devices, However, when packet sampling is unavoidable, flow exporters are frequently used in practice. Since the flow of information is derived from a sampled group of the packets rather than the entire traffic stream, the usefulness of Machine Learning-based results with the use and existence of such samplings is still up for debate. In this study, we are going to investigate in what ways the effectiveness and performance of these ML-based are affected by packet sampling. Our suggested evaluation method is resistant to various flow export stage settings, in contrast to earlier studies. Hence, it can provide a robust evaluation even in the presence of sampling.

Published by: Mounika Maity, B. Pramod, N. Masthan Valli, Y. Pranathi, M. Mallikarjuna, V. Sathyendra Kumar

Author: Mounika Maity

Paper ID: V9I2-1172

Paper Status: published

Published: April 3, 2023

Full Details
Research Paper

Remote data integrity checking with a designated verifier while preserving identity-based privacy

The authenticity of outsourced data may be effectively checked using the remote data possession checking method, which can be classified into both private and public verification. Public verification can be verified by any cloud user, however, private verification can only be verified by the data owner. However, In the majority of real-world scenarios, the data owner anticipates that just a specific verifier will be able to carry out integrity-checking duties and that the verifier won't be able to learn anything about the data. Yan et al. suggest a remote data possession verification scheme with a designated validator to make sure that only the designated verifier can guarantee the data's integrity and that others cannot. However, this strategy makes use of public-key technology and disregards privacy-related concerns. To overcome these shortcomings, we propose an identity-based remote data possession checking method that fulfills the data owner's demand to select a unique verifier. This method also employs a Merkle hash tree for dynamic data updating and a randomized integer for blind data integrity verification that protects user privacy. Our method can be used to get around the public key infrastructure's burdensome certificate administration. We showed that our system is secure using the computing Diffie-Hellman assumptions and the discrete optimization assumption. Our plan is practical and effective in practical contexts, as shown by conceptual analysis and experimental results.

Published by: Kethireddy Anusha, Hasthavaram Sai Leela, Koona Naga Navya Sree, Mohammed Arshad Shaik, Sanjapuri Naga Arudra Kumar, Mukka Pramukha

Author: Kethireddy Anusha

Paper ID: V9I2-1168

Paper Status: published

Published: April 3, 2023

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X