Manuscripts

Recent Papers

Research Paper

Soft computing technique for the blockchain-enabled secure healthcare system

A recent study demonstrates that by combining AI and Blockchain technologies, we can close several loopholes in the healthcare industry. AI systems perform better when given substantial data input that may be used to infer conclusions and make decisions. When data is acquired from a reliable, trustworthy, safe, and tenable data vault, machine learning algorithms perform better.

Published by: P. Nagendra, S. Sameera, M. Nithesh, Y. Rajasekhar Reddy, G. Nikhitha, C. Nandini

Author: P. Nagendra

Paper ID: V9I2-1167

Paper Status: published

Published: April 3, 2023

Full Details
Research Paper

A comparative overview of Ayurveda and Unani with special reference to efficiency and limitation

This research article provides a comparative overview of Ayurveda and Unani, two traditional systems of medicine that have been practiced in India and the Middle East for centuries. The efficiency and limitations of both systems are discussed with reference to their historical development, theoretical frameworks, diagnostic and treatment methods, and current practices. The methodology involved a literature review of scholarly articles, books, and online resources that discuss Ayurveda and Unani. The results and discussion section highlight the similarities and differences between the two systems, and their strengths and weaknesses. The article concludes that both Ayurveda and Unani have their own unique contributions to make to the field of traditional medicine and that a better understanding of their theoretical frameworks and clinical practices can enhance the efficacy of their treatment modalities.

Published by: Dr. Ragini Bhardwaj, Prakash Mehta

Author: Dr. Ragini Bhardwaj

Paper ID: V9I2-1169

Paper Status: published

Published: April 3, 2023

Full Details
Research Paper

Ensuring the security of logistics information and data querying using searchable encryption algorithms and Blockchain

A searchable and encrypted logistics information blockchain data query method is presented to protect the security of logistics information and to query information quickly and efficiently utilizing searchable encryption algorithms paired with the properties of the blockchain. The logistics data is split up into many data files, encrypted with an asymmetric technique, and then kept on a cloud server. Each data file is given a keyword index value, which is then uploaded to the blockchain. Data updates and queries can be performed at any time with this solution. The project's plan is finally completed with accuracy, completeness, and safety. It offers scheme viability.

Published by: T. Sree Lakshmi, B. Naganandini, B. Manjuula, S. Manjunath, G. Rupa, B. Narendra

Author: T. Sree Lakshmi

Paper ID: V9I2-1163

Paper Status: published

Published: April 3, 2023

Full Details
Research Paper

Forward secure public key Encryption with keyword search for outsourced cloud storage

Cloud computing is a self-driven word that offers information outsourcing services without contention, alleviating customers of the pressures of nearby storage problems. Many industries, such as the military, hospitals, businesses, colleges, and so on, already employ cloud computing to store enormous volumes of data or information. The client may seek permission to view the files or information from the cloud. Generally speaking, there are three types of information: confidential, public, and personal. The infrastructure that stores all of the data on the cloud belongs to someone else. It is never simple to trust outside cloud service suppliers with critical data. Even the largest cloud market players assert that security is a shared responsibility between the customer and the business. The customer should consider how critical it is for the encryption to be robust in order to restrict people from reading data saved in the cloud. One of the many issues that arise from cloud data storage is information security. To solve these problems, numerous algorithms were created. Unfortunately, securing a sizable chunk of the cloud with a single computation or technique is ineffective. By utilising cryptographic techniques, security problems are reduced in this study effort. In addition, networking, server, and storage are all merged so at infrastructure level in cloud computing. This research project suggests employing cryptographic techniques to store data safely in the cloud.

Published by: B. Venkatesu Goud, C. Ramadevi, C. Naga Jyothi, B. Lavanya, D. Narasimha, L. Narashimha Reddy

Author: B. Venkatesu Goud

Paper ID: V9I2-1166

Paper Status: published

Published: April 3, 2023

Full Details
Research Paper

Advanced key access security system on cloud computing

In this study, we create a system for managing key access that translates any access control policies with a hierarchical system to digital media. The given approach can be applied to any cloud infrastructure system as a private cloud. We consider the data owner to be a composite organizational entity. Every user of this organization has a secure way to connect to the public cloud within as well as outside the corporate servers. Our key access control mechanism, which is based upon Shamir's secret image-sharing method and the polynomials interpolation technique, is particularly well suited for tiered organizational structures. It offers a hierarchy, secure, and flexible key access solution for organizations handling mission-critical data. Moreover, it always concerns with moving quest information into the public cloud by using the topology order of shapes the way, including self-loop, and making sure that only individuals with The Keys can be accessible with enough permission from similarly privileged users or above. A significant overhead, such as the need for both public and private storage, is reduced to a manageable level by the computationally efficient key derivation. Our solution provides crucial security that can be distinguished from other systems as well as resistance to group attacks. In addition to removing the chance of a data breach caused by key exposure, the fact that the key is not required to be kept elsewhere also eliminates this necessity.

Published by: Choragudi Sasidhar, Narreddy Pallavi, Sreeramdasu Pravalika, Palagiri Manoj Kumar Reddy, Yerragudi Sandeep

Author: Choragudi Sasidhar

Paper ID: V9I2-1165

Paper Status: published

Published: April 3, 2023

Full Details
Research Paper

Employing Machine Learning, A Multiclass Prediction Model For The Student Grading System.

In today's higher education institutions, predictive analytics applications have become a pressing need. In order to generate high-quality performance and valuable data for all educational levels, predictive analytics used sophisticated analytics that included the application of machine learning. the majority of people are aware that One of the main metrics that may be used by educators to track students' academic progress is their grades. In the last ten years, a wide range of machine learning algorithms has been proposed by researchers in the field of education. To improve the performance of predicting student grades, addressing imbalanced datasets presents serious difficulties. Therefore, this study gives a thorough review of machine learning algorithms to predict the final student grades in the first semester courses by enhancing the performance of prediction accuracy. In this study, we'll emphasize two modules. Using a dataset of 1282 genuine student course grades, we assess the accuracy performance of six well-known machine learning techniques: Decision Tree (J48), Support Vector Machine (SVM), Nave Bayes (NB), K-Nearest Neighbor (kNN), Logistic Regression (LR), and Random Forest (RF). In order to reduce overfitting and misclassification results brought on by imbalanced multi-classification based on oversampling Synthetic Minority Oversampling Technique (SMOTE) using two feature selection methods, we have suggested a multiclass prediction model. The outcomes demonstrate that the suggested model integrates with RF and gives a notable improvement with the greatest f-measure of 99.5%. This model's suggested findings are comparable and encouraging, and they have the potential to improve the model's performance predictions for imbalanced multi-classification for student grade prediction.

Published by: Jahnavi Sannidhi, Dumpala Pavan Kumar Reddy, Akkaladevi Lumbhini Madhuri, Donka Suresh, Nimmagallu Swetha, D. Sarika

Author: Jahnavi Sannidhi

Paper ID: V9I2-1161

Paper Status: published

Published: April 3, 2023

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X