Manuscripts

Recent Papers

Research Paper

A study on the integration of the Global Positioning System (GPS) in emergency service vehicles.

The integration of GPS technology and traffic signal control in emergency vehicles, particularly ambulances, can significantly improve response times and save precious minutes in critical situations. By connecting the GPS systems of emergency vehicles with traffic signals, the signals can automatically change to green when an ambulance is approaching, creating a clear path for the ambulance to pass through intersections without delay. This system relies on a network of sensors and communication equipment that are able to detect the ambulance's location and adjust traffic signals in real-time. The benefits of this technology are numerous as it not only helps save lives by reducing response times but also reduces traffic congestion by optimizing traffic flow. This innovative approach to ambulance transportation can make a tremendous impact in emergency situations, particularly in densely populated areas where traffic congestion can impede the progress of emergency vehicles. In short, the integration of GPS-connected traffic signals can be a game-changer for emergency vehicle transportation and help ensure that ambulances reach their destination quickly and safely ultimately saving lives while improving efficiency in emergency response systems.

Published by: Dr. Raghu, Dr. Mala K. M.

Author: Dr. Raghu

Paper ID: V9I2-1144

Paper Status: published

Published: March 15, 2023

Full Details
Research Paper

Approach to cyber security issues for small businesses in the United States: Challenges and solutions

Cybersecurity is a critical aspect of small businesses' survival and growth, as they are increasingly becoming targets of cyber-attacks worldwide. The SolarWinds cyber-attack in 2020 exposed the vulnerabilities of small businesses and government agencies to sophisticated cyber threats. In response to this growing threat, experts have emphasized the need for small businesses to prioritize cybersecurity by developing a comprehensive strategy that includes risk assessment, vulnerability management, and incident response planning. Considering the SolarWinds hack, this essay provides an analytical and qualitative framework for comprehending the significance of cybersecurity for small enterprises. The framework explores the unique challenges that small businesses face in managing cybersecurity risks and identifies best practices for mitigating these risks. The study concludes that small companies must prioritize cybersecurity by acknowledging and identifying risks to safeguard themselves from the rising risk of cyberattacks and keep their consumers' confidence.

Published by: Omotayo Oluwatosin Ilori

Author: Omotayo Oluwatosin Ilori

Paper ID: V9I2-1138

Paper Status: published

Published: March 15, 2023

Full Details
Research Paper

A study of the relation between the logistic performance index on India’s trade

Logistics and transport increasingly influence international trade. The Logistics Performance Index (LPI) compares customs procedures, logistics costs, and overland and maritime transport infrastructure between countries. This article uses a gravity model to analyze how these components affect trade in emerging economies. The study also compares 2007 and 2012 LPI data from developing countries in five regions (Africa, South America, the Far East, the Middle East, and Eastern Europe) to find logistics improvements. The results show that improving any LPI component can boost trade flows.

Published by: Dhairya Panchal, Krupa Gadhavi, Ashishkumar Bhatt

Author: Dhairya Panchal

Paper ID: V9I2-1140

Paper Status: published

Published: March 11, 2023

Full Details
Research Paper

Data encryption on image cryptography and steganography

These days, information is transmitted via the internet. Consequently, information security has emerged as a crucial concern. The well-known method of network data security is cryptography. In digital media, steganography is the method used to conceal the message. Comparatively speaking, the security of elliptical curve cryptography outweighs that of the ones currently in use. In this paper, a hybrid model that combines steganography and ECC with public keys is presented. can offer higher levels of higher security than steganographic or one ECC method alone. This initiative's primary goal is to conceal sensitive data from internet users, the military, and various corporate sectors that commonly use public networks for interaction

Published by: Ibraheem Ojelade, Ibrahim Abdulkareem

Author: Ibraheem Ojelade

Paper ID: V9I2-1136

Paper Status: published

Published: March 11, 2023

Full Details
Research Paper

Study of awareness of cyber security in educational organization

Today we are all living in the era of Internet and Social media . We cannot imagine the world without the Internet .So the Educational organizations are also transforming and trying to use IT tools for various purposes. .The teaching methodologies have also evolved with the technology .During the Covid-19 era technology and the Internet were boon to continue the learning process with the help of several tools . But now Post Covid also many of the tools are still being used as they were found very effective in imparting education. But all of this is resulting in a lot of exposure to the internet or social media. The students even in Kindergarten are busy with some or the other gadgets surfing the internet. But as it is said every coin has two faces ,this cyber world also is also prone to a number of threats and crimes .Therefore it is important for all the stakeholders of any organization to be aware of the challenges in using the Internet .Here we are specially focusing on Educational Organizations to understand whether they are aware of the security measures while using the Internet specially the school kids are more vulnerable to these kinds of threats and even crimes .As the students are not aware of the cyber threats and issues to protect themselves from becoming victims of such activities, cases of cyberbullying, online fraud, racial abuse, pornography, and gambling have significantly grown. Research from the past shows that Internet users still have a very low to moderate level of awareness. Therefore we are undertaking the study regarding the awareness of Cybersecurity in Educational Organizations We will be trying to study how much the young children and young adults are aware regarding cybersecurity and its tools to have safe browsing. The result of this study will be helpful in acquiring knowledge about how much importance do educational organizations give for cyber security .The objective of this systematic review paper is to explore whether modern learners are educated about the risks associated with being active in cyberspace and the strategies that stakeholders are undertaking in the educational industry. In this paper, few strategies are also discussed as to how cyber security education can be implemented in educational Organizations.

Published by: Shruti Sunil Manohar, Amita Garg, Aparna Havaldar

Author: Shruti Sunil Manohar

Paper ID: V9I2-1137

Paper Status: published

Published: March 11, 2023

Full Details
Research Paper

Bond investment risk prediction using Machine Learning (regression)

This article presents a study on the use of machine learning to predict bond investment risks. The study focuses on using the Standard & Poor's (S&P) rating and regression models to predict bond investment risks. The results show that the random forest model achieved the highest accuracy of 80% in predicting bond investment risks. This study provides valuable insights into the use of machine learning to assist investors in making informed investment decisions. The results also suggest that machine learning could be an effective tool for predicting bond investment risks and could potentially enhance investment outcomes.

Published by: Shoaib Nazim Vanu

Author: Shoaib Nazim Vanu

Paper ID: V9I1-1190

Paper Status: published

Published: March 1, 2023

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X