Volume-9, Issue-2

March-April, 2023

Research Paper

1. Study of awareness of cyber security in educational organization

Today we are all living in the era of Internet and Social media . We cannot imagine the world without the Internet .So the Educational organizations are also transforming and trying to use IT tools for various purposes. .The teaching methodologies have also evolved with the technology .During the Covid-19 era technology and the Internet were boon to continue the learning process with the help of several tools . But now Post Covid also many of the tools are still being used as they were found very effective in imparting education. But all of this is resulting in a lot of exposure to the internet or social media. The students even in Kindergarten are busy with some or the other gadgets surfing the internet. But as it is said every coin has two faces ,this cyber world also is also prone to a number of threats and crimes .Therefore it is important for all the stakeholders of any organization to be aware of the challenges in using the Internet .Here we are specially focusing on Educational Organizations to understand whether they are aware of the security measures while using the Internet specially the school kids are more vulnerable to these kinds of threats and even crimes .As the students are not aware of the cyber threats and issues to protect themselves from becoming victims of such activities, cases of cyberbullying, online fraud, racial abuse, pornography, and gambling have significantly grown. Research from the past shows that Internet users still have a very low to moderate level of awareness. Therefore we are undertaking the study regarding the awareness of Cybersecurity in Educational Organizations We will be trying to study how much the young children and young adults are aware regarding cybersecurity and its tools to have safe browsing. The result of this study will be helpful in acquiring knowledge about how much importance do educational organizations give for cyber security .The objective of this systematic review paper is to explore whether modern learners are educated about the risks associated with being active in cyberspace and the strategies that stakeholders are undertaking in the educational industry. In this paper, few strategies are also discussed as to how cyber security education can be implemented in educational Organizations.

Published by: Shruti Sunil Manohar, Amita Garg, Aparna HavaldarResearch Area: Information Technology

Organisation: Parul University, Vadodara, GujaratKeywords: Cyber Security, Awareness, Internet, Attacks

Research Paper

2. Data encryption on image cryptography and steganography

These days, information is transmitted via the internet. Consequently, information security has emerged as a crucial concern. The well-known method of network data security is cryptography. In digital media, steganography is the method used to conceal the message. Comparatively speaking, the security of elliptical curve cryptography outweighs that of the ones currently in use. In this paper, a hybrid model that combines steganography and ECC with public keys is presented. can offer higher levels of higher security than steganographic or one ECC method alone. This initiative's primary goal is to conceal sensitive data from internet users, the military, and various corporate sectors that commonly use public networks for interaction

Published by: Ibraheem Ojelade, Ibrahim AbdulkareemResearch Area: Cyber Security

Organisation: Austin Peay State University, Clarksville, USAKeywords: ECC, RGB, LSB, CNOT Gate, PSNR, Steganography, and Cryptography

Research Paper

3. A study of the relation between the logistic performance index on India’s trade

Logistics and transport increasingly influence international trade. The Logistics Performance Index (LPI) compares customs procedures, logistics costs, and overland and maritime transport infrastructure between countries. This article uses a gravity model to analyze how these components affect trade in emerging economies. The study also compares 2007 and 2012 LPI data from developing countries in five regions (Africa, South America, the Far East, the Middle East, and Eastern Europe) to find logistics improvements. The results show that improving any LPI component can boost trade flows.

Published by: Dhairya Panchal, Krupa Gadhavi, Ashishkumar BhattResearch Area: International Business & Trade

Organisation: Parul University, Vadodara, GujaratKeywords: Logistics Performance Index, Trade, Gravity Model, India

Research Paper

4. Approach to cyber security issues for small businesses in the United States: Challenges and solutions

Cybersecurity is a critical aspect of small businesses' survival and growth, as they are increasingly becoming targets of cyber-attacks worldwide. The SolarWinds cyber-attack in 2020 exposed the vulnerabilities of small businesses and government agencies to sophisticated cyber threats. In response to this growing threat, experts have emphasized the need for small businesses to prioritize cybersecurity by developing a comprehensive strategy that includes risk assessment, vulnerability management, and incident response planning. Considering the SolarWinds hack, this essay provides an analytical and qualitative framework for comprehending the significance of cybersecurity for small enterprises. The framework explores the unique challenges that small businesses face in managing cybersecurity risks and identifies best practices for mitigating these risks. The study concludes that small companies must prioritize cybersecurity by acknowledging and identifying risks to safeguard themselves from the rising risk of cyberattacks and keep their consumers' confidence.

Published by: Omotayo Oluwatosin IloriResearch Area: Cyber Security

Organisation: Austin Peay State University, Clarksville, United StatesKeywords: Small Businesses, Cybersecurity, Cyber Threats, Data Breaches, Incident Response Planning, Risk Assessment, Vulnerability Management, Remote Work, Cloud Computing, Solarwinds Attack.

Research Paper

5. A study on the integration of the Global Positioning System (GPS) in emergency service vehicles.

The integration of GPS technology and traffic signal control in emergency vehicles, particularly ambulances, can significantly improve response times and save precious minutes in critical situations. By connecting the GPS systems of emergency vehicles with traffic signals, the signals can automatically change to green when an ambulance is approaching, creating a clear path for the ambulance to pass through intersections without delay. This system relies on a network of sensors and communication equipment that are able to detect the ambulance's location and adjust traffic signals in real-time. The benefits of this technology are numerous as it not only helps save lives by reducing response times but also reduces traffic congestion by optimizing traffic flow. This innovative approach to ambulance transportation can make a tremendous impact in emergency situations, particularly in densely populated areas where traffic congestion can impede the progress of emergency vehicles. In short, the integration of GPS-connected traffic signals can be a game-changer for emergency vehicle transportation and help ensure that ambulances reach their destination quickly and safely ultimately saving lives while improving efficiency in emergency response systems.

Published by: Dr. Raghu, Dr. Mala K. M.Research Area: Science and Technology

Organisation: Jain Deemed-to-be University, Bengaluru, KarnatakaKeywords: GPS, Ambulance, Integration, Technology, Vehicle Tracking

Research Paper

6. Investigation on thermal conductivity of polymer (epoxy) based composites

The current research investigates the influence of fiber volume fraction on effective thermal conductivity (keff) in polymeric materials. This study identifies a method to improve the insulating property of a traditional fiber-reinforced polymer composite. A quantitative relationship for the heat transfer coefficients of polymer composites reinforced with fiber is created utilizing the law of minimal thermal performance and the equal law of particular similar thermal conductivity. To validate this statistical equation, two sets of polymer composites with fiber concentrations ranging from 0 to 15.7 vol percent were hand-built. Natural fibers such as banana fibers are integrated into an epoxy matrix in one set of composites, whilst glass fiber is employed as a filler material in another set, although the matrix material remains unchanged. Thermal conductivities of these composite materials are tested in accordance with ASTM standard E-1530 using the Unit herm TM Model 2022 tester, which operates on the double shielded heat flow concept. Furthermore, using the commercially accessible finite element tool ANSYS, the finite element technique (FEM) is employed to quantitatively measure the k eff of such composites. The numerical values generated by the proposed statistical model are then compared to empirically measured values. The analytical and simulation results reveal that the appropriate heat conductivity value for both sets of composites steadily declines as fiber concentration increases. Because none of the models developed properly anticipated the rate of heat transfer of the composites, the results generated from the proposed system closely match the experimental data. This study shows that as the fiber loading in the composite increases, so does the heat transmission rate. The use of 15.7 vol percent glass fiber in epoxy resin reduces heat conductivity by around 8%, whereas a 12 percent decrease is observed when the banana fiber is used as a filler. This research backs up the conceptual approach while indicating that finite element analysis is an effective tool for such investigations. This thermal insulating, fiber-reinforced polymer composites have potential applications in insulating boards, food containers, thermo flasks, construction materials, and so on due to their low thermal conductivity and lightweight.

Published by: Suhas B. R., Manjunath S. B.Research Area: Composite Materials

Organisation: Dayananda Sagar College of Engineering, Bengaluru, KarnatakaKeywords: Thermal Conductivities Filler, Matrix

Short Communication

7. Proposed survey questionnaire for the diagnosis of irritable bowel syndrome: Based on patient complaints

Functional bowel disorders (FBD) are extremely common all over the globe. Enhancing knowledge of FBD is essential because they have a detrimental effect on the healthcare system. Irritable bowel syndrome (IBS) is one such FBD where recurrent abdominal pain is associated with a change in bowel habits. Many conditions mimic IBS which include celiac disease, microscopic colitis, inflammatory bowel disease (IBD), lactose and fructose intolerance, etc. In order to correctly differentiate these disorders from IBS, limited testing may be necessary. Considering these overlapping conditions we thought of developing a questionnaire to help the physicians diagnose IBS based on a scoring system. A set of questions were drafted based on patient complaints and each question had a scoring system. Basis the patient's response to each question the total score would help the physicians understand if the patient is suffering from IBS. This is a brand-new grading system that has not yet undergone testing. The medical community is urged to evaluate the scoring system's usefulness and provide input so that it can be improved.

Published by: Dr. Saurabh Srivastava, Dr. Ashish Kumar, Dr. Ànuj Maheshwari, Dr. Gayatri KapseResearch Area: Gastroenterology

Organisation: Government Institute of Medical Sciences, Greater Noida, Uttar PradeshKeywords: Functional Bowel Disorders, Irritable Bowel Syndrome, Abdominal Pain, Questionnaire, and Patient Complaints

Research Paper

8. Credit card fraud detection: An evaluation of Machine Learning methods performance using SMOTE and AdaBoost

Online card transactions have increased daily as a result of the development of technologies like e-commerce and financial technology (FinTech) apps. As a result, there has been an increase in credit card fraud that impacts banks, merchants, and card issuers. Thus, it is critical to creating systems that guarantee the confidentiality and accuracy of credit card transactions. In this study, we use imbalanced real-world datasets produced by European credit cardholders to create a machine learning (ML) based framework for detecting credit card fraud. In order to address the class imbalance problem, we resampled the dataset using the Synthetic Minority over-sampling Technique (SMOTE).

Published by: Kethe Meghana, Nidimamidi Thahseen, Duragadda Dhana Lakshmi, Vamsharajula Seenu, Vattam Veda Prakash, Pola NikhilaResearch Area: Machine Learning

Organisation: Annamacharya Institute of Technology and Sciences, Boyanapalli, Andhra PradeshKeywords: Credit Card Fraud, Machine Learning, Predictive Modelling

Research Paper

9. Implementation of ai based protective mask detector

The global impact of the corona virus disease is significant. Firmly stop the corona virus from spreading. A single-shot detector (SSD)-based object identification technique that focuses on accurate, real-time face mask detection in densely populated settings such as communities and workplaces where there are a lot of people is described. On the basis of two methodologies, we suggest a system in this project. Single-shot multi-box recognition, often known as SSD, is a technique for identifying people wearing face masks in an image in a single attempt. By removing the area recommendation network, which causes an accuracy loss, SSD is employed to accelerate the cycle. Implementing our application in closed-circuit television (CCTV) surveillance systems. It will identify who is wearing the mask and who is not by using mobilenetV2 and machine learning techniques. With the aid of the single shot detection technique, it can filter photographs on the spot and distinguish between them. The data collected during this process, such as image capture, is kept in the cloud to ensure that the application functions properly.

Published by: D. Sarika, C. Amrutha Sai, M. Ganesh Kumar, M. Arun Kumar, A. Bhargavi, B. JyoshnaResearch Area: Artificial Intelligence

Organisation: Annamacharya Institute of Technology and Sciences, Rajampet, Andhra PradeshKeywords: MobilenetV2, Single Shot Detection, Mask, Detection, Dataset, Virus, and Data Sets.

Research Paper

10. Detection and prediction of air pollution using Machine Learning

The regulation of air pollutant levels is rapidly increasing and it's one of the most important tasks for the governments of developing countries, especially India. It is important that people know what the level of pollution in their surroundings is and takes a step towards fighting against it. The meteorological and traffic factors. burning of fossil fuels, industrial parameters such as powerplant emissions play significant roles in air pollution. Among all the particulate matter (PM) that determine the quality of the air. When its level is high in the air, it causes serious issues on people's health. Hence, controlling it by constantly keeping a check on its level in the air is important.

Published by: Patan Masthan Vali, D. P. Neeha Kousar, T. Sai Pranathi, K. Nandini, M. Saikanth, A. Ramesh BabuResearch Area: Machine Learning

Organisation: Annamacharya Institute of Technology and Sciences, Rajampet, Andhra PradeshKeywords: Decision Tree, PM10, PM2.5, SO2, CO, NO2, O3, Air Pollution, Air Quality Index, Assistive Vector Technology, Regression using Logit, Forest of the chance tree, K-Nearest Neighbor, and Naive Bayes.

Research Paper

11. Diagnosis of transformer faults using multi-class AdaBoost algorithm

Low fault diagnosis accuracy is caused by the ineffectiveness of traditional shallow machine learning methods un exploring the connection between the oil-immersed transformer fault data. In response, this study suggests a method for diagnosing transformer faults based on multi-class adaBoost algorithms solves this issue. First, the SVM and the adaBoost algorithm are linked. The SVM is improved by the adaBoost approach, and the transformer defect data is thoroughly investigated. The IPSO is then used to optimize the SVM's parameters when the dynamic weight is added to the PSO algorithm. This is accomplished by updating the particle inertia weight in real-time. Lastly, by examining the relationship between the type of fault and the dissolved gas in the transformer oil, the uncoded ratio technique develops a novel gas set collaboration. The feature vector used as the input is produced using the enhanced ratio approach. The diagnosis method suggested in this paper has a significant increase in diagnostic accuracy when compared to conventional methods, according to simulations using 419 collection of transformer fault data and 117 groups of IECTC10 standard data that were gathered in China. Additionally, it has a fast confluence speed and a powerful search capability.

Published by: Chilla Kaveri, Chagam Reddy Bhargavi, Gandra Neeraja, Burandin Sayyad Dada Umar Hussain, Shaik TabassumResearch Area: Machine Learning

Organisation: Annamacharya Institute of Technology and Sciences, Rajampet, Andhra PradeshKeywords: Support Vector Machines, Enhanced Particle Swarm Optimization, Power Transformers, The Dga Feature, and The Multi-Class Adaboost Algorithm Are Some of the Terms Used in Fault Detection

Research Paper

12. Employing Machine Learning, A Multiclass Prediction Model For The Student Grading System.

In today's higher education institutions, predictive analytics applications have become a pressing need. In order to generate high-quality performance and valuable data for all educational levels, predictive analytics used sophisticated analytics that included the application of machine learning. the majority of people are aware that One of the main metrics that may be used by educators to track students' academic progress is their grades. In the last ten years, a wide range of machine learning algorithms has been proposed by researchers in the field of education. To improve the performance of predicting student grades, addressing imbalanced datasets presents serious difficulties. Therefore, this study gives a thorough review of machine learning algorithms to predict the final student grades in the first semester courses by enhancing the performance of prediction accuracy. In this study, we'll emphasize two modules. Using a dataset of 1282 genuine student course grades, we assess the accuracy performance of six well-known machine learning techniques: Decision Tree (J48), Support Vector Machine (SVM), Nave Bayes (NB), K-Nearest Neighbor (kNN), Logistic Regression (LR), and Random Forest (RF). In order to reduce overfitting and misclassification results brought on by imbalanced multi-classification based on oversampling Synthetic Minority Oversampling Technique (SMOTE) using two feature selection methods, we have suggested a multiclass prediction model. The outcomes demonstrate that the suggested model integrates with RF and gives a notable improvement with the greatest f-measure of 99.5%. This model's suggested findings are comparable and encouraging, and they have the potential to improve the model's performance predictions for imbalanced multi-classification for student grade prediction.

Published by: Jahnavi Sannidhi, Dumpala Pavan Kumar Reddy, Akkaladevi Lumbhini Madhuri, Donka Suresh, Nimmagallu Swetha, D. SarikaResearch Area: Machine Learning

Organisation: Annamacharya Institute of Technology and Sciences, Rajampet, Andhra PradeshKeywords: Predictive Model, Unbalanced Issue, Forecasting Student Grades, and Multi-Class Classification

Research Paper

13. Advanced key access security system on cloud computing

In this study, we create a system for managing key access that translates any access control policies with a hierarchical system to digital media. The given approach can be applied to any cloud infrastructure system as a private cloud. We consider the data owner to be a composite organizational entity. Every user of this organization has a secure way to connect to the public cloud within as well as outside the corporate servers. Our key access control mechanism, which is based upon Shamir's secret image-sharing method and the polynomials interpolation technique, is particularly well suited for tiered organizational structures. It offers a hierarchy, secure, and flexible key access solution for organizations handling mission-critical data. Moreover, it always concerns with moving quest information into the public cloud by using the topology order of shapes the way, including self-loop, and making sure that only individuals with The Keys can be accessible with enough permission from similarly privileged users or above. A significant overhead, such as the need for both public and private storage, is reduced to a manageable level by the computationally efficient key derivation. Our solution provides crucial security that can be distinguished from other systems as well as resistance to group attacks. In addition to removing the chance of a data breach caused by key exposure, the fact that the key is not required to be kept elsewhere also eliminates this necessity.

Published by: Choragudi Sasidhar, Narreddy Pallavi, Sreeramdasu Pravalika, Palagiri Manoj Kumar Reddy, Yerragudi SandeepResearch Area: Cloud Computing

Organisation: Annamacharya Institute of Technology and Sciences, Rajampet, Andhra PradeshKeywords: Cloud Security, Hierarchical, Interpolation, Key Access, Key Assignment, Secret Sharing

Research Paper

14. Forward secure public key Encryption with keyword search for outsourced cloud storage

Cloud computing is a self-driven word that offers information outsourcing services without contention, alleviating customers of the pressures of nearby storage problems. Many industries, such as the military, hospitals, businesses, colleges, and so on, already employ cloud computing to store enormous volumes of data or information. The client may seek permission to view the files or information from the cloud. Generally speaking, there are three types of information: confidential, public, and personal. The infrastructure that stores all of the data on the cloud belongs to someone else. It is never simple to trust outside cloud service suppliers with critical data. Even the largest cloud market players assert that security is a shared responsibility between the customer and the business. The customer should consider how critical it is for the encryption to be robust in order to restrict people from reading data saved in the cloud. One of the many issues that arise from cloud data storage is information security. To solve these problems, numerous algorithms were created. Unfortunately, securing a sizable chunk of the cloud with a single computation or technique is ineffective. By utilising cryptographic techniques, security problems are reduced in this study effort. In addition, networking, server, and storage are all merged so at infrastructure level in cloud computing. This research project suggests employing cryptographic techniques to store data safely in the cloud.

Published by: B. Venkatesu Goud, C. Ramadevi, C. Naga Jyothi, B. Lavanya, D. Narasimha, L. Narashimha ReddyResearch Area: Cloud Computing

Organisation: Annamacharya Institute of Technology and Sciences, Rajampet, Andhra PradeshKeywords: Data Storage, Security, Encryption, And Cloud Computing

Research Paper

15. Ensuring the security of logistics information and data querying using searchable encryption algorithms and Blockchain

A searchable and encrypted logistics information blockchain data query method is presented to protect the security of logistics information and to query information quickly and efficiently utilizing searchable encryption algorithms paired with the properties of the blockchain. The logistics data is split up into many data files, encrypted with an asymmetric technique, and then kept on a cloud server. Each data file is given a keyword index value, which is then uploaded to the blockchain. Data updates and queries can be performed at any time with this solution. The project's plan is finally completed with accuracy, completeness, and safety. It offers scheme viability.

Published by: T. Sree Lakshmi, B. Naganandini, B. Manjuula, S. Manjunath, G. Rupa, B. NarendraResearch Area: Block Chain

Organisation: Annamacharya Institute of Technology and Sciences, Rajampet, Andhra PradeshKeywords: Block Chain, Searchable Encryption, Asymmetric Encryption, Logistics Information, and Data Query.

Research Paper

16. A comparative overview of Ayurveda and Unani with special reference to efficiency and limitation

This research article provides a comparative overview of Ayurveda and Unani, two traditional systems of medicine that have been practiced in India and the Middle East for centuries. The efficiency and limitations of both systems are discussed with reference to their historical development, theoretical frameworks, diagnostic and treatment methods, and current practices. The methodology involved a literature review of scholarly articles, books, and online resources that discuss Ayurveda and Unani. The results and discussion section highlight the similarities and differences between the two systems, and their strengths and weaknesses. The article concludes that both Ayurveda and Unani have their own unique contributions to make to the field of traditional medicine and that a better understanding of their theoretical frameworks and clinical practices can enhance the efficacy of their treatment modalities.

Published by: Dr. Ragini Bhardwaj, Prakash MehtaResearch Area: Ayurveda

Organisation: Lal Bahadur Shastri Mahila Ayurvedic College and Hospital, Bilaspur, HaryanaKeywords: Ayurveda, Unani

Research Paper

17. Soft computing technique for the blockchain-enabled secure healthcare system

A recent study demonstrates that by combining AI and Blockchain technologies, we can close several loopholes in the healthcare industry. AI systems perform better when given substantial data input that may be used to infer conclusions and make decisions. When data is acquired from a reliable, trustworthy, safe, and tenable data vault, machine learning algorithms perform better.

Published by: P. Nagendra, S. Sameera, M. Nithesh, Y. Rajasekhar Reddy, G. Nikhitha, C. NandiniResearch Area: Block Chain

Organisation: Annamacharya Institute of Technology and Sciences, Rajampet, Andhra PradeshKeywords: Artificial Intelligence (AI), Machine Learning (ML), and Blockchain

Research Paper

18. Remote data integrity checking with a designated verifier while preserving identity-based privacy

The authenticity of outsourced data may be effectively checked using the remote data possession checking method, which can be classified into both private and public verification. Public verification can be verified by any cloud user, however, private verification can only be verified by the data owner. However, In the majority of real-world scenarios, the data owner anticipates that just a specific verifier will be able to carry out integrity-checking duties and that the verifier won't be able to learn anything about the data. Yan et al. suggest a remote data possession verification scheme with a designated validator to make sure that only the designated verifier can guarantee the data's integrity and that others cannot. However, this strategy makes use of public-key technology and disregards privacy-related concerns. To overcome these shortcomings, we propose an identity-based remote data possession checking method that fulfills the data owner's demand to select a unique verifier. This method also employs a Merkle hash tree for dynamic data updating and a randomized integer for blind data integrity verification that protects user privacy. Our method can be used to get around the public key infrastructure's burdensome certificate administration. We showed that our system is secure using the computing Diffie-Hellman assumptions and the discrete optimization assumption. Our plan is practical and effective in practical contexts, as shown by conceptual analysis and experimental results.

Published by: Kethireddy Anusha, Hasthavaram Sai Leela, Koona Naga Navya Sree, Mohammed Arshad Shaik, Sanjapuri Naga Arudra Kumar, Mukka PramukhaResearch Area: Cloud Computing

Organisation: Annamacharya Institute of Technology and Sciences, Rajampet, Andhra PradeshKeywords: Identity-Based Cryptography, Designated Verifier, Privacy Protection, Data Dynamics

Research Paper

19. Machine Learning Based Network Intrusion Detection For Cyber Security

Machine Learning-based systems act on flow features derived through exporting flow procedures. The notable emergence of Machine Learning and Deep Learning (DL) based reports presuppose that the flow of information, such as the average packet capacity, is gleaned from every packet. On common devices, However, when packet sampling is unavoidable, flow exporters are frequently used in practice. Since the flow of information is derived from a sampled group of the packets rather than the entire traffic stream, the usefulness of Machine Learning-based results with the use and existence of such samplings is still up for debate. In this study, we are going to investigate in what ways the effectiveness and performance of these ML-based are affected by packet sampling. Our suggested evaluation method is resistant to various flow export stage settings, in contrast to earlier studies. Hence, it can provide a robust evaluation even in the presence of sampling.

Published by: Mounika Maity, B. Pramod, N. Masthan Valli, Y. Pranathi, M. Mallikarjuna, V. Sathyendra KumarResearch Area: Cyber Security

Organisation: Annamacharya Institute of Technology and Sciences, Rajampet, Andhra PradeshKeywords: Supervised Learning, Anomaly Detection, Intrusion Detection, Random Forest, Neural Network, Decision Tree, Support Vector Machine, ML techniques, e-learning, and Principal Component Analysis.

Research Paper

20. A comparative overview of Ayurveda and Homeopathy with special reference to efficiency and limitation

This review article compares and contrasts Ayurveda and Homeopathy, two alternative systems of medicine that have been practiced for centuries. Ayurveda is an ancient Indian system of medicine that focuses on the balance between the mind, body, and spirit to promote overall health and wellness. Homeopathy, on the other hand, is a system of medicine developed in the late 18th century that uses highly diluted substances to stimulate the body's natural healing processes. The article presents a comprehensive review of the literature, discussing the efficiency and limitations of both Ayurveda and Homeopathy. While both systems have been found to be effective in treating various illnesses, Ayurvedic treatments can be time-consuming and require a significant lifestyle change, while Homeopathy has been criticized for its lack of scientific evidence to support its effectiveness. Therefore, patients should consult with a healthcare professional before choosing between Ayurveda and Homeopathy to ensure they receive the most appropriate treatment for their condition.

Published by: Dr. Ragini Bhardwaj, Prakash MehtaResearch Area: Ayurveda

Organisation: Lal Bahadur Shastri Mahila Ayurvedic College and Hospital, Bilaspur, HaryanaKeywords: Ayurveda, Homeopathy

Research Paper

21. A comparative overview of Ayurveda and Allopathy with special reference to efficiency and limitation

Ayurveda and Allopathy are two of the most popular systems of medicine in the world. Ayurveda, an ancient Indian system of medicine, is based on natural remedies and is widely used in India and neighbouring countries. Allopathy, on the other hand, is a modern system of medicine that uses synthetic drugs to cure diseases. The aim of this research article is to compare and contrast the two systems of medicine with special reference to their efficiency and limitations. The study employs a systematic review of existing literature on Ayurveda and Allopathy to compare the two systems of medicine.

Published by: Dr. Ragini Bhardwaj, Prakash MehtaResearch Area: Ayurveda

Organisation: Lal Bahadur Shastri Mahila Ayurvedic College and Hospital, Bilaspur, HaryanaKeywords: Ayurveda, Allopathy

Research Paper

22. Supply chain analytics on inventory management on small firms across Hyderabad

Small firms are mostly into retail operations in the very first stage of development. Inventory management describes the way resources are handled in the production process. Inventory management is a part of the supply chain which involves a sequence of activities starting from the procurement of raw materials from suppliers and ending with the distribution of products to the end customers. As inventory management is a subset of the supply chain, efficient management of inventory reduces the time taken for the movement of materials for operations. A study on Supply Chain Analytics on Inventory Management on Small Firms across Hyderabad. Efficient implementation of inventory management with respect to the supply chain helps organizations reduce the cost of operations and gain a competitive advantage in the industry

Published by: Dr. Aravinda Reddy M. N.Research Area: Business and Management

Organisation: Ramaiah Institute of Management, Bengaluru, KarnatakaKeywords: Value-Added Services, Positive Feedback, Customer Loyalty

Research Paper

23. DAR – DEFENCE ADVANCE ROVER

A Rover is an IOT-based robot that is basically designed to detect Landmines, Smoke, Fire, Alignment, Obstacles, and Radar to detect Movement. In this research we prepare a Rover as a prototype of a multi-functional robot and the purpose of it is to go to dangerous areas like collapsed places, and areas attacked by terrorists to collect every possible data of the situation and send it via wireless communication system (Remotely), as well as manually for the further actions. The main phenomenon of this Rover is to help the army by providing various information which usually is difficult and risky for a person to collect and send to the control center. The whole system operates wirelessly and sends each and every piece of data to the control center through signals, and shows live video footage directly to the control center, even if the camera is damaged the remaining sensors keep providing the data.

Published by: Kaushik Wagh R., Sagar Katekhaye, Holachi Vaishnavi, Ayush kumar, Aman Kalavadia, Jayanti kannaResearch Area: Information Science and Engineering

Organisation: Jain (Deemed-to-be University), Bengaluru, KarnatakaKeywords: IoT, Machine Learning, Robotics, and Arduino Algorithm

Research Paper

24. Design of low power single precision floating point multiplier

The floating-point multiplier is designed to provide high precision and low power for scientific simulations, engineering computations, and financial modeling applications. This paper explains a single precision floating point multiplier architecture using a Vedic multiplier. It takes two single precision floating point numbers as input and produces a single precision hovering point number as output. The proposed architecture uses a pipelined approach to increase the speed of the multiplier and to reduce the power and delay. The pipeline architecture allows multiple operations to be performed simultaneously, resulting in a faster multiplication operation. The proposed architecture generates product mantissa by use of a Vedic multiplier with a carry-save adder using a Multiplexer to reduce the power of the multiplier. The proposed architecture is compared with array multiplier-based single precision floating point multiplier and performance measures such as power and delay. The architecture will be performed in Xilinx Vivado 2016.4 software by selecting the ZED board.

Published by: A. V. Mutyalamma, Dr. G. Srinivasa Rao, K. Krishnaveni, S. Sivanandini, A . Dharani, N. Swathi Vijaya LakshmiResearch Area: VLSI

Organisation: Bapatla Women's Engineering College, Bapatla, Andhra PradeshKeywords: Single Precision Floating Point, Pipeline, Vedic Multiplier, Carry Save Adder, Array Multiplier

Research Paper

25. An Insight into the Sri Lankan economic crises

Due to years of economic mismanagement, poor administration, and bad policy decisions, Sri Lanka is presently going through one of its most crucial periods in history. Outside forces including the COVID-19 epidemic and Russia's invasion of Ukraine have also exacerbated the nation's issues, leading to its worst-ever crisis in 2022. Now, Sri Lanka is dealing with a number of issues, such as food insecurity, jeopardised livelihoods, and growing safety concerns. Everyone from all walks of life have been affected by the devastation caused by this catastrophe, but the poorest and most defenceless groups have been impacted the hardest. Sri Lanka routinely experiences natural disasters brought on by climate change, which exacerbates the already precarious position. These problems have broad repercussions, especially for weaker households and communities that suffer disproportionately from the current crisis. To solve these issues, immediate action must be made to guarantee enough food supply, stabilise markets, and assist impacted people.

Published by: Nihar Gandhi, Shulmit MadhavResearch Area: Economics

Organisation: Podar World College, Mumbai, MaharashtraKeywords: Recession, Bubble, Trade Deficit, Currency Crises, Foreign And Domestic Debt, Fiscal Deficit, Credit Booms, and Busts, Shocks, Underscores, Devaluation, Bail Outs, Effects Of Consolidation, Foreign Support, Global Imbalances, Sovereign Policies Failing, Unfledged.

Research Paper

26. Study on financial literacy and its effects on investment decisions using the Likert scale

Many people seek to educate themselves financially with the goal of saving money and taking advantage of financial products such as easy access to credit, profits gained in favorable circumstances, planning for retirement, and the ease of organizing property or land purchases, among other things. This goal is usually not met or only partly met due to a lack of financial literacy. As a result, we decided to conduct a study into how financially literate the Indian people are and whether financial literacy has anything to do with a person's financial decisions. The purpose of the study was to determine how financial education, financial behavior, financial attitude, and financial awareness affect investment decisions among the residents of Mumbai, India. This study was carried out through sampling, and structured questionnaires were used to acquire primary information.

Published by: Shlok Garodia, Ridhi Saraf, Rishi Kansal, Riya Gupta, Shreya GuptaResearch Area: Financial Literacy

Organisation: Anil Surendra Modi School of Commerce, Mumbai, MaharashtraKeywords: Financial Literacy, Financial Awareness, Investment Decisions, Inflation, Interest Rates, Stock Market, Banks, Credit Decisions Reserve Bank of India, GDP, Mutual Funds, Fixed Deposits, Chi-Square, Hypothesis, Likert Scale

Research Paper

27. Image classification of human action recognition using transfer learning in PyTorch

Over the years, deep learning models have been applied to human action recognition (HAR). due to the enormous amount of labeled data needed to train deep learning models, there has been a significant delay in the absolute development of these models. Data collection in sectors like HAR is challenging, and human labeling is expensive and time-consuming. The current approaches mainly rely on manual data gathering and accurate data labeling, which is carried out by human administration. This frequently leads to a slow and prone to human bias labeling data collection method. To solve these issues, we offered a novel approach to the current data collection techniques [1]. It is generally used that (CNN) is among machine learning models. Since Yann Lecun created this context in 1988, image identification has greatly improved. Transfer learning in image classification has simplified the process of training new models from the beginning and has reduced the number of data points that need to be processed, it was used in this project to classify human actions.

Published by: Amos OyetoroResearch Area: Computer Science

Organisation: Austin Peay State University, Clarksville, United StatesKeywords: Transfer learning, CNN, Model Pre-trained, Precision, Recall, PyTorch, Pandas, NumPy, Seaborn, Matplotlib, Scipy, ResNet18, Confusion Matrix

Research Paper

28. A method to detect diseased plant leaves using image processing in MATLAB

In the present World scenario, agricultural farming plays a crucial role as most of people depend on it. But in the current scenario, farmers are finding it hard as the plant leaves are being affected by various diseases in the yield. Tracking plant health and finding parasites for the good crop is essential to lessen disease spread and facilitate effective management practices. In order to bring down this problem and to increase the productivity of the crop, we have put forward a technique for detecting diseased leaves rather than examining them manually. Manual monitoring of leaf disease do not give satisfactory result as naked eye observation is an old method that consumes much time for disease recognition and also needs expertise, hence it is non-effective. In view of this, we introduced a modern technique to find out diseases related to leaves. To overcome the limitations of traditional eye observations, we used a digital image processing technique for fast and accurate disease detection of plant leaves. In our proposed system there exists a software solution for the automatic detection of plant leaf diseases using MATLAB software. The proposed approaches involve image pre-processing and feature extraction. The research work carried out has the potential to be used as an effective tool for the early detection and diagnosis of plant leaf diseases, which aids farmers to take preventive measures to reduce crop loss due to diseases infecting the crop and aids in enhancing economic growth.

Published by: E. Suneetha, Dr. G. Srinivasa Rao, M. Pavani, S.K. Akrimunnisa, Y. Priyanka, R. GeethikaResearch Area: Image Processing

Organisation: Bapatla Women's Engineering College, Bapatla, Andhra PradeshKeywords: Feature Extraction, Image - Processing, Gradients of Image, Laplacian Transform, Diseased Leaf-Diagnosis.

Research Paper

29. Wave Energy Convertor Technology

Ocean contains energy in the form of waves and tidal currents. Both can be used to produce electricity. Differential heating of the earth results in pressure variations in the atmosphere, which causes winds to be generated. Winds transfer some of their energy to the water when they pass over the surface of open bodies of water, resulting in the production of waves. The quantity of energy transferred and the magnitude of the ensuing wave are determined by the following factors: a) wind speed, b) wind speed over time, and c) wind distance. Wave energy conversion devices must generate a system of responding forces in which two or more bodies move relative to each other while at least one body interacts with the waves in order to extract this energy. A system like this can be designed to work with a variety of waves. Energy is extracted directly from surface waves or pressure variations below the surface via wave power devices. Generators store the energy taken from the waves. Offshore and onshore systems can both turn wave energy into electricity.

Published by: Ronit Shirish Shirodkar, Malhar Vitthal Zore, Aaditya Ram Bhogle, Rasika Rajesh Tambe, Nikhil Vijayan SarojiniResearch Area: Mechanical Engineering

Organisation: Rajiv Gandhi Institute of Technology, Mumbai, MaharashtraKeywords: Wave Energy Converter, Marine Renewable Energy, Designs

Research Paper

30. Phytochemical studies in blue-green and green algae

A Systematic study of plant crude drugs is embraced through the consideration of both primary and secondary metabolites which are derived from the process of metabolism. The primary metabolites such as carbohydrates, proteins, and lipids are used as food for human beings whereas the secondary metabolites such as phenols, alkaloids, flavonoids, lectins, steroids, and saponins are used for therapeutic purposes. The chemical composition of algae varies to some extent based on the growth conditions namely temperature, light, PH, and availability of nutrients. In the present investigation the presence of qualitative and quantitative phytochemicals namely Carbohydrates, proteins, Phenols, and flavonoids were carried out in Blue green alga Microchaete tenera and Green Algae Nitella tenuissima and Sphaeroplea annulina. The estimated carbohydrate rich in Nitella tenuissima (504mg/100gm) as compared to Sphaeroplea annulina (413mg/100gm) and Microchaete tenera, (301gm/100gm). Protein rich in Nitella tenuissima (624gm/100gm) as compared to Microchaete tenera (496mg/100gm).and Sphaeroplea annulina (350mg/100gm) and Phenol rich in Nitella tenuissima (252mg/100gm) as compared to Microchaete tenera, (204mg/100gm).and Sphaeroplea annulina (186mg/100gm).

Published by: Dr. Prashant KumarResearch Area: Botany

Organisation: Laxmi Venkatesh Desai College, Raichur, KarnatakaKeywords: Phytochemistry, Primary Metabolites, Secondary Metabolites, Microchaete Tenera, Nitella Tenuissima, Sphaeroplea Annulina

Case Study

31. Performance evaluation of Kubernetes cluster federation using Kubefed

We have entered the multi-cloud and hybrid age. The inevitable trend in cloud computing is application-oriented multi-cloud and multi-cluster architecture. Today's cloud applications must abide by a wide range of laws and rules. It is doubtful that a single cluster can follow all the rules. The scope of compliance for each cluster is decreased by the multiple cluster technique. We can move workloads between Kubernetes suppliers to benefit from new features and costs. This paper aims to describe an integration between multiple clusters running on the same cloud and evaluate their performance based on the Kubernetes Cluster Federation system. Some experimental evaluations were carried out with this goal in mind (Cloud Evaluation Experiment Methodology – CEEM) to monitor system resource behavior and availability, including network, disk, CPU, and memory. The test environment consists of a manually deployed Kubernetes cluster that was created. Azure Kubernetes Service (AKS) is the Cloud service provider considered. The Cluster Federation was performed using the Kubernetes Cluster Federation (KubeFed).

Published by: Ben-Salem Banguena E., Dr. T. Uma DeviResearch Area: Computer Science

Organisation: Gandhi Institute of Technology and Management University, Visakhapatnam, Andhra PradeshKeywords: Cluster, Container, Federation, Kubefed, Kubernetes, Virtualization.

Case Study

32. An interesting case of sebaceous horn: A rare case report

Sebaceous horn is an erupted cornified dermal nodular lesion that constituted of hyperkeratotic material. It is an unusual cutaneous lesion that is also termed as cornu cutaneum. These are found in areas like scalp, face, neck, and peripheral limbs exposed to solar radiation. Mostly these lesions are benign but underlying pre-malignant or malignant components are also encountered. We present an interesting and a rare case of sebaceous horn in 66-year male who presented to our out-patient department with an animal horn like cutaneous lesion for last 2 years. A 2-2.5 cm, brownish coloured, vertical cone shaped like horny projection was noted on the dorsal aspect of his left forearm. Because of having malignant potential, it is better to excise widely the horny lesion with a rim of 1 cm normal skin. Patient was operated as a day care procedure where wide local excision was performed taking 1cm rim of normal skin margin around the nodular lesion and sent for histopathological reporting. Histopathology report shown the lesion to have core of inspissated squamous epithelial debris material with peripheral rim of dead keratin or hyperkeratosis with adjacent normal skin. No malignant cells were found.

Published by: Arvind Kumar, Shadan AliResearch Area: Surgical

Organisation: Manipal Tata Medical College, Jamshedpur, JharkhandKeywords: Sebaceous Horn, Cutaneous Horn, Acathotic Squamous Cell, Hyperkeratosis, Solar Radiation

Research Paper

33. Acid-base titration using plant extracts as natural pH indicators

The analytical potential of the plant extracts is very promising as seen in its application in acid-base titration. Three plant extracts from Red Hibiscus flower powder (shoe flower) Turmeric powder, Henna Leaves powder were used as an indicator in strong acid-strong base titrations. A sharp and clear colour change was observed from Light Pink to Light Green for Red Hibiscus flower extract. These three extracts were in good agreement with the titre values obtained using phenolphthalein indicator. These flower extracts can be extracted using have a very simple, inexpensive, environmentally friendly procedure and excellent performance with sharp colour changes at the end points of the titration, which can replace the standard indicators being used in conventional laboratories with natural flower indicators.

Published by: Vaishnavi Shinde, Sukhada AkoleResearch Area: Biotechnology

Organisation: Modern College of Arts, Science, and Commerce, Pune, MaharashtraKeywords: Natural Indicators, Titration, Synthetic Indicators, Plant Extract, Acid-Base Titration, pH Range

Research Paper

34. Legislation of Artificial Intelligence

Alan Turing, “founder of computer science” , introduced artificial intelligence in his paper - “Computing Machinery and Intelligence” - in 1950. Artificial intelligence (AI), the ability of a digital computer or computer-controlled robot to perform tasks commonly associated with intelligent beings . This piece explores the emerging technologies of artificial intelligence and the regulations and legislations to control its impact in a beneficial way. AI was an evolved solution to support processes and aid humans in their daily lives. While it has many benefits to society such as better medical technology, it also has many ethical downsides. UNESCO, EU, UK and the FDA have come up with specific proposals for regulating the use of AI to maximise the benefits and minimise its drawbacks - the question remains, is it enough? What other solutions can be employed and is legislation of AI technology truly necessary or will it restrict innovation? This paper discusses the effect of AI on society and if regulations made by national and international authorities will become significant for its rapidly growing future.

Published by: Samaira GheekResearch Area: Computer Science and Artificial Intelligence

Organisation: The British School, New Delhi, DelhiKeywords: UNESCO, EU, UK, Ethics, Application, Unemployment, Automation, Capitalism, Digital Divide, Market Manipulation, Algorithmic Bias, Discrimination, Human Rights, Human Autonomy, Transparency, Privacy, Security, Dilemmas, Policies, Guidelines

Research Paper

35. Pedelec-power assist bicycle

In India, like developing countries, is highly dependent on a suitable, flexible, and economical or budget transport system. In India, with this technological upgrade, the number of people using two wheelers is gradually increasing, in 2016, the maximum use of two wheelers in India was 31%, but now it is around 55% and more. The gradual increase in this consumption is now suffering from the cost of fuel and the lack of power, which is limited and cannot be generated. The enormous use of these vehicles leads to environmental impacts as well as carbon emissions. So, in this article, we try to offer a solution to the above problems through our project, which is the "PEDELEC-Power Assist Bike". In this project, we design a bicycle that is a traditional electric booster (EPB) using a proportional booster strategy. The ratio is usually set to 1:1, meaning the motor will provide the same amount of assistance as the amount of human torque. The main goal of this project is to design a motor and generator set with dual charge and discharge batteries with suitable controllers that will provide sustainable energy and also a smaller battery capacity will help us travel longer distances.

Published by: S. Priyanka, S. Tharun, M. Aswath, A. ArchanaResearch Area: Electrical Engineering

Organisation: Kuppam Engineering College, Kuppam, Andhra PradeshKeywords: EPB, Pedelec, Battery, Bicycle

Research Paper

36. AI-based solar fed single phase induction motor drive

These days, induction motors will be employed in more applications, particularly in industries where items will be manufactured using induction motors. This project's primary objective is to use an effective controller and converter to feed solar energy to an induction motor. To get the solar panel's maximum power point (MPPT), we used fuzzy logic based on SEPIC converters in this project. This solar energy is given to the induction motor with the help of the voltage source inverter. By taking the motor speed as feedback we can vary the voltage out of the SEPIC converter with the help of the Arduino Uno. Due to this solar energy will be utilised in an efficient manner.

Published by: R. S. Mubarak, K. Harathi, Vikash Kumar, V. Pandiyan, P. R. RajeevResearch Area: Electrical Engineering

Organisation: Kuppam Engineering College, Kuppam, Andhra PradeshKeywords: SEPIC, MPPT, PWM, VSI, SPWM

Research Paper

37. IoT Based Smart Solar Inverter for Solar Power Generation

The integration of Internet of Things (IoT) technology in solar power systems has led to the development of smart solar inverters that can efficiently generate and manage solar power. In this paper, we present an IoT-based smart solar inverter for solar power generation. The proposed system consists of a solar panel, a smart inverter, and a battery bank. The smart inverter is equipped with sensors and communication modules that allow it to monitor the solar panel's output and communicate with the battery bank. The system's performance is controlled by an IoT platform that uses algorithms to optimize energy generation and storage. The proposed system is designed to improve energy efficiency, reduce energy costs, and increase the reliability of solar power systems. The experimental results demonstrate that the proposed system can efficiently generate and manage solar power, making it a promising solution for renewable energy generation.

Published by: P. Prakash, S. Nandha Kumar, K. Sathish Kumar, S. SreejithResearch Area: Renewable Energy System

Organisation: P.A. College of Engineering and Technology, Pollachi, Tamil NaduKeywords: Inverter, Solar Panel, IoT, Battery.

Case Study

38. Aesthetic enhancement of discolored non-vital teeth – A conservative approach

Anterior teeth are an integral part of facial aesthetics as they are involved in complex social and cultural interactions and have a high social impact. Discoloration of non-vital teeth is intrinsic in nature and can be of various aetiologies. A conservative treatment modality for managing such cases is through a non-vital bleaching technique. Many methods to bleach non-vital teeth have been suggested. The most recommended procedure is the walking bleach technique. This technique is known to be simple, safer, and more agreeable to both patients as well as dentists. The case reports in the present article aim to demonstrate the successful aesthetic rehabilitation of discolored non-vital maxillary anterior teeth using the walking bleach technique.

Published by: Dr. Pradnya V. Bansode, Dr. Madhuri Wavdhane, Dr. Seema D. Pathak, Dr. Swetha KannamparambilResearch Area: Conservative Dentistry and Endodontics

Organisation: Government Dental College and Hospital, Aurangabad, MaharashtraKeywords: Aesthetics, Non-Vital Bleaching, Conservative Technique, Walking Bleach Technique

Research Paper

39. A study of human wildlife conflict and co existence in Jaipur Rajasthan, India.

An observational study was carried out for understanding human wildlife conflict, its impact on nature and society and How human can co exist with wild species.

Published by: Kamal Vaishnav, Dr. Joy Gardner, Dr. Surabhi ShrivastavaResearch Area: Environment Science Wildlife

Organisation: University of Kota, Kota, RajasthanKeywords: Conflict, Co Existence, Mitigation, Leopard

Research Paper

40. MO-Auth: A Novel approach for authentication in modern applications

Technology has brought massive evolution in the application development process. The trend of online business has enhanced interest in migrating organizations towards modern technologies. Service providers, vendors, and clients are worried about security when valuable credentials of the organizations are placed online over the web. Therefore, security protocols and cryptographic techniques are used to prevent vulnerability. Several authentication techniques have been used to secure information, this article describes some of them. The concepts from three famous techniques were adopted to practice and propose a novel authentication method MO-Auth. Experimental work was conducted by implementing two web-based applications on which MO-Auth was tested. To validate results ISO/IEC 9126 quality characteristics were evaluated for each authentication method including MO-Auth. By considering ISO/IEC 9126 quality frameworks, we have found MO-Auth as easy to use, reliable, efficient, less cost, easy to maintain and much secure authentication method. Moreover, we have also conducted a survey-based on available features in modern applications, which indicates that usage of traditional authentication techniques is not decreased but still being used with the collaboration of modern technologies, while methods like OAuth and Biometrics are newer but their usage will be increased in future.

Published by: Syed Taimoor AliResearch Area: Web Technology

Organisation: Central South University, Changsha, ChinaKeywords: Authentication, Web Security, Web Technology, Information Security

Review Paper

41. Modern data warehouse & how is it accelerating digital transformation

Modern data warehousing is the practice of storing, organizing, and analyzing large volumes of data generated by modern data sources such as cloud-based applications, social media platforms, mobile devices, and the Internet of Things (IoT). This approach to data management has gained increasing importance in recent years as organizations seek to gain insights from their data to drive business value and improve decision-making. Modern data warehousing solutions offer a range of advanced features, including scalability, cloud-based architecture, real-time data processing, data integration, and data visualization. These features enable organizations to store and analyze large volumes of structured, semi-structured, and unstructured data from a wide range of sources, providing a single source of truth for decision-making. Overall, modern data warehousing has become an essential component of data-driven decision-making for organizations across a wide range of industries. By leveraging modern data warehousing solutions, organizations can gain valuable insights from their data, improve their competitive position, and drive business success. In this paper, we review modern data warehousing's key concept, technology, and the difference between traditional data warehousing and modern data warehousing.

Published by: Ashish DibouliyaResearch Area: Data Warehousing

Organisation: Webster Bank, Stamford, Connecticut, USAKeywords: Business Intelligence (BI), Data Warehousing (DW), Data Lake, Modern Data Warehouse, Data Warehouse

Research Paper

42. Ayurveda-an Indian perspective

The oldest medical system, Ayurveda, is now well-known and well-liked around the world. In addition to being a curative medical system, Ayurveda embraced the management approach, which aims to promote and avoid illness. Ayurveda has a substantial advantage over modern medicine, and it has become tremendous business potential for the growth of India's economy. The demand for herbal food items, nutritious food supplements, and immunity boosters has increased significantly throughout the world as people's awareness of the importance of good health and robust immune systems has expanded. Consumers are focused more on implementing various strategies to preserve long-term health as health and wellness is given more attention due to the shift in healthcare from curative medicine to proactive and preventative treatment. The global market for herbal medications is expanding as a result of the rising desire for all-natural alternatives. Ayurveda is now widely practiced across the world, with a market for its products worth Rs. 515.5 billion in India.

Published by: Ariya MaheshwariResearch Area: Business

Organisation: Jai Hind College, Mumbai, MaharashtraKeywords: Complete Life Science, Ahara ( Diet), Asana (Position), Ayurveda ( Knowledge Of Longevity), Naturopathy, Homeopathy, Yoga, Allopath, Ethno Medicine, Indian Economy, Raw Materials, Organic, Health Care, Post Covid, Quality Control, Uniformity, Clinical, Private Sector

Research Paper

43. Removal of turbidity and total dissolved solids by using natural and artificial coagulants

Turbidity is the measure of the relative clarity of a liquid. It is an optical characteristic of water and is a measurement of the amount of light that is scattered by material in the water when a light is shined through the water sample. The higher the intensity of scattered light, the higher the turbidity. Turbidity in the water creates both aesthetic and health issues. Surface water treatment plants remove particles because they can cause objectionable appearances, tastes, and odours and can interfere with disinfection. A wide range of natural coagulants, such as moringa seeds, banana peel, jatropha curcas, cassava peel starch, watermelon, pawpaw, beans, nirmali seeds, and okra have been studied previously. Natural coagulants in powder forms are usually added directly to wastewater. The most commonly used inorganic chemical coagulants in water treatment. Aluminium sulfate Al2(SO4)3 is the most commonly used chemical for coagulation in wastewater treatment. Additional commonly used coagulants include sodium aluminate NaAlO₂, ferric sulphate Fe2(SO4)3, and ferric chloride FeCl3. Wastewater can be destructive for the public because it contains a variety of organic and inorganic substances, biological substances, toxic inorganic compounds, and the presence of toxic materials. The coagulant chemicals and their associated products are resourceful but these may change the characteristics of water. The wastewater can be harmful for local uses, so we are going to treat this wastewater by removing turbidity and total dissolved solids by using natural & artificial coagulants. In this process, the wastewater will be treated for other uses like in construction for mixing with cement or curing and other works.

Published by: Diksha Jogdand, Anisha Koli, Leena Koli, Ankita Khandagale, Sanskruti DharmaleResearch Area: Civil Engineering

Organisation: Vivekanand Education Society's Polytechnic, Mumbai, MaharashtraKeywords: Turbidity, TDS, Coagulant, Eco Friendly, Filtration

Review Paper

44. Gul-e-Surkh (Rosa Damascene)- Queen of Flowers A Literary Review

Gul-e-Surkh(Rose) is known as the Queen of flowers because it stands for wealth, love, and purity. Gul-e-Surkh belong to members of the Rosaceae family. Hydrosol and essential oils are extracted from it and utilised as medicine. It is a medicinal plant with a Murakkabul Quwa temperament that is commonly cultivated throughout India. For therapeutic purpose, dried petals are utilised. It has several cosmetic benefits like it acts as natural moisturizer, has soothing effect, tones uneven skin and boosts collagen production as it is rich in vitamin c. In addition to this it is used as a Mullayin (Laxative), Muqawwi-e-Badan (General tonic), Mufarreh (Exhilarant), etc… Ibn Baitar has mentioned about the advantages of Arq-e-Gulaab (Rose water) on brain. This review article addresses the therapeutic applications and medical effectiveness of Gul-e-Surkh.

Published by: Dr. Umai Sumaiya Banu, Dr. Ayesha Tabasum, Dr. K. Tabassum, Dr. Sayema Khan, Dr. Wasima Swaleha, Dr. Mohammed AsjadResearch Area: Medical Science

Organisation: Government Unani Medical College and Hospital, Bengaluru, KarnatakaKeywords: Gul-e-surkh, Rose, Rosacea, Murakkabul Quwa, Hydrosol

Review Paper

45. The Impact of social media marketing on Small Businesses

Social media has become an integral part of modern marketing strategies, especially for small businesses. The following abstract examines the impact of social media marketing on small businesses. The study finds that social media provides small businesses with various opportunities to reach a wider audience and engage with their target customer group in real time. By creating a social media presence, small businesses are able to surge brand awareness, customer loyalty, and sales. However, social media marketing also presents various challenges such as keeping pace with constantly evolving social media platforms, ways to present content, managing customer feedback, and measuring the return on investment (ROI) of social media marketing campaigns. Overall, the study concludes that social media marketing has a positive impact on small businesses and can provide a competitive advantage in today's digital landscape. Small businesses that are able to leverage social media marketing effectively can enhance their brand image, build customer relationships, and increase profitability.

Published by: Shaurya KapoorResearch Area: Entrepreneurship, Economics

Organisation: Heritage Xperiential Learning School, Gurugram, HaryanaKeywords: Small Businesses, Small Enterprises, SMEs, Medium Enterprises, Social Media, Social Media Marketing, Online Marketing

Research Paper

46. Project Progress Monitoring Service Using Geospatial Server

The success of a project depends on efficient project monitoring. projects span across long duration and need that the same tasks be performed again and again over a number of brief segments to complete the job. Monitoring their development so becomes difficult. This is a matter of concern meanwhile Monitoring the project's development regularly can help ensure that resources are used and distributed effectively. The current methods of monitoring are either time-consuming, expensive, or necessitate a lot of human efforts. The study's goal is to examine the potential of using ArcGIS Pro to gather and visualize data for improved progress monitoring of linear projects. It also aims to make it possible for users - both operators and clients - to check the status of their projects online through dashboards and use as an operational tool for running their organization efficiently.

Published by: Mamta Soni, Dr. Sonali Ridhorkar, Dr. Sanjay BalamwarResearch Area: Remote Sensing, Geospatial Activities

Organisation: G. H. Raisoni Institute of Engineering and Technology, Nagpur, MaharashtraKeywords: Project Progress Monitoring, Geospatial, ArcGIS Pro, PostgreSQL, ArcGIS Enterprise, Web Server, Dashboard.

Review Paper

47. Therapeutic potential of Azadirachta indica (Neem) in skin disorders: A literary Review

Neem (Azadirachta indica) is a medicinal plant also known as Margosa. It is a member of the Meliaceae family and it possess many benefits in curing skin ailments. It also has an antioxidant effect hence it enhances immunity and promotes health. It has been widely used in Unani practice. Neem is being used as a medicine all around the world especially in India in prevention and management of many diseases. It is considered as safe medicinal plant and exhibits very less adverse effects. It has wide variety of properties that can be used in treating many diseases. It possesses antibacterial and anti-inflammatory properties which help in soothing the skin. It contains nutrients like amino acids and polysaccharides. It is also known for its Daf-e- taffun, Daf-e-Ufoonat and Muhallil awram properties hence making it more beneficial to use in skin diseases.

Published by: Dr. Sayema Khan, Dr. Mohammed Asif Siddiqi, Dr. Ayesha Tabasum, Dr. K. Tabassum, Dr. Umai Sumaiya Banu, Dr. Wasima Swaleha, Dr. Mohammad AsjadResearch Area: Medical Science

Organisation: Government Unani Medical College and Hospital, Bengaluru, KarnatakaKeywords: Neem, Skin Diseases, Muhallil Awram, Anti-Bacterial

Research Paper

48. Experimental study of the effect of primary nozzle position on the performance of jet ejector

In this work the effect of primary nozzle positions relative to the mixing section in an ejector on the performance of the air ejector are investigated. Air jet ejector and four types of nozzles are designed and constructed. Two nozzles are circular and the other two are squared. Then an apparatus is designed and constructed to achieve the ejector performance (enhancing the entrainment ratio). Due to the rapid decreasing of air flow rate coming from air reservoir of the compressor to the ejector, a data acquisition system is used to record different measurements such as pressure, temperature and velocity at different locations on the test apparatus. The convergent nozzle can be moved to study the effect of nozzle positions on the ejector performance. Tests are carried out at three different positions for each nozzle, the distance between it was equal. At the 1st position, the exit section of the primary nozzle is located just at the inlet plane of the mixing section of the ejector. At the 2nd position, the exit section of the primary nozzle is shifted 8.5 mm before the inlet plane of the mixing section. For the 3rd position, the exit section of the primary nozzle is shifted 17 mm before the inlet plane of the mixing section. From detailed analysis of experimental results, it is found that: The performance of the ejector is affected by the nozzle position, and the optimum position which achieves a maximum entrainment ratio for all nozzles is at position (1), (nearest position to mixing section of the ejector. But the entrainment ratio increases when the nozzle is placed at position (2) in case of the small squared nozzle. Position (3) is the worst position for all nozzle and achieves minimum entrainment ratio. Regardless the position of the primary nozzle, there is a strong relation between the nozzle exit area and the performance of the ejector, i.e. decreasing of primary nozzle exit area increases ejector entrainment ratio.

Published by: Hosam Eldin Elsayed Mohamed, Narmine Hussien Mahmoud, Nabil AbdelAziz Mahmoud, Ahmed Reda El-BazResearch Area: Mechanical Engineering

Organisation: Fahad Bin Sultan University, Tabuk, Saudi ArabiaKeywords: Ejector, Air Working Fluid, Nozzle Positions, Circular Nozzle, Entrainment Ratio.

Survey Report

49. A survey to understand the doctors’ perception of laboratory diagnostics

Clinical laboratories play a crucial role in the healthcare system by assisting doctors in diagnosing and treating patients. In India, there are numerous diagnostic facilities available to doctors and patients, but chain laboratory facilities have demonstrated some advantages over traditional laboratory facilities. To gain insight into the perspective of doctors regarding chain diagnostic facilities, we conducted a survey that focused on Thyrocare Laboratories Ltd, one of the oldest and most established chains in India. A total of 1038 doctors from various specialties and regions were surveyed through both online and offline channels, and the results indicated that almost all doctors (98%) considered laboratory testing to be important for diagnosis. Among these doctors, 83% were aware of Thyrocare Laboratories. Additionally, 9 out of 10 doctors aware of Thyrocare Laboratories stated that they would recommend Thyrocare to patients for pathology evaluations (91%), that the reports from Thyrocare were accurate and reliable (92%), and that their patients had a satisfactory experience with Thyrocare (93%). These survey findings indicate that Thyrocare has a strong market position and is highly regarded for delivering high-quality reliable test results.

Published by: Pooja Takudage, Dr. Mitali Kapoor, Samruddhi BhideResearch Area: Diagnostics

Organisation: Medicca Press Limited, Pune, MaharashtraKeywords: Pathology, Chain Laboratory, Diagnosis, Testing, Accuracy, Reliability

Research Paper

50. Clinical audit on diagnosis and management of hypertension in a primary medical care setting in Sri Lanka

Hypertension has been a leading cause of premature deaths worldwide and it is more prominent in low and middle-income countries and rising. Proper diagnosis and management of hypertension can reduce complications and disability. A new protocol to manage hypertension in primary medical care centers was introduced by American Heart Association to reduce the cost of treatment while managing the patients properly. It was introduced in PMCs of Kalutara district in Sri Lanka with the help of the Resolve to save lives organization. This clinical audit was conducted in 3 PMCs with 163 participants to identify lapses before scaling up the project to more PMCs. It was found that the mean time taken from the first BP measurement to the second measurement in the 140-159/90-99mmHg group (Group A) was 1.07 weeks (SD=2.04 weeks) while the protocol requires measuring the second value between 2 to 4 weeks. Out of basic investigations, FBS and Serum Cholesterol levels were done in 56.4% and 38% of the participants respectively while ECG and UFRs completed in the study were very less. Further, 55.4% (n=87) of the participants aged 80 years or less were managed with 2 drugs according to the protocol while only 20% (n=1) of the patients aged more than 80 years were managed with 1 drug according to the protocol. Only 22 (45.8%) out of 48 participants who required stepping up of drug management was correctly done. Furthermore, the variation between the 3 hospitals in results was, considerable. The requirement of training for healthcare workers in PMCs to standardise the management was emphasized while the resource allocation for laboratory services for investigations was highlighted after the study.

Published by: Dr. W.P.Y.G. Pathirana, Dr. SGD Sasanka, Dr. S. Nandasena, Dr. Yasas Kosala, Dr. Udaya Rathnayaka, Dr. Champika WickramasingheResearch Area: Health

Organisation: Postgraduate Institute of Medicine University of Colombo, Colombo, Sri LankaKeywords: Clinical Audit, Hypertension, Diagnosis And Management, Primary Medical Care Centres, Kalutara, Sri Lanka

Research Paper

51. A perspective of the residents on the annoyances and problems of street trees in Visakhapatnam city, Andhra Pradesh, India.

Street trees are an integral component of urban resident’s life. The environmental, economic, and social benefits they provide to residential and commercial areas are crucial for the maintenance of healthy communities. Urban areas cannot function properly without street trees. Despite trees' many benefits, it is important to remember that if they are not properly planned, planted, and maintained, they can become a source of trouble, additional expense, and even danger. Since most of this study is conducted in the Visakhapatnam metropolitan city, it is unclear if these results may be generalized to other city communities or nations. A one-way ANOVA test is performed to see any significant difference in the overall opinion of each annoying factor given by the local neighborhood residents from different study areas in Visakhapatnam city. Generally, people like street trees and their surroundings, and six community respondents rated annoyances as more serious. According to questionnaire surveys, hidden traffic signs and preventing sunlight from entering homes are two of the greatest annoyances of street trees. Before proceeding to the next and final phase of the investigation, they will undoubtedly generate some preliminary ideas for potential responses. All of these must be completed so that suitable street trees can be incorporated into the final design in the future.

Published by: Allu Revathi Devi, Vijayalaxmi J., Ramesh SrikondaResearch Area: Urban Design

Organisation: School of Planning and Architecture, Vijayawada, Andhra PradeshKeywords: Street Trees, Annoyance, Perceptions, Annoyance, and Neighborhoods

Research Paper

52. Clusteroids App

Clusteroids is a comprehensive Flutter-based mobile application designed to cater to the needs of various users in educational institutions. The app comprises five modules, namely Admin, Student, Teacher, Management, and Alumni, each equipped with unique features and functionalities. The admin module allows authorized personnel to manage the app's content, user accounts, and various settings. The student module provides access to student-specific information such as schedules, grades, attendance records, and other academic-related details. The Teacher module enables teachers to access their class schedules, manage attendance records, grade assignments, and communicate with students and parents. The Management module allows institutional management employees to monitor student and staff records, track finances, manage human resources, and perform other administrative functions. The Alumni module enables former students to stay connected with the institution, access their academic records, and participate in alumni events.

Published by: S. Kumar Dhananjaya, Dr. Ranjit K. N., Shashank Gowda N.M., Shashank S., Yashwanth S. M.Research Area: Computer Science and Engineering

Organisation: Maharaja Institute of Technology, Thandavapura, KarnatakaKeywords: Clusteroids, Admin, Student, Teacher, Management, Alumni

Research Paper

53. Assessment of Steering Knuckle by DFMAE Method

Steering knuckle is the main part of the steering and suspension system various link of suspension and steering are linked to it and depend on the steering knuckle. Therefore, it requires high precision, quality and durability. The strength component is always in demand for race car application. Earlier if the knuckle fails the design team used to modify the design part by trial and error method. Now we are using DFMAE method followed by experimental analysis. The two step process has been used for the same. First part involves modeling and analysis of steering knuckle by CATIA V5 R21 and ANSYS 16.0. The second step is experimental stress analysis by using strain gauge. Strain gauge is component which senses the stress acting on component and the give the result in form of stress vs time. In automotive suspension, the knuckle is the main part through the suspension wishbone link are connected and the suspension spring are on the wishbone. The hub and braking systems are mounted on the steering knuckle to complete the wheel assembly. The wheel and tyre assembly attach to the hub or spindle of the knuckle where the tire/wheel rotates while being held in a stable plane of motion by the knuckle/suspension assembly. Failure region were identified from the static and dynamic analysis and results compared to experimental analysis by using strain gauge. And this analysis carried out under all operating conditions.

Published by: K. L. Bhoite, Dr. S. M. BhosleResearch Area: Mechanical Design

Organisation: Pune Institute of Computer Technology, PuneKeywords: DFMAE Method, Stress Analysis, Strain Gauge

Others

54. MARZ-E-WARM-E-AANA/ WARM-E-RAHIM (PELVIC INFLAMMATORY DISEASE): A REVIEW

Pelvic inflammatory disease (PID) is the commonest disease of the reproductive-aged, sexually active women, that leads to serious complications if left untreated. It is a polymicrobial infection caused by chlamydia, trichomonas but can occur from other sources of bacteria. PID is diagnosed in more than one million women each year in the United States. In classical Unani texts, Waram-Al-Rahim manifests specific as well as associated symptoms due to anatomical proximity of the uterus, and other causes like derangement in Akhlat, asbab-i-badiya o sabiqa etc causing the Rahim to easily affected & disturbed Af’al-i- Tabiyya which if it is not treated adequately, it becomes warm al rahim sulab which is difficult to treat. Various compound formulations are mentioned in Unani classical text for Waram-Al-Rahim possessing the properties of Musaffi-E-Khoon, muhallil warm, dafia’h ta’ffun, dafia’h huma, muqawiyat, Qabizat, Radi, etc. This review article gives a detailed description of waram al-rahim including its causes, pathogenesis, sign and symptoms, and principle of treatment in the Unani system of medicine.

Published by: Khadeja Siddekha, Umraz Mubeen, Aisha Anjum A., Manjula S., MD Aijaz, Athiya AnjumResearch Area: College

Organisation: Government Unani Medical College and Hospital, Bengaluru, KarnatakaKeywords: Waram al-Rahim, Pelvic Inflammatory Disease, Unani System, Akhlat

Review Paper

55. Kafe Darya (Cuttlefish bone): “Therapeutic potential in Unani system of medicine: A Comprehensive review”

Kafe Darya (cuttlefish bone) is one of the most important animal-origin drugs used in the Unani system of medicine for various disorders. It is used as an ingredient in various unani formulations. Over 200 animal-origin drugs are used in the Unani system for treating various ailments, and ‘kafe dariya’ is one of the most important among them. There are five to six types of ‘kafe dariya,’ each with different properties and uses. ‘Kafe dariya’ is used externally to treat skin inflammation, anti-inflammatory (muhalil), pigmentation, and other skin diseases such as ringworms and scabies. It is also used internally for treating headaches, insomnia, gonorrhoea, and renal calculi (mufttihwamukhrijehasa). ‘Kafe dariya’ is rich in calcium and other bioinorganic elements such as magnesium, strontium, iron, and trace amounts of copper and zinc, making it an excellent source of these nutrients.

Published by: Dr. Wasima Swaleha, Dr. Nusrath Fathima, Dr. Ayesha Tabasum, Dr. Umai Sumaiya Banu, Dr. Sayema Khan, Dr. Mohammed AsjadResearch Area: Medical Science

Organisation: Government Unani Medical College and Hospital, Bengaluru, KarnatakaKeywords: Kafe Darya, Cuttlefish Bone, Muhalil, Mufttihwamukhrijehasa.

Research Paper

56. Accurate ball detection in field hockey videos using YOLOV8 algorithm

Accurately detecting the ball in field hockey videos is crucial for various applications such as player tracking, tactical analysis, and performance evaluation. This paper presents a detailed method for accurate ball detection using the YOLOv8 algorithm, which is renowned for its accuracy and real-time object detection capabilities. The proposed approach involves training the YOLOv8 model on a specialized dataset comprising annotated field hockey videos to enable precise ball identification and localization. Experimental evaluation using comprehensive metrics, including precision, recall, and mean Average Precision (mAP) demonstrates the effectiveness of the proposed method, showcasing high levels of accuracy and efficiency. By automating the ball detection process, this approach significantly reduces manual effort in field hockey video analysis and opens opportunities for advanced analytics, providing deeper insights into player behavior, strategic patterns, and overall game dynamics. The proposed method empowers researchers, coaches, and analysts to gain a comprehensive understanding of field hockey matches and make data-driven decisions to enhance team performance.

Published by: Suhas H. Patel, Dr. Dipesh KamdarResearch Area: DEEP LEARNING, COMPUTER VISION

Organisation: Gujarat Technological University, Ahmedabad, GujratKeywords: Ball detection, Object Detection, YOLOv8, Field Hockey, Video Analysis

Research Paper

57. DXPs Digital Experience Platforms transforming fintech applications: Revolutionizing Customer Engagement and Financial Services

This research paper explores the application of Digital Experience Platforms (DXPs) in the field of financial technology (fintech) and their impact on customer engagement and the delivery of financial services. DXPs have emerged as transformative solutions that enable fintech companies to provide personalized and seamless digital experiences to their customers. This paper examines the specific use cases of DXPs in fintech, the benefits they offer to both customers and financial institutions, and the challenges involved in their implementation. Through a comprehensive analysis of literature and case studies, this research aims to shed light on the significance of DXPs in shaping the future of fintech. Digital experience platforms has capabilities to transform fintech applications. In this paper we will evaluate & compare two DXP solutions i.e. liferay DXP & Backbase DXPs along with that we will look into Digital transformation Strategy, Digitization of fintech applications, also common limitation where we should avoid DXPs.

Published by: Sourabh Sethi, Dr. Shailesh Kumar ShivakumarResearch Area: Digital Experience Planforms

Organisation: Infosys LimitedKeywords: DXP, Digital Experience Platforms, Liferay, Backbase, Fintech integration, Banking and Finance Portal Solutions

Review Paper

58. Marz akyas khusytur rahem (polycystic ovarian disease): A review

Polycystic ovarian disease (PCOD) is a common and pervasive endocrine disorder with multiple phenotypes and varied presentations. It starts to appear at 15-25 years of age and it may take years for its clinical presentation to appear. The incidence of PCOD is 4-22%. The symptoms of PCOD include irregular periods, hirsutism, acne, obesity, etc. PCOD is observed as a lifestyle disorder associated with an increased risk of reproductive problems including infertility, recurrent miscarriage, endometrial cancer, late menopause, and metabolic aberrations including insulin resistance, type 2 diabetes mellitus, dyslipidemia, and cardiovascular diseases. Unani concept: The Unani word for PCOD is Marz Akyas Khusytur Rehm. Unani physicians have classified this disease under the following headings: obesity, phlegmatic diseases, amenorrhea, and liver disorders. Unani concept of PCOD is primarily based on the dominance of khilte Brigham (Phlegm). It has been given in Unani classical books that sue mizaj barid (Abnormal cold temperament) of the liver may lead to abnormal production of balgham (phlegm). Ibne Sena and majusi mentioned the causes of ehtebaas e tams(amenorrhea) are khilte Brigham, and sue mizaj barid of reham and same mufarrit (Obesity). Again khilte Brigham is one of the causes of obesity. Due to obesity narrowing of the lumen of blood vessels develops and reduces blood circulation and sue mizaj barid causes an increase in the viscosity of humors. Unani physicians have recommended regular induction of menstruation as one of the treatment modalities applied for women who have developed masculine features suggestive of PCOD. They have given a line of management based on correction of temperament, menstrual regulation by use of emmenagogue drugs, and the local application of herbs to reduce the severity of hair growth, acne, and hyperpigmentation due to PCOD.

Published by: Dr. Md Aijaz, Dr. Umraz Mubeen, Dr. Aisha Anjum A., Dr. Manjula S., Dr. Khadeja Siddekha, Dr. Noorsabha, Dr. Athiya AnjumResearch Area: Medical Science

Organisation: Government Unani Medical College and Hospital, Bengaluru, KarnatakaKeywords: PCOD, Marz Akyas Khusytur Rahem, Phlegmatic diseases, Unani Medicine

Online paper publication is ongoing for the current issue and authors can submit their paper for this issue until Ongoing Submissions.