Manuscripts

Recent Papers

Review Paper

Study of 5G network slicing

Network operators deploy currently the 5th generation (5G) of the cellular network and many manufacturers commercialize new 5G end-user devices. It is the first step in the development of 5G still the 5G potential is far from being reached. Network slicing is one of the main 5G technologies for the researcher’s community. Many heterogeneous services like voice communication, video streaming, e-health, vehicular communication are provided and flexibly by exploiting the 5G infrastructure. Security is a critical aspect like every new technology. In this paper, security in 5G network slicing is highlighted life-cycle security, intra-slice security, and inter-slice security along with threats and recommendations are highlighted in this paper.

Published by: Juhi Singh

Author: Juhi Singh

Paper ID: V7I6-1305

Paper Status: published

Published: December 17, 2021

Full Details
Case Study

Role of Swamji Vethathiri maharishi’s acupressure 14 points exercise therapy in the effective management and wellness of hypertriglyceridemia to a near-normal level found on a 59-year-old male teacher

We reported a 59-year-old male school teacher with a history of higher-level Triglyceride (295mg/dL) (Hypertriglyceridemia) associated with vertigo problems and a significant reduction in the higher Triglyceride levels to a near-normal level (140mg/dL) and a total recovery from vertigo problems through a regular practice of Acupressure 14 points exercise therapy, designed by Swamiji Vethathiri Maharishi, a South Indian born Saint and Savant (1911-2006) was followed. Acupressure 14 points exercise therapy was practiced by the teacher for nearly six month’s duration Unintermittently and that too 3 times per day at an interval of four hours duration. This resulted in a complete recovery from the agonizing vertigo problems and a significant reduction to a near-normal triglyceride level. Acupressure 14 points exercise therapy designed by Swamiji Vethathiri Maharishi is a legacy delivered by him to the welfare of mankind It can be very well said that this Acupressure 14 points exercise therapy is a non-pharmacological, complementary alternative medicine (CAM) which is very safe to use, involves no side effects and, very inexpensive therapy.

Published by: Dr. C. Vijayalakshmi, V. Devarajan

Author: Dr. C. Vijayalakshmi

Paper ID: V7I6-1304

Paper Status: published

Published: December 17, 2021

Full Details
Research Paper

The relevance of TVET education in preparing graduates for the labor market in Kenya

The economy of Kenya is an industrializing one with a number of manufacturing and service industries and robust service sectors that are all well established. In order to support the continued growth of these industries, it is necessary to ensure that the TVET training institutions produce graduates with competencies that are relevant to the world of work. This study sought to assess the relevance of TVET education in preparing graduates for the labor market. The research design employed was a simple random sampling method with a sample population of 91 comprising of TVET graduates and the Heads of Departments drawn from TVET institutions engineering departments in Rift Valley and Nairobi regions. A large number of the academic Heads of Department in TVET institutions respondents disagreed that the skills and experience in training prepare the graduate well for the labor market. The majority of the graduate respondents disagreed that the skills and experience in training prepare graduates ready for the labor market. This study was guided by one research objective, to determine the relevance of TVET education in preparing graduates for the labor market.

Published by: Aluoch John Rays Jeremy, Dr. Hosea Kiplagat, Christopher Wosyianju

Author: Aluoch John Rays Jeremy

Paper ID: V7I6-1283

Paper Status: published

Published: December 16, 2021

Full Details
Research Paper

Optimized data hiding based steganography approach to secure the confidential information in smart grid

The standard electrical power grid is integrated with information and communication technologies in a smart grid (ICT). Such integration empowers electrical utility providers and consumers to increase the efficiency and availability of the power system and allows customers' needs to be continually monitored, controlled, and managed. A smart grid is a massive, complicated network made up of millions of linked objects and organizations. With such a large network comes a slew of security problems and flaws. Cryptography and steganography algorithms have been applied to give security in SG. The steganography algorithm hides the important data in the cover media to provide imperceptibility to the attacker. Image is the most essential cover media in steganography. The least significant bit (LSB) method is used to hide the confidential information in the cover image. The hiding process provides variability in the cover image. In this paper, an optimized data hiding method is proposed to reduce the variability. The proposed method has two phases. In the first phase, the confidential information bits are matched with LSB bits of a cover image pixel. For matching purposes, an original or complemented form of confidential information bits is matched with cover image pixel and if a match is found then the index is determined. In the second phase, the indexes are hidden in the cover image in an optimal way using the JAYA optimization algorithm. The optimization algorithm searches the optimal starting point in the cover image for index hiding. After searching the optimal starting pixel, hide the index using the k-bits LSB method. The proposed method is simulated in MATLAB and performance analysis is done using various parameters. The simulation outcomes represent that the presented method is better than existing methods.

Published by: Angrej Singh, Puneet Jain

Author: Angrej Singh

Paper ID: V7I6-1292

Paper Status: published

Published: December 15, 2021

Full Details
Research Paper

BārahMāha and Sṛṅgāra Rasa : Seeking Union With God

BārahMāha, as the title unfolds, is the description of twelve months in which the emotions and yearnings of the human heart are expressed in terms of the changing moods of Nature over the twelve months of the year. In it, the mood of Nature in each month depicts human soul longing for union with God, the way a woman longs her spouse or lover. Here the human soul the protagonist which suffers in the cesspool of transmigration as a result of its separation from the Supreme Soul. The present paper aims at hatching the graph of the journey of human soul, depicting the pangs of separation of the bride through twelve months, i.e., the human soul separated from her Divine Essence in the light of śṛngārarasa. Following the footsteps of Guru Nanak, Guru Arjan also adopted the folk poetry style for his compositions. Present paper elaborates the Guru Nanak’s BārahMāha.

Published by: Balvinder Kaur

Author: Balvinder Kaur

Paper ID: V7I6-1286

Paper Status: published

Published: December 14, 2021

Full Details
Research Paper

Famous cyber attacks in the history of cyber security

As we move forward toward technology and digitization, we have witnessed a frequent rise in Cyber Attacks resulting in various data leaks. Cyber Attackers are capable of keeping their identity hidden and staying low while gaining access to the data. To avoid all this we require to carry a full-fledged analysis of different types of cyberattacks for the purpose of educating people and making them aware of different types of cyber-attacks that exist and secure their data. In this research paper, I will analyze the most famous cyber attacks in the history of cyber-security: WannaCry Ransomware, Nasa Cyber-attack, Estonia Cyber-Attack, Sony Pictures Cyber-attack, Melissa Virus Cyberattack, etc.

Published by: Zaid Ahmad Rather

Author: Zaid Ahmad Rather

Paper ID: V7I6-1281

Paper Status: published

Published: December 14, 2021

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X