Manuscripts

Recent Papers

Research Paper

To Predict Calories Burnt During Various Physical Activities Like Walking, Running, Cycling, & Swimming

This study aimed to create a new model to compute the number of calories expended during activities like swimming, cycling, running, and walking. We used vast data based on various criteria, including Vigor, activity duration, body heat, and heart rate. Our model estimates calorie burns accurately by using machine learning. Our model can be used for tracking personal exercise, controlling obesity, and improving sports performance by estimating calorie burn across different physical activities using the Mifflin St. Jeor equation. I am building a Kaggle dataset with crucial variables like heart rate, body temperature, and activity duration.

Published by: Abhishek Shivprakash Jaiswar, Dr. Swati Maurya

Author: Abhishek Shivprakash Jaiswar

Paper ID: V11I2-1281

Paper Status: published

Published: April 22, 2025

Full Details
Research Paper

Cybersecurity and National Security: Constitutional Issues in Digital Governance

The research examines security connections between AI advancements and national security and constitutional governance within the Indian framework. Digital development in India has created obstacles for its constitutional framework that must balance cybersecurity requirements with cyber liberties safeguards. The closed connection between cybersecurity systems and national defence created new regulatory gaps requiring fresh constitutional reform. This paper examines how fundamental rights in Articles 19 and 21 of the Indian Constitution protect against digital threats. The Proportionality standard created in the Puttaswamy judgment for examining security measures has not been correctly executed within Indian cybersecurity governance operations. The separation of cyber threat responsibilities between the state and national governments remains unclear because traditional federal administrative structures cause difficulties when facing cross-jurisdictional threats. The original Information Technology Act of 2000 in India exists as pre-modern legislation to defend citizens against executive surveillance, but remains inadequate in these matters. The adoption of artificial intelligence technologies by national security operations creates constitutional tensions through machine-learning techniques that lead to issues explaining algorithm operations and automated system procedures. Previous judicial decisions in their outcomes and international cybersecurity strategies serve as research material to identify effective constitutional oversight models. The paper presents three proposed reforms establishing dedicated oversight bodies to enforce surveillance oversight and judicial supervision of security operations and set controls for AI systems in security applications. Analyzing Indian cybersecurity policies against constitutional requirements for security and personal rights enhances digital constitutional evolution beneficial to nations working on developing digital regulatory frameworks for people safety and national security.

Published by: Rituraj Malik

Author: Rituraj Malik

Paper ID: V11I2-1265

Paper Status: published

Published: April 22, 2025

Full Details
Research Paper

Personalized Medicine Using AI and Genomics

A conceptual change in healthcare, personalized medicine uses an individual's genetic profile to forecast disease risk, customize drug treatments, and increase patient outcomes. With its great genomic variety, the development of such systems is hampered in the Indian setting by the scarcity of region-specific, annotated clinical datasets. Using IndiGenome and PharmGKB as main references, this work presents a framework for combining genomic and pharmacogenomic data to enable personalized medicine. A manually built dataset with standardized notations was produced to replicate patient data due to integration difficulties between accessible datasets. This enabled the application of treatment logic and important gene mutations (BRCA1, BRCA2, TP53) based on working artificial intelligence. Future deployment with actual genomic data builds on this Streamlit-based application, which is able to predict treatments and provide health recommendations.

Published by: Khan NavidShaba

Author: Khan NavidShaba

Paper ID: V11I2-1257

Paper Status: published

Published: April 19, 2025

Full Details
Research Paper

The Development and Importance of Complex Numbers in Mathematics

The journey of complex numbers from mathematical heresy to fundamental scientific tool represents one of the most remarkable intellectual transformations in history. These numbers of the form a + bi (where i² = -1) have transcended their origins in algebra to become indispensable across physics, engineering, and technology. This comprehensive study examines their historical evolution, deep mathematical properties, and unparalleled applications that continue to shape modern science. Through detailed analysis of pivotal developments, we demonstrate how complex numbers provide the mathematical language for describing phenomena from quantum entanglement to wireless communication.

Published by: Aniruddha Kumar

Author: Aniruddha Kumar

Paper ID: V11I2-1256

Paper Status: published

Published: April 19, 2025

Full Details
Research Paper

Sign Language Translator

Sign language is a fundamental mode of communication for the deaf and hard-of-hearing yet there is often a gap in understanding between sign language Operators and the broader population. this search introduces amp real-time house speech Explainer mature exploitation tensorflow mediapipe and opencv specifically organized to Method arsenic associate in nursing informative drive that acquired immune deficiency syndrome non-signers inch acquisition house speech. The system translates sign language gestures into spoken language while providing interactive Characteristics that allow Operators to practise receive feedback and Improve their signing Precision. done Fancy motion credit and judgement Operators get increasingly arise their skills devising house speech acquisition available and visceral. This paper details the system's Structure Applyation and real-world Use emphasizing its potential to Improve communication and inclusivity across linguistic communities by fostering a broader understanding of sign language.

Published by: Khan Nausheen

Author: Khan Nausheen

Paper ID: V11I2-1246

Paper Status: published

Published: April 18, 2025

Full Details
Research Paper

Autonomous AI Agents for Real-Time Financial Transaction Monitoring and Anomaly Resolution Using Multi-Agent Reinforcement Learning and Explainable Causal Inference

Real-time financial fraud detection systems face significant challenges from adversaries' continually evolving attack strategies. Traditional static classifiers fail to adapt to these changes and often lack interpretability, leading to false positives and missed anomalies. This paper proposes a novel framework combining Multi-Agent Reinforcement Learning (MARL) with Explainable Causal Inference for transaction anomaly detection and resolution. A defender agent learns to identify and intercept fraud in an adversarial environment where an attacker agent simulates fraudulent behaviors. The agents interact within a stochastic game setting and are trained using a centralized critic and decentralized policies. A causal inference module constructs a directed acyclic graph over transaction features to enhance interpretability and applies do-calculus and counterfactual reasoning to explain flagged transactions. We implement a scalable, real-time deployment architecture and evaluate the system using simulated and real transaction data. Results demonstrate that our MARL-based agent outperforms static classifiers in adaptability and recall, while the causal module reduces false positives and provides transparent justifications for fraud decisions. This combination of adaptability and explainability makes the system highly suitable for practical deployment in financial institutions..

Published by: Akash Vijayrao Chaudhari, Pallavi Ashokrao Charate

Author: Akash Vijayrao Chaudhari

Paper ID: V11I2-1252

Paper Status: published

Published: April 18, 2025

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X