High Impact Factor : 7.883
Submit your paper here

Impact Factor

7.883


Call For Paper

Volume: 11 Issue 05 May 2025


Download Paper Format


Copyright Form


Volume - 11 Issue - 3


Volume: 11 Issue: 3 March 2025

A Study On Effect Of Pollution On Land And River Due To Discharge Of Paper Packing Factory In Erode District By Using GIS

Area of research: Civil Engineering

Erode City, Which Serves As The Headquarters Of Erode District, Is Beautifully Situated Along The Banks Of The Cauvery River In Tamil Nadu. Geographically, It Sits Between The Latitudes Of 11° 17’ N And 11° 23' N, And The Longitudes Of 77° 40’ E And 77° 46' E, Covering An Approximate Aerial Extent Of 120 Km. The City Relies Heavily On The Cauvery River For Its Drinking Water Supply. Besides This River, The Local Population Also Taps Into Groundwater Resources To Meet Their Domestic, Agricultural, And Industrial Needs. However, Rapid Urbanization And Poor Waste Disposal Practices Have Led To The Contamination Of Both Groundwater And Surface Water In The Area. Currently, The City's Municipal Solid Waste Is Dumped In Open Landfills At Three Main Sites: Vendipalayam, Vairapalayam, And Semur. The Leachate From These Open Dumps Is Directly Polluting The Groundwater And Surface Water, Making It Unsuitable For Drinking In Many Areas. To Tackle This Issue, A Comprehensive Study Was Conducted Using Geographical Information System (GIS) Technology To Analyze The Spatial Variation In The Quality Of Surface And Groundwater. In February 2009, Researchers Collected Forty-three Groundwater Samples And Seven Surface Water Samples From The Region, Analyzing Them For Various Physical And Chemical Parameters, Including PH, Electrical Conductivity, Total Dissolved Solids, Alkalinity, Hardness, And Several Ions Like Na+, K+, Ca2+, Mg2+, Cl, HCO3, CO32, SO4, NO3, And F. The Concentrations Of These Constituents Were Then Compared Against The Standards Set By The Bureau Of Indian Standards (BIS) And The World Health Organization (WHO) To Assess The Water's Suitability For Drinking. The Findings Revealed That Many Locations Had Water Quality Parameters Exceeding Permissible Limits, Rendering The Water Unsafe For Consumption. Additionally, The Spatial Variation Of Groundwater Quality Parameters Was Mapped Using GIS.

Author: G.Suba Vishnu | S.Raajamurugan
Read More
Volume: 11 Issue: 3 March 2025

IOT ENABLED ANAESTHESIA CONTROL SYSTEM

Area of research: Ms. Poornima P

Anesthesia Administration Plays A Crucial Role In Surgical Procedures, Requiring Precise Monitoring And Control To Ensure Patient Safety. Traditional Anesthesia Delivery Systems Rely Heavily On Manual Adjustments, Which Can Lead To Human Errors And Variability In Dosage. This Paper Presents An IOT-enabled Anesthesia Control System That Integrates Real-time Monitoring, Automated Drug Delivery, And AI-driven Decision-making To Enhance Accuracy And Efficiency. The System Employs Embedded Sensors To Continuously Track Vital Parameters Such As Heart Rate, Blood Pressure, Oxygen Saturation, And Respiratory Rate. These Data Points Are Processed Using Cloud Computing And Analyzed By An AI-based Control Algorithm To Adjust Anesthetic Delivery Dynamically. Additionally, Remote Monitoring Capabilities Allow Anesthetists To Supervise And Intervene When Necessary, Reducing The Burden On Healthcare Professionals. The Proposed System Enhances Patient Safety, Minimizes The Risk Of Overdose Or Underdose, And Improves Surgical Outcomes By Ensuring Stable Anesthesia Levels Throughout The Procedure. By Integrating IOT, Artificial Intelligence, And Medical Automation, This Research Aims To Revolutionize Anesthesia Management, Making It More Precise, Reliable, And Efficient. Future Work Will Focus On Clinical Validation And System Optimization For Widespread Adoption In Operating Theaters.

Author: LOGESHWARAN N | Gunasekar M | Kaviyarasu M | Logeshwaran N
Read More
Volume: 11 Issue: 3 March 2025

ANALYZING THE FINANCIAL VIABILITY OF SAAS (SOFTWARE AS A SERVICES) MODELS IN EMERGING MARKET

Volume: 11 Issue: 3 March 2025

Animal Intrusion Device Using Arduino Nano

Area of research: Electronics And Communication Engineering

Despite Advances In Technology, The Field Of Animal Incursion Detection Has Frequently Been Neglected And Understudied. This Is An Important Issue, Particularly In Rural And Agricultural Regions Where Animal Invasion May Cause Considerable Crop Damage, Financial Loss, And Pose Risks To Both Humans And Wildlife. To Close This Gap, We Offer A Sensor-based Method That Tracks Animal Ingress Onto Human-occupied Or Agricultural Land, Giving A Real-time Solution For Identifying Possible Invasions. This Project Uses An ARDUINO UNO Microcontroller As The Central Processing Unit, As Well As A Variety Of Necessary Components Such As A GSM (Global System For Mobile Communications) Module, A Buzzer, And A PIR (Passive Infrared) Sensor To Detect Movement. The PIR Sensor Detects Animal Movements Within Its Range Of Vision, And The Arduino Analyzes The Sensor Data. When The System Detects The Presence Of An Animal, It Activates The GSM Module, Which Is Set To Send SMS Messages With Particular Information About The Movements Location. This Real-time Notice Is Transmitted To Both Law Enforcement Officers And The Farm Owner, Giving Them With Quick Information About The Incursion And Allowing Them To Take Appropriate Measures To Limit Harm. In This Arrangement, The Buzzer Acts As A Local Alarm System, Perhaps Driving Away Smaller Animals While Also Notifying Surrounding Humans. This Setup's Simplicity Makes It A Low-cost, Scalable Alternative For Farmers Who May Not Have Access To More Advanced Monitoring Systems. Overall, This Project Aims To Create A System That Actively Monitors Agricultural Fields For Any Animal Invasions. The Arduino Nano Detects Motion Using The PIR Sensor And Analyzes The Data, Ensuring That Notifications Are Transmitted To The Appropriate Parties As Soon As Possible Using The GSM Module. This Strategy Not Only Improves The Safety And Security Of Agricultural Areas, But Also Promotes Greater Human-animal Cooperation By Avoiding Future Confrontations.

Author: Mario Joshua S | Arun S | Prabhakaran S | Jai Surya G.
Read More
Volume: 11 Issue: 3 March 2025

Adaptive Recon Rover For Defense And Wildlife

Volume: 11 Issue: 3 March 2025

A Secure And Scalable Voting Framework

Area of research: Computer Science And Engineering

Blockchain Technology Serves As The Cornerstone For Addressing Security Issues Related To Voting, Utilizing Cryptographic Hashes To Ensure Comprehensive Verification From Start To Finish. In This Context, Each Valid Vote Is Treated As A Transaction Within The Blockchain Of The Voting Application. The Face Voting System, Which Employs Blockchain Technology, Aims To Bolster Both The Security And Transparency Of The Electoral Process. Initially, Users Are Required To Submit A Verification Request To The Administrator. Upon Approval, They Can Cast Their Votes Through A Facial Recognition Mechanism, Which Guarantees That Only Authorized Individuals Are Permitted To Participate. By Leveraging Blockchain, The System Creates Immutable Records That Thwart Fraudulent Activities, Thereby Fostering A Secure, Decentralized, And Reliable Voting Atmosphere. Votes Are Stored In The Backend Database And Subsequently Added As New Blocks To The Blockchain Following Successful Mining. The System Upholds The Principle Of One-person, One-vote By Utilizing Each Voter's Unique Fingerprint, Which Is Verified At The Beginning Of The Voting Process To Prevent Duplicate Voting. Once A Vote Is Mined, A Transaction Specific To That Vote Is Generated, And Any Fraudulent Votes Are Discarded By The Miners. Following The Validation Process, Voters Receive Immediate Notifications Via Message Or Email, Including A Transaction ID That Allows Them To Track Their Vote Within The Ledger. While This Serves As A Notification, It Does Not Disclose How Any Individual Voted, Thus Preserving Voter Privacy. It Is Crucial To Highlight That Each Voter Is Identified In The Blockchain By A Unique Cryptographic Hash, Which Enhances The Verifiability Of The Entire Voting Process. Additionally, This ID Remains Concealed, Ensuring That Even System Operators Cannot Access It.

Author: Mrs.Sasikala | Daniyal Rax T | Ijas Ahamed | Jayapraveen | Shaam Sundar
Read More
Volume: 11 Issue: 3 March 2025

A NOVEL PIPELINED TECHNIQUE FOR IMAGE ENCRYPTION & DECRYPTION BASED ON AES CRYPTOGRAPHY

Area of research: ECE

The Project Presents A Fault-efficient Advanced Encryption Standard (AES) Design For Image Cryptography, Focusing On Customizing SubBytes And MixColumns, Which Are The Most Critical Hardware Components. The Proposed AES Architecture, Implemented Using Verilog HDL And Simulated In ModelSim 6.4c, Aims To Reduce Area And Delay While Maintaining High Security. Both Application-Specific Integrated Circuit (ASIC) And Field-Programmable Gate Array (FPGA) Implementations Are Targeted, With Performance Evaluation Performed Using Xilinx Synthesis Tools.An 8-bit Datapath Is Employed, Where Two Dedicated Register Banks Store Plaintexts, Keys, And Intermediate Results. To Reduce Logic Consumption, The ShiftRows Operation Is Performed In The State Register Using An I/O Combination Of A Serial Solution. Round Modules, Including SubBytes, MixColumns, And AddRoundKey, Operate In Parallel And Repeat 10 Times During Encryption And Decryption. A Global Counter Applies The EN_SIG Signal, Which Generates Critical Control Signals Such As DATA_IN_SEL, LAST_RND_SIG, And KEY_IN_SEL To Manage Data Flow Effectively.The AES Decryption Process Mirrors The Encryption Process By Reversing The Transformations In The Round Module, Ensuring Robustness And Security. This Design Is Particularly Suitable For Lightweight, Resource-constrained IoT Devices, Addressing Growing Concerns About Data Privacy And Unauthorized Access. By Customizing The AES Datapath, The Proposed Architecture Reduces Hardware Footprint And Clock Cycles, Making It Highly Efficient For Real-time Cryptographic Applications. The Modular And Parallel Structure Of The Design Enhances Processing Speed While Maintaining The Required Security Standards.Overall, The Presented AES Accelerator Ensures A Balance Between Security, Fault Efficiency, And Performance, Making It Ideal For Secure Image Encryption In IoT And Embedded Systems.

Author: M.Shanmugam | K.Nandhakumar | M.Selvabharathi | L.Srihari | A.Venugopal
Read More
Volume: 11 Issue: 3 March 2025

Enhancing Automative Face Recognition And With Distraction Detection System

Area of research: Computer Science And Engineering

Driver Distraction Is A Significant Factor Contributing To Road Accidents Worldwide. According To Statistics, Distracted Drivers Are Three Times More Likely To Be Involved In A Crash Than Non-distracted Drivers. Therefore, Detecting Driver Distraction Is Crucial For Improving Road Safety. Many Previous Studies Have Proposed Various Methods For Driver Distraction Detection, Including Image-based, Sensor-based, And Machine Learning-based Approaches. However, These Methods Have Limitations In Terms Of Accuracy, Complexity, And Real-time Performance. This Project Proposes A Novel Approach To Driver Distraction Detection Using The You Only Look Once (YOLO) Object Detection Algorithm With A Convolutional Neural Network (CNN). The Proposed Model Consists Of Two Main Stages: Object Detection Using YOLO And Classification Of The Detected Objects. The YOLO Algorithm Is Used To Detect And Locate Various Objects In The Driver's Environment, Including The Driver's Face And Hands, And Other Objects That May Cause Distraction. Then, The Detected Objects Are Classified Using A CNN To Determine Whether The Driver Is Distracted Or Not. The Proposed Model Is Evaluated Using A Public Dataset And Achieves High Accuracy In Detecting Driver Distraction. And Also Analyse The Drowsiness Of Driver Based On Eye Features Using CNN Algorithm. The Proposed Method Has The Potential To Be Integrated Into Advanced Driver Assistance Systems To Improve Road Safety With Real Time Environments.

Author: S.R.Mathusudhanan | Mohamed Naveeth B | Sangili Saravana M | Manikandavasan S | Pavan Kumar K
Read More
Volume: 11 Issue: 3 March 2025

SIMULATION AND ANALYSIS OF MESH TOPOLOGY USING NS2 AND CISCO PACKET TRACER

Area of research: Computer Science And Engineering

Mesh Topology Is A Robust And Reli- Able Network Design Commonly Utilized In Scenarios Requiring High Fault Tolerance And Consistent Data Flow. Packet Tracer, A Versatile Network Simulation Tool Developed By Cisco, Provides An Ideal Environment For Implementing And Studying The Be- Haviour Of Mesh Networks. This Abstract Highlights The Process And Benefits Of Implementing Mesh Topology In Packet Tracer For Educational And Practical Purposes. In A Mesh Topology, Every Node Is Interconnected, Either Fully Or Partially, Ensuring Multiple Communication Paths. This Redundancy Minimizes The Risk Of Network Failure, Making It A Popular Choice For Mission- Critical Networks. The Implementation In Packet Tracer Involves Creating And Connecting Nodes, Such As Routers, Switches, And PCs, Using Appropriate Cables And Configurations To Simulate Full Or Partial Mesh Networks. Protocols Such As OSPF Or EIGRP Are Configured To Optimize Routing And Demonstrate Self- Healing Capabilities. Simulating Mesh Topology In Packet Tracer Offers Several Advantages. It Provides An Interactive Platform To Visualize And Analyse Data Flow, Fault Tolerance, And Load Balancing. Students And Network Professionals Can Experiment With Different Configurations, Observe The Effects Of Link Failures, And Understand How Routing Protocols Adapt To Maintain Network Connectivity. This Abstract Underscores The Value Of Packet Tracer As A Tool For Learning And Experimenting With Mesh Topology, Helping Users Gain A Deeper Understanding Of Real-world Network Design Principles And Their Practical Applications

Author: Ashly M Devasia | Suranya Das M S
Read More
Volume: 11 Issue: 3 March 2025

State Management In Flutter: A Performance Comparison Of Getx, Provider, Riverpod And Bloc

Area of research: MCA

State Management Plays A Vital Role In Flutter Application Development, Directly Influencing Performance, Scalability, And Maintainability. With Multiple State Management Solutions Available, Selecting The Right Approach Can Significantly Impact An App’s Efficiency. This Research Paper Presents A Comparative Analysis Of Four Widely Used State Management Solutions In Flutter: GetX, Provider, Riverpod, And BLoC (Business Logic Component). The Study Evaluates These Approaches Based On Frame Rendering Time, Memory Consumption, CPU Usage, And Widget Rebuild Efficiency To Determine Their Effectiveness In Handling State Changes. To Conduct The Analysis, Identical Flutter Applications Were Implemented Using Each State Management Method. These Applications Were Tested Under Varying Conditions To Measure Their Responsiveness, Efficiency, And Ease Of Use. The Results Indicate That GetX Provides Minimal Boilerplate And Fast Reactivity, Making It Ideal For Lightweight Applications. Provider, As Flutter’s Officially Recommended Solution, Integrates Well With The Widget Tree But May Introduce Performance Overhead In Complex Applications. Riverpod Enhances Provider By Offering Better Scalability And Flexibility, Making It Suitable For Large-scale Applications. BLoC, Known For Its Structured And Event-driven Approach, Excels In Managing Complex State Transitions But Has A Steeper Learning Curve And Higher Boilerplate Code. The Findings Of This Study Aim To Help Flutter Developers Choose The Most Efficient State Management Solution Based On Their Project Needs. Future Research May Explore State Management Performance In Flutter Web And Desktop Applications, As Well As The Impact Of Asynchronous State Updates On Real-time Applications.

Author: Dr. Uday Aswalekar | Akhilesh Vishwakarma
Read More
Volume: 11 Issue: 3 March 2025

Smart Data Distribution For Immersive Music Streaming

Area of research: MCA

The Rapidly Advancing World Of Streaming Services Has Seen The Emergence Of Innovative Data Distribution Strategies, Content Personalization Techniques, And The Incorporation Of Geo-location Information. This Paper Explores The Interdependence Of These Elements, Offering A Comprehensive Analysis Of Various Data Distribution Mechanisms, Their Impact On User Satisfaction, And How Geo-location Data Enhances User Engagement. The Study Highlights A Range Of Data Distribution Methods, Including Content Delivery Networks (CDNs), Edge Computing, And Serverless Technologies, Discussing Their Role In Ensuring Smooth Streaming Experiences For Diverse Audiences Worldwide. At The Same Time, It Evaluates How Personalized Content Suggestions, Driven By Individual User Behavior And Preferences, Are Further Optimized Through The Integration Of Geo-location Insights. Through A Case Study On Video Streaming Platforms, This Paper Demonstrates How These Advanced Techniques Are Implemented In Practice. By Examining A Popular Video-on-demand Service, We Aim To Illustrate How Real-time Data Distribution Methods And Intelligent Recommendation Algorithms Work Together To Create Customized Viewing Experiences. This Case Study Sheds Light On The Dynamic Interplay Between Content Distribution, Personalization, And Geo-location, Showcasing Their Collective Impact On Enhancing The User Experience In Digital Streaming Environments. Additionally, The Paper Discusses The Role Of Real-time Analytics In Fine-tuning Content Delivery, How Data Distribution Optimizes System Performance, And How Geo-location Data Can Help Tailor Content Recommendations Based On Regional Preferences, Ultimately Boosting Viewer Satisfaction.

Author: Dr. Uday Aswalekar | Essakimuthu Yadav
Read More
Volume: 11 Issue: 3 March 2025

Throughput Maximization In NOMA Enabled Cognitive IoT Systems

Area of research: Computer Science

Computer And Wireless Networks Have Undergone A Paradigm Shift With The Advent Of Big Data. One Of The Most Serious Challenges Of The Present Day Networks In The Medium Access Control Domain Is The Rapidly Increasing Number Of Users And Limited Bandwidth. Hence Multiplexing Techniques Which Would Utilize The Available Bandwidth Resources Effectively Are Being Searched For. Non-Orthogonal Multiple Access (NOMA) Has Emerged As One Of The Promising Options For Future Generation Multiplexing Solutions. In NOMA, The Signals Are Separated In The Power Domain Which Allows The Simultaneous Transmission At The Same Time And Frequency Range Thereby Augmenting The Spectral Efficiency. However, Due To Multipath Fading Effects, Power Level Separation Is Often Complex To Implement In Real Time Situations. In This Paper, NOMA Based Transmission Mechanism Has Been Proposed Which Employs Decision Feedback Equalization Along With Successive Signal Detection Based On Power Level Separation. To Emulate A Real Life Scenario, Different Path Gains Have Been Considered For Near, Average And Far Users In A Typical Cellular Network. The Performance Of The Proposed System Has Been Evaluated In Terms Of The Bit Error Rate Both Without And With The Proposed System Being Used. It Has Been Shown That Employing The Proposed System, The Error Performance Of Average And Far Users Almost Coincide With That Of The Near Users Thereby Indicating The Fact That All Users In The NOMA Based System Can Be Detected With Almost Identical Accuracy.

Author: Nitesh Tiwari | Prof. Sunil Parihar
Read More
Volume: 11 Issue: 3 March 2025

Intelligent And Smart Hearing Aid Using Gsm And Microcontroller

Volume: 11 Issue: 3 March 2025

Impact Of Phytonematodes On Citrus Yield In India: A Review Of Loss Estimates And Control Measures

Volume: 11 Issue: 3 March 2025

SECURITY AND DEPENDABILITY CHALLENGES IN VIRTUALIZED NETWORKING AND COMPUTING ENVIRONMENTS

Area of research: VIRTUALIZATION

The Fifth Generation (5G) Of Mobile Networks Introduces Transformative Services With Strict Requirements For Performance, Security, And Dependability. Multi-access Edge Computing (MEC), A Cornerstone Of 5G, Enhances Network Efficiency By Reducing Latency, Enabling Real-time Local Awareness, Supporting Cloud Offloading, And Mitigating Traffic Congestion. These Advancements Are Critical For Mission-critical Applications But Come With Security And Reliability Challenges That Are Of- Ten Underexplored Alongside Performance. This Survey Paper Addresses This Gap, Presenting A Comprehensive Analysis Of 5G MEC’s Security, Dependability, And Performance, Along With State-of-the-art Solutions And Challenges In These Domains. Inter- Net Of Things (IoT) Security Has Garnered Significant Attention Due To Its Vulnerability To Attacks Such As Denial Of Service (DoS) And Data Breaches. A Novel Machine Learning (ML)-based Security Framework Leveraging Software Defined Networking (SDN) And Network Function Virtualization (NFV) Is Proposed To Counter These Threats. This Framework Employs AI-driven Mon- Itoring And Anomaly-based Intrusion Detection, Demonstrating High Accuracy (99.715G Also Enables Diverse Services Through Virtualization, Softwarization, And Network Slicing, Fostering The Rise Of Mobile Virtual Network Operators (MVNOs). While These Technologies Enhance Flexibility, They Also Introduce Complex Security Implications. This Paper Reviews Security Challenges And Potential Solutions For MVNOs, Emphasizing The Critical Role Of Robust Virtualization Techniques, Such As Microkernel-based Environments, Which Enhance Resource Utilization And Security. In The Domain Of Smart Grids (SG), Integrating Power Networks With Information Technologies Introduces Vulnerabilities Due To Increased Automation And Connectivity. The Application Of ML In SG Enhances Attack Detection And Threat Analysis But Also Exposes Systems To Adversarial ML Attacks. This Survey Examines The Security And Privacy Challenges Of SG, Presenting Taxonomies And Novel Findings To Address These Issues.

Author: Akshara PB | Prof.Hasna M
Read More
Volume: 11 Issue: 3 March 2025

Citrus Plant Nematodes: Diversity, Impact, And Management Strategies: A Review

Volume: 11 Issue: 3 March 2025

T2S Based Social Media Bot Detection Using Machine Learning