Sumit S. Mohite, Amarnath B. Munde, Jai A. Lagad, Trupti Shaha
{"title":"A Review on Mouth Dissolving Tablets","authors":"Sumit S. Mohite, Amarnath B. Munde, Jai A. Lagad, Trupti Shaha","doi":"10.32628/ijsrst52411276","DOIUrl":"https://doi.org/10.32628/ijsrst52411276","url":null,"abstract":"Traditional dosage forms, such as pills and capsules, are now used to treat conditions like dysphagia, which increases the risk of non-compliance and makes therapy ineffective. Mouth dissolving tablets were created to solve the problems associated with traditional dosage forms. They offer good hardness, dose uniformity, and convenience of administration. For pediatric, geriatric, and travel patients, they are the preferred dose form. Providing the MDTs with enough hardness, integrity, and disintegration speed without the requirement for water was the aim of their development. For fast-dissolving tablets to dissolve in saliva quickly, water is not needed. Some tablets are designed to dissolve in saliva very quickly in just a few seconds and are therefore referred to as \"fast-dissolving\" tablets. Because they contain substances that accelerate the pace at which the tablet dissolves in the mouth otherwise, it might take up to a minute some tablets are best referred to as fast-disintegrating tablets. This tablet type is designed to make it possible to administer an oral solid dose form in situations when no water or fluids are taken. These tablets typically dissolve in less than 60 seconds when dissolved in saliva.","PeriodicalId":14387,"journal":{"name":"International Journal of Scientific Research in Science and Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140736764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Elemental Characterization of Leaf Extracts of Three Different Species of Mulberry: Morus. alba L., Morus. nigra L. and Morus. indica L., Using Inductively Coupled Plasma -Atomic Emission Spectroscopy (ICP-AES)","authors":"Nikki Huria, Aparna Saraf","doi":"10.32628/ijsrst52411277","DOIUrl":"https://doi.org/10.32628/ijsrst52411277","url":null,"abstract":"The present study aimed to compare the elemental composition of leaf extracts from three different plant species of Mulberry, Morus alba L., Morus nigra L., and Morus indica L. The results showed that ten essential elements of biological importance for human metabolism, such as Copper, Chromium, Iron, Manganese, Sodium, Zinc, Calcium, Nickel, Lead, and Cadmium, were present in varying concentrations, well below the World Health Organization, (WHO's) daily intake limits. Mulberry leaves are an economical and readily available source of essential mineral elements vital for human health, which can be used to fortify functional foods, treat various diseases, and act as nutraceuticals. The information obtained could be used to determine the efficacy and dosage of herbal drugs manufactured from the leaf extracts of the Mulberry plant, making it a new contributor to food supplements and nutraceutical products.","PeriodicalId":14387,"journal":{"name":"International Journal of Scientific Research in Science and Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140744876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Advanced Ambiance Sensing Device using ESP32 and BME680","authors":"Mrs. Neeta Bajpai, Kajal Kotangale, Asmita Bhaire","doi":"10.32628/ijsrst524111104","DOIUrl":"https://doi.org/10.32628/ijsrst524111104","url":null,"abstract":"Occupational structure is the distribution or division of working population in different sectors based on occupations. It is one of the key elements in manifestation of population composition of a region. The economy is segregated based on its occupational structure namely, the agriculture sector, industrial or manufacturing sector and service sector. Occupational structure provides clear picture of working and non-working population in an area. The growth and prosperity of a region largely depends on the size of working population and proportion of productive workers engaged in various economic activities. The objective of this study is to find out the shift in occupation from primary sector to other sectors and the rate of change in last two decades from 2001 to 2011 in Kerala state with district as spatial unit. The study is based upon the secondary data collected from Census 2001 and 2011.By using GIS techniques thematic maps were prepared to show the variation in occupational structure in the study area. To find out the changes in occupational structure, percentage of workers engaged in four categories are to be calculated. There is a remarkable shift of workers from agriculture to non-agricultural sector in Kerala. ","PeriodicalId":14387,"journal":{"name":"International Journal of Scientific Research in Science and Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140754944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A Samuvel, Dr. G Manikandan, Ms. Vilma Veronica, Ms. S. Hemalatha
{"title":"Smart Agriculture: Enhancing Security Through Animal Detection Via Deep Learning and Computer Vision","authors":"A Samuvel, Dr. G Manikandan, Ms. Vilma Veronica, Ms. S. Hemalatha","doi":"10.32628/ijsrst52411226","DOIUrl":"https://doi.org/10.32628/ijsrst52411226","url":null,"abstract":"Agriculture stands as a crucial sector, making significant contributions to the economies of many countries. Nevertheless, it encounters various challenges, one of which is animal disruption. This poses a considerable threat to crops, leading to financial losses for farmers. In response to this concern, we have engineered an animal disruption warning system for agricultural settings based on YOLOv6 technology.The system operates by analyzing live video feeds from strategically placed cameras. Utilizing deep learning algorithms, it can detect and classify animals in real-time. The computer vision algorithms enable tracking and prediction of animal movements. Upon detection, the system promptly sends alerts, enabling timely and appropriate actions.In this paper, we periodically monitor the entire farm through a camera that continuously records its surroundings. The identification of animal entry is achieved using a deep learning model, and alarm systems serve as a deterrent, notifying forest officials. This report provides details on the libraries and convolutional neural networks employed in constructing the model.This research focuses on the implementation of a robust animal detection system in agricultural environments, leveraging the capabilities of deep learning. The project utilizes state-of-the-art deep neural networks and computer vision algorithms to analyze live video feeds from strategically positioned cameras across the farm. The deep learning model is trained to detect and classify various animals in real-time, contributing to the early identification of potential threats to crops.The system employs sophisticated computer vision techniques, enabling accurate tracking and prediction of animal movements within the monitored areas. Upon detection, the system triggers timely alerts, providing farmers with the necessary information to take swift and appropriate actions, thereby mitigating potential damage to crops.To achieve these objectives, the project involves periodic monitoring of the entire farm through a camera that continuously records its surroundings. The deep learning model, supported by alarm systems, effectively identifies animal entries, serving as a proactive deterrent. This research report outlines the libraries, frameworks, and convolutional neural networks employed in the development of the animal detection model, shedding light on the technical aspects of its implementation.The integration of deep learning and computer vision in agriculture not only enhances crop protection but also contributes to the sustainable and efficient management of farming practices. This research offers insights into the potential of advanced technologies to address challenges in agriculture and opens avenues for further exploration in the intersection of technology and agriculture. ","PeriodicalId":14387,"journal":{"name":"International Journal of Scientific Research in Science and Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140753871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Ezhil Arasi, Dr. G Manikandan, Ms. S. Hemalatha, Ms. Vilma Veronica
{"title":"Malicious Social Bot Using Twitter Network Analysis in Django","authors":"N. Ezhil Arasi, Dr. G Manikandan, Ms. S. Hemalatha, Ms. Vilma Veronica","doi":"10.32628/ijsrst52411222","DOIUrl":"https://doi.org/10.32628/ijsrst52411222","url":null,"abstract":"Malicious social bots generate fake tweets and automate their social relationships either by pretending to be a followers or by creating multiple fake accounts with malicious activities. Moreover, malicious social bots post shortened malicious URLs in the tweets to redirect the requests of online social networking participants to some malicious servers. Hence, distinguishing malicious social bots from legitimate users is one of the most important tasks in the Twitter network. To detect malicious social bots, extracting URL-based features (such as URL redirection, frequency of shared URLs, and spam content in URL) consumes less amount of time in comparison with social graph-based features (which rely on the social interactions of users). Furthermore, malicious social bots cannot easily manipulate URL redirection chains. In this article, learning automata-based malicious social bot detection (LA-MSBD) algorithm is proposed by integrating a trust computation model with URL-based features for identifying trustworthy participants (users) in the Twitter network. The proposed trust computation model contains two parameters, namely, direct trust and indirect trust. Moreover, the direct trust is derived from Bayes’ theorem, and the indirect trust is derived from the Dempster– Shafer theory (DST) to determine the trustworthiness of each participant accurately. Finally, we shown the user tweet data in terms of graph visualization of bar chart and pie chart of the system. Experimental results shown the better performance of the system. ","PeriodicalId":14387,"journal":{"name":"International Journal of Scientific Research in Science and Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140754018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ms. K Jebima Jessy, Dr. G Manikandan, Ms. S. Hemalatha, Ms. Vilma Veronica
{"title":"Detection of Cardiovascular Disease Using ECG Images in Machine Learning and Deep Learning","authors":"Ms. K Jebima Jessy, Dr. G Manikandan, Ms. S. Hemalatha, Ms. Vilma Veronica","doi":"10.32628/ijsrst52411224","DOIUrl":"https://doi.org/10.32628/ijsrst52411224","url":null,"abstract":"One of the most prominent tools for detecting cardiovascular problems is the electrocardiogram (ECG). The electrocardiogram (ECG or EKG) is a diagnostic tool that is used to routinely assess the electrical and muscular functions of the heart. Even though it is a comparatively simple test to perform, the interpretation of the ECG charts requires considerable amounts of training. Till recently, the majority of ECG records were kept on paper. Thus, manually examining and re-examining the ECG paper records often can be a time-consuming and daunting process. If we digitize such paper ECG records, we can perform automated diagnosis and analysis. The main goal of this project is to use machine learning to convert ECG paper records into a 1-D signal. This can be achieved by extracting the P, QRS, and T waves that exist in ECG signals to demonstrate the electrical activity of the heart using various techniques. The techniques include splitting the original ECG report into 13 Leads, extracting and converting into the signal, smoothing, converting them to binary images using threshold and scaling. Post-feature-extraction, dimension reduction techniques like Principal Component Analysis are applied to understand the data. Multiple classifiers like k-nearest neighbors (KNN), Logistic Regression, Support Vector Machine (SVM), and Voting Based Ensemble Classifier are implemented, and based on the acceptable criteria on the accuracy, precision, recall, f1-score, and support, the model will be finalized. This final model will aid in the diagnosing of cardiac diseases, to detect whether a patient has/had Myocardial Infarction, Abnormal Heartbeat, or the patient is hale and healthy by inferring the ECG reports ","PeriodicalId":14387,"journal":{"name":"International Journal of Scientific Research in Science and Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140751785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S Dennis Emmanuel, Dr. G Manikandan, Vilma Veronica, S. Hemalatha
{"title":"Alzheimer Disease Using Machine Learning","authors":"S Dennis Emmanuel, Dr. G Manikandan, Vilma Veronica, S. Hemalatha","doi":"10.32628/ijsrst52411221","DOIUrl":"https://doi.org/10.32628/ijsrst52411221","url":null,"abstract":"The successful development of amyloid-based biomarkers and tests for Alzheimer’s disease (AD) represents an important milestone in AD diagnosis. However, two major limitations remain. Amyloid-based diagnostic biomarkers and tests provide limited information about the disease process and they are unable to identify individuals with the disease before significant amyloid-beta accumulation in the brain develops. The objective in this study is to develop a method to identify potential blood-based non-amyloid biomarkers for early AD detection. The use of blood is attractive because it is accessible and relatively inexpensive. Our method is mainly based on machine learning (ML) techniques (support vector machines in particular) because of their ability to create multivariable models by learning patterns from complex data. Using novel feature selection and evaluation modalities we identified 5 novel panels of non-amyloid proteins with the potential to serve as biomarkers of early AD. In particular, we found that the combination of A2M, ApoE, BNP, Eot3, RAGE and SGOT may be a key biomarker profile of early disease. Disease detection models based on the identified panels achieved sensitivity (SN) > 80%, specificity (SP) > 70%, and area under receiver operating curve (AUC) of at least 0.80 at prodromal stage (with higher performance at later stages) of the disease. Existing ML models performed poorly in comparison at this stage of the disease suggesting that the underlying protein panels may not be suitable for early disease detection. Our results demonstrate the feasibility of early detection of AD using non-amyloid based biomarkers. ","PeriodicalId":14387,"journal":{"name":"International Journal of Scientific Research in Science and Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140754912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Sandhya Rani, Guda Ankitha, Polasani Harini, G Ravi
{"title":"Cyber Honeypot","authors":"M. Sandhya Rani, Guda Ankitha, Polasani Harini, G Ravi","doi":"10.32628/ijsrst52411168","DOIUrl":"https://doi.org/10.32628/ijsrst52411168","url":null,"abstract":"In an era of escalating cyber threats, the need for robust defenses against malicious activities is paramount. In this project, we propose a novel approach to leverage honeypots in conju nction with Canary Tokens to accurately pinpoint the geographical locations of attackers. By strategically deploying these decoy resources across diverse network environments, we capture valuable data on unauthorized access attempts and malicious behavior. Through the analysis of Canary Tokens, which act as unique identifiers triggered upon interaction, we can trace the origin of these attacks to specific IP addresses. Utilizing this information, security professionals gain insights into the geographical distribution of attackers, aiding in threat intelligence, incident response, and the implementation of targeted security measures. This integration of project honeypots and Canary Tokens enhances network defense strategies, providing organizations with a proactive stance against cyber threats.","PeriodicalId":14387,"journal":{"name":"International Journal of Scientific Research in Science and Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140752213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ms. J Seetha, Dr. G Manikandan, Ms. S. Hemalatha, Ms. Vilma Veronica
{"title":"QR Code Recognition Based on Image Processing","authors":"Ms. J Seetha, Dr. G Manikandan, Ms. S. Hemalatha, Ms. Vilma Veronica","doi":"10.32628/ijsrst52411227","DOIUrl":"https://doi.org/10.32628/ijsrst52411227","url":null,"abstract":"To solve the QR code recognition problem caused by ordinary camera collection, the recognition algorithm based on image processing is put forward in this paper. The whole process including image binarization, image tilt correction, image orientation, image geometric correction and image normalization allows images collected on different illumination conditions. Experiments show that the improved method can enhance the recognition speed of two-dimensional code and accuracy. QR i.e. “Quick Response” code is a 2D matrix code that is designed by keeping two points under consideration, i.e. it must store large amount of data as compared to 1D barcodes and it must be decoded at high speed using any handheld device like phones. QR code provides high data storage capacity, fast scanning, omnidirectional readability, and many other advantages including, error-correction (so that damaged code can also be read successfully) and different type of versions. Different varieties of QR code symbols like logo QR code, encrypted QR code, QR Code are also available so that user can choose among them according to their need. Now these days, a QR code is applied in different application streams related to marketing, security, academics etc. and gain popularity at a really high pace. Day by day more people are getting aware of this technology and use it accordingly. The popularity of QR code grows rapidly with the growth of smartphone users and thus the QR code is rapidly arriving at high levels of acceptance worldwide. ","PeriodicalId":14387,"journal":{"name":"International Journal of Scientific Research in Science and Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140752645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Review on Zooplankton Diversity with Reference to Physico-Chemical Parameters of Lentic Ecosystems in Maharashtra","authors":"Vairagade S. P.","doi":"10.32628/ijsrst524111103","DOIUrl":"https://doi.org/10.32628/ijsrst524111103","url":null,"abstract":"Zooplanktons are diverse organisms, are found more or less in all water bodies. The plankton research is a highly helpful technique for determining the biotic potential of water bodies and adds to the overall calculation of their biotic nature and general economic potential. Zooplanktons are microscopic, free-floating organisms that are essential to the functioning of aquatic ecosystems. As the most crucial link in the energy transfer between phytoplankton and higher aquatic animals, zooplanktons are significant biotic components and play a significant role in the aquatic environment. The functioning of an aquatic ecosystem's food chains, food webs, energy flow, and nutrient cycling are all influenced by zooplankton. Zooplankton populations are excellent indicators of the stability of the food chain. Numerous environmental parameters, including pH, temperature, salinity, oxygen, and others, have an impact on zooplankton. The food chain and the flow of energy between the primary and tertiary trophic levels are both significantly influenced by zooplankton. They serve as indicators of the physical, chemical, and biological processes occurring in aquatic systems due to their high densities. Because they are highly sensitive to environmental change, changes in the abundance of certain species or in the makeup of certain communities can be used to gauge the health of the environment. An assessment of the literature on zooplanktons in Indian lentic water has been done in the current work, which has long been deemed necessary in this subject. ","PeriodicalId":14387,"journal":{"name":"International Journal of Scientific Research in Science and Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140751249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}