Naveen R, Parthasarathi S, Tharunkumar R, Nandhakumar G
{"title":"SMART PREVENTIVE INSOLE FOR DIABETES","authors":"Naveen R, Parthasarathi S, Tharunkumar R, Nandhakumar G","doi":"10.46647/ijetms.2023.v07i01.005","DOIUrl":"https://doi.org/10.46647/ijetms.2023.v07i01.005","url":null,"abstract":"Smart wearable gadgets are powerful in diabetic foot ulcer (DFU) prevention. However, elements figuring out their recognition are poorly understood. This systematic evaluation pursuits to observe the literature on affected person and issuer views of clever wearable gadgets in DFU prevention. The methodological pleasant of the research ranged from low to moderate. Two research hired a quantitative have a look at layout and centered at the affected person perspective, whereas three research blanketed a mixed, quantitative/qualitative layout and explored affected person or provider (podiatrist) perspectives. Four research targeted on an insole gadget and one covered a clever sock device. The quantitative research validated that gadgets had been comfortable, properly designed and beneficial in stopping DFU. One combined layout observe suggested that sufferers did now no longer intend to undertake an insole tool in its cutting-edge layout due to malfunctions, a loss of consolation and alert intrusiveness, regardless of the overall notion that the tool became a beneficial device for foot threat monitoring. Two mixed design studies found that performance expectancy was a predictor of a podiatrist’s behavioral intention to recommend an insole device in clinical practice. Disappointing player studies negatively impacted the podiatrists’ purpose to undertake a clever device. The modern proof approximately affected person and issuer views on clever wearable generation is restrained via way of means of scarce methodological best and conflicting results. It is, thus, now no longer viable to attract definitive conclusions concerning acceptability of those gadgets for the prevention of DFU in human beings with diabetes.","PeriodicalId":202831,"journal":{"name":"international journal of engineering technology and management sciences","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126146005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic Blood Glucose Regulator","authors":"P.Deepthi, R.Yoganapriya, M.Dhinakaran","doi":"10.46647/ijetms.2023.v07i01.014","DOIUrl":"https://doi.org/10.46647/ijetms.2023.v07i01.014","url":null,"abstract":"Diabetes is the most common metabolic disease in the world in which Blood Glucose levels in the human body remain high for a prolonged period that will lead to death when there is no proper health care. For diabetic patients Blood Glucose levels must be regulated properly in order to manage their health properly. To check Blood Glucose levels diabetic patients perform a capillary test at least three times per day. This Blood Glucose monitoring technique is an invasive procedure, where the blood samples are collected through finger prick this makes the process painful with the risk of infection. To overcome this, an Automatic Blood Glucose Regulator is developed for the critical Diabetic patients. In this automatic regulator the Blood Glucose levels are continuously monitored with non invasive risk free procedure and in case of high Blood Glucose level the insulin will be automatically injected into the patient body by using insulin injector. In addition, a SMS message about a patient. Blood Glucose level will also be sent to the corresponding caretaker and the same will be stored in the cloud for future reference.","PeriodicalId":202831,"journal":{"name":"international journal of engineering technology and management sciences","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129823851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Assessing the Performance of Chilli (Capsicum annuum L.) Hybrids TNAU Chilli Hybrid CO 1 and Arka Saanvi in Salem District of Tamil Nadu","authors":"Malathi, G, R.Jegathambal, R.Vijayan, P.Kalai Selvi, G.Anand","doi":"10.46647/ijetms.2023.v07i01.012","DOIUrl":"https://doi.org/10.46647/ijetms.2023.v07i01.012","url":null,"abstract":"India is the world’s largest producer, consumer and exporter of chillies in the world. The important states of chilli production are Andhra Pradesh, Orissa, Maharashtra, West Bengal, Karnataka, Rajasthan and Tamil Nadu. In Salem district, area under chilli cultivation is around 1100 ha in the year 2019-20. Among 20 blocks of Salem district, Kolathur block is well known for chilli cultivation in Salem District. Most of the farmers rely upon only the private chilli hybrids, for which they have to spend much more towards seed cost. In this regard, an investigation is required for assessing the performance of high pungent chilli hybrids in Salem district. Hence, an investigation was carried out to assess the performance of high pungent chilli hybrids in Salem district in the year 2021. An on farm trial was conducted in five different locations of Salem district during Kharif season with chilli hybrids Arka Saanvi and TNAU Chilli Hybrid CO 1 with Sierra Hybrid of Private Company namely Mahyco as check hybrid. Results revealed that TNAU Chilli hybrid CO1 recorded highest marketable fruit yield per hectare (24t/ha) followed by Arka Saanvi (21t/ha) which might be due to the more number of marketable fruits per plant in TNAU Chilli hybrid CO1. Farmers preference as well as market preference in Salem District for TNAU Chilli Hybrid CO 1 is more than Arka Saanvi because of its bigger size fruits with more number of fruits with high pungency. With regard to benefit cost ratio, Arka Saanvi and Sierra recorded 2.50 and 1.79 respectively as against 2.71 in TNAU Chilli hybrid CO 1.","PeriodicalId":202831,"journal":{"name":"international journal of engineering technology and management sciences","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127960574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dr.Manish Kumar, Dr. Nirvikar Katiyar, Dr. Istiyaque Ahmad, Dr. Indu Bhushan Lal
{"title":"Evolution of Multimedia Data Types","authors":"Dr.Manish Kumar, Dr. Nirvikar Katiyar, Dr. Istiyaque Ahmad, Dr. Indu Bhushan Lal","doi":"10.46647/ijetms.2023.v07i01.003","DOIUrl":"https://doi.org/10.46647/ijetms.2023.v07i01.003","url":null,"abstract":"The evolution in technology during the last few years, such as Internet and Web browser has changed the world. Especially in the area of multimedia computing, where we are living in fast growing era of information and technology, multimedia data becoming more and more common. In a general, the term multimedia (MM) identifies a community that helps us to assemble, develop various records and intensify visual datas into relevant particulars. MM deals with data that essentially speaks to people, places, and/or things. It incorporates film and different sorts of computerized still photography, movement photography, sound, analog along side computerized video recordings, computer-based items, and illustrations.","PeriodicalId":202831,"journal":{"name":"international journal of engineering technology and management sciences","volume":"77 12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113939597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lovely Joseph Pullokaran, Fr. (Dr.) Paulachan K Joseph
{"title":"WORKING REMOTELY: EMPLOYEES BENEFITS AND CHALLENGES","authors":"Lovely Joseph Pullokaran, Fr. (Dr.) Paulachan K Joseph","doi":"10.46647/10.46647/ijetms.2023.v07i01.007","DOIUrl":"https://doi.org/10.46647/10.46647/ijetms.2023.v07i01.007","url":null,"abstract":"This paper analyses research publications and reports that highlight the strengths and difficulties of employees working remotely. A great majority of employees around the world were already forced to work remotely due to the COVID-19 outbreak. Each and every sector of the economy was impacted by this pandemic. At this period, the concept of remote work became increasingly prevalent. Di Martino and Wirth (1990) defines remote working as “a flexible work arrangement whereby workers work in locations, remote from their central offices or production facilities, the worker has no personal contact with co-workers there, but is able to communicate with them using technology”. The primary purpose of this study is to provide a survey of the literature with respect to the setting of remote working.","PeriodicalId":202831,"journal":{"name":"international journal of engineering technology and management sciences","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133408270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Legal Framework for Corporate Sustainability Reporting in India","authors":"Rupam Majumder, Dr. Ahmed Hussain","doi":"10.46647/ijetms.2023.v07i01.006","DOIUrl":"https://doi.org/10.46647/ijetms.2023.v07i01.006","url":null,"abstract":"This paper constructs a legal framework for explaining Corporate Sustainability Reporting practices by companies. Sustainability can force innovation with the aid of using introducing new layout constraints that form how key assets are utilized in merchandise and processes. Organizations that acknowledged and embody the important drivers for sustainability will reap the final blessings of market possibilities and green commercial enterprise operations. Numerous organizations are involved with sustainability obligations, and they need a holistic vision to benefit sustainability. This calls for a dynamic framework which shows the attitude of sustainability. Therefore, there may be a need to assess the prevailing sustainability frameworks and highlight the gaps and inconsistencies within the related literature. The literature observed out vital sustainability (economic, environment and social) and decisional paradigm (strategic, tactical, and operational) which needs to be considered in sustainability implementation frameworks. The sustainability and decisional paradigm show the major perspective of sustainability implementation. The integration of these paradigms will be great for successful sustainability implementation project. In the present study, the researcher tried to explain a proper and efficient mechanism concerning the legal aspect.","PeriodicalId":202831,"journal":{"name":"international journal of engineering technology and management sciences","volume":"28 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113934770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IMPLEMENTATION FPGA BASED IMPLEMENTATION OF 128-BIT AES ALGORITHM USING VHDL","authors":"ATTAR MEHARAJ BANU, SYED NOORULLAH","doi":"10.46647/ijetms.2023.v07i01.019","DOIUrl":"https://doi.org/10.46647/ijetms.2023.v07i01.019","url":null,"abstract":"In current world of computations, data encryption is of prominent importance. Many algorithms were developed for data encryption and decryption to prevent hacking. The Advanced Encryption Standard (AES) is one of the data encryption techniques. Two famous kinds of hardware implementation techniques are pipelining and loop-unrolling techniques. In pipelining, registers are inserted between each combinational processing element so that each input data block can be processed simultaneously in each processing element. In this work, a pipelined implementation of AES encryption algorithm is developed. The number of rounds of AES-128 encryption is 10 and an architecture implementing this cipher is called fully pipelined, when all data blocks of 10 rounds can be processed simultaneously. In the loop-unrolling technique one or multiple rounds of the algorithm are processed in the same clock cycle. Here only one round of the algorithm is implemented as a combinational processing element and a data register is also used to store the result obtained in the previous clock cycle. In this work, a128-bit AES is implemented and for each round of AES encryption, a different sub-key is used as the round key, which is produced by the key schedule algorithm based on the loop-unrolled technique, to produce the required sub-key for each round is done. The no of I/O, Slices in the proposed work are 386, 229 respectively with Spartan6 fpga with a minimum period of 5.813ns,maximum Frequency of 172.031MHz, minimum input arrival time before clock of 4.823ns,maximum output required time after clock of 5.588ns, throughput of 2.2Gbps. The no of I/O, Slices are 387, 264 respectively with Artix7 fpga with a minimum period of 3.397ns, maximum Frequency of 294.366MHz, minimum input arrival time before clock of 1.649ns, maximum output required time after clock of 1.669ns, throughput of 3.77Gbps.","PeriodicalId":202831,"journal":{"name":"international journal of engineering technology and management sciences","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122556032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IMPLEMENTATION OF ACCURATE PERSONAL IDENTIFICATION BY USING PALM PRINT IMAGE PROCESSING","authors":"ATTAR SHAGUSTHA BANU, N VINOD KUMAR","doi":"10.46647/ijetms.2023.v07i01.020","DOIUrl":"https://doi.org/10.46647/ijetms.2023.v07i01.020","url":null,"abstract":"Online palmprint recognition and latent palmprint identification are two branches of palmprint studies. The former uses middle-resolution images collected by a digital camera in a well-controlled or contact-based environment with user cooperation for commercial applications and the latter uses highresolution latent palmprints collected in crime scenes for forensic investigation. However, these two branches do not cover some palmprint images which have the potential for forensic investigation. Due to the prevalence of smartphone and consumer camera, more evidence is in the form of digital images taken in uncontrolled and uncooperative environment, e.g., child pornographic images and terrorist images, where the criminals commonly hide or cover their face. However, their palms can be observable. Among various biometrics technologies, palm-print identification has received much attention because of its good performance. Combining the left and right palm-print images to perform multi-biometrics is easy to implement and can obtain better results. Existing systems deployed Line Based Method, Coding Based Method, Subspace Based Methods, Representation Based Method, SIFT Based Method. This work integrated three kinds of scores generated from the left and right palm-print images to perform matching score-level fusion. The first two kinds of scores were, respectively, generated from the left and right palm-print images and can be obtained by any palm-print identification method, whereas the third kind of score was obtained using a specialized algorithm proposed in this paper. As the proposed algorithm carefully takes the nature of the left and right palm-print images into account, it can properly exploit the similarity of the left and right palm-prints of the same subject. Moreover, the proposed weighted fusion scheme allowed perfect identification performance to be obtained in comparison with previous palm-print identification methods.","PeriodicalId":202831,"journal":{"name":"international journal of engineering technology and management sciences","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121076052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Technological Prospects of Cloud Computing in Web Mining: Recent Trends and Opportunities","authors":"Santosh Kumar Jha","doi":"10.46647/ijetms.2023.v07i01.017","DOIUrl":"https://doi.org/10.46647/ijetms.2023.v07i01.017","url":null,"abstract":"Web has immense potentials to grow with new technologies and flourish with new opportunities in almost every sphere of human life. The internet grew by WWW and explored with e-business and social network. The Web is known and participating in mining of various kinds of data ranging from users views and patterns to Bitcoin applications. Web mining includes different set and types of data and extract useful information and from various sources of web and gain knowledge using applicable data mining technique on dataset. Web mining types broadly categorised in three main areas, web uses mining, web content mining, and web structured mining. Each category of web mining is involved to handle issues of heterogeneous behaviour of web data. All three technique and applications are highly required of high end architectures which can facilitate infrastructures and support for all required criteria. Cloud computing is an emerging technology and blowing with intensive support for varieties of applications. The techniques and applications of Web usage mining are extremely demanded in cloud computing. Cloud computing allow these technique to retrieve relevant and useful data through virtually integrated mode of data warehouse. It helps the users to reduce cost and infrastructure for implementation. This paper presents methodologies of web mining using Cloud Computing technology and its prospects.","PeriodicalId":202831,"journal":{"name":"international journal of engineering technology and management sciences","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123839151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Quality Improvement Technique in KERBEROS with Secure Authentication","authors":"Manish Kumar, Indu Bhushan Lal, Savya Sachi","doi":"10.46647/ijetms.2023.v07i01.016","DOIUrl":"https://doi.org/10.46647/ijetms.2023.v07i01.016","url":null,"abstract":"Kerberos is an confirmation convention in which client and server can commonly verify to each other over an unreliable arrange association, to guarantee information judgment of the message and security of channel communications. In this paper, a modern novel is proposed to move forward Kerberos confirmation convention by utilizing Mystery Picture. This Kerberos will be altered to surrender way better security arrangements and to supply centralized get to control arrangement for each client with diverse parameters like confirmation, speed of encryption and decoding and productivity of transactions. This altered approach upgrades the secure confirmation of clients with non-reputation include by joining open key cryptography and covering up the message of differential get to control for each client by utilizing mystery picture. This differential get to control approach is being implemented straightforwardly to the clients whereas doing the verification of clients through Kerberos convention. The GnuPG has the capability to produce the key combine (ie, private key and open key) within the client itself. So this proposed framework utilized this key combine for encryption and decoding of messages and takes the advantage of non exchanging or non bringing in the private key from any gadgets or any nodes.","PeriodicalId":202831,"journal":{"name":"international journal of engineering technology and management sciences","volume":"184 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114433187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}