{"title":"A Novel Energy-Efficient Routing Protocol for Industrial WSN Using Hybrid Coot-Ls Algorithm with LSTM-Based Dom Prediction","authors":"Er.M. Dharshini, Mr.M.Satheesh Kumar","doi":"10.55041/ijsrem36722","DOIUrl":"https://doi.org/10.55041/ijsrem36722","url":null,"abstract":"In industrial Wireless Sensor Networks (WSNs), energy efficiency and reliable data transmission are critical challenges that need to be addressed to ensure sustainable and robust network operations. This paper proposes a novel energy-efficient routing protocol that integrates a Hybrid COOT-LS (Coot- Levy Search) algorithm with Long Short-Term Memory (LSTM)-based Dominant Object Motion (DOM) prediction. The routing protocol leverages the strengths of Hybrid Particle Swarm Optimization (PSO) and Ant Colony Optimization (ACO) to enhance routing efficiency and reduce energy consumption. The Hybrid PSO and ACO algorithms are employed to optimize routing paths by balancing exploration and exploitation, considering multiple factors such as energy levels, node distance, and reliability. The COOT-LS algorithm further refines these paths by incorporating a Levy flight mechanism to enhance the search process. Additionally, the LSTM-based DOM prediction provides accurate forecasts of network conditions, enabling dynamic adjustments to routing strategies in real time. Simulation results demonstrate that the proposed protocol significantly improves network lifetime, reduces energy consumption, and enhances data transmission reliability compared to traditional routing protocols. This approach provides a robust and scalable solution for industrial WSN applications, ensuring efficient and reliable network performance in dynamic and complex industrial environments.","PeriodicalId":504501,"journal":{"name":"INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT","volume":"18 11","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141806079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Smart Tender Management System Using Blockchain in Python","authors":"Shrikanth M S, A. C","doi":"10.55041/ijsrem36750","DOIUrl":"https://doi.org/10.55041/ijsrem36750","url":null,"abstract":"-Blockchain technology has been adopted by a number of industries, including government agencies, financial services, healthcare, and agriculture, to improve their operations in the quickly changing modern world. But the industry for tenders hasn't yet completely realized all of its advantages. Due to problems including bias, bad record- keeping, lack of transparency, vulnerability to hackers, and data tampering, inadequate tender management procedures can cause large losses. We suggest using blockchain technology to ensure improved security and effectiveness in tender management as a solution to these problems. We can create a secure transaction management system that protects important documents and transactions related to the tendering process by utilizing encryption and the immutable nature of blockchain. By safely storing bid proposals, firm profiles, historical data, tender documents, and other information, this system fosters transparency and integrity. The Admin and Company modules are the two main components of the Smart Tender Management System. Administrators can oversee applications, handle tenders, and keep an eye on transaction logs with the help of the admin module. Companies can register, submit proposals, and monitor the status of their applications using the Company module. The solution improves security, lowers expenses, and simplifies tender processing by doing away with intermediaries and utilizing strong encryption techniques. This fosters an easy- to-use and effective experience for all parties involved KeyWords: Block chain Technology, Encryption, Smart Contracts, Tender Management.","PeriodicalId":504501,"journal":{"name":"INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT","volume":"46 9","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141807110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Uncertainty Analysis of Tensile Strength of Scarf Adhesive Joints using Numerical Method and Validation through Experimentation","authors":"B. P. Sawant, P. Kulkarni","doi":"10.55041/ijsrem36758","DOIUrl":"https://doi.org/10.55041/ijsrem36758","url":null,"abstract":"Adhesive joints represent a significant advancement in material bonding technology, offering benefits such as reduced weight and uniform stress distribution, which distinguish them from conventional joining methods. Among the various adhesive joints, the scarf adhesive joint stands out due to its mechanical advantages and potential for high-strength applications. This research investigates the impact of key parameters on the strength of scarf adhesive joints, including scarf angle, surface roughness, adhesive type, and adhesive layer thickness. By systematically varying these parameters and employing a design of experimentation (DOE) methodology, we aim to identify the optimal conditions that maximize joint strength. A series of scarf adhesive joint specimens with diverse parameter combinations will be fabricated and tested to evaluate the resultant joint strength. Statistical analysis of the experimental data will facilitate the understanding of how each parameter influences joint performance and contribute to the development of optimized adhesive joint designs. The findings of this study are expected to advance the application of scarf adhesive joints in various high-performance engineering fields, providing insights into the critical factors that govern their strength and reliability. Key Words: Scarf Adhesive Joint, Adherend Material, SS 304 Stainless Steel, Finite Element Analysis (FEA), Tensile Strength, Max von Mises Stress, Scarf Angle, Design of Experiments (DOE), Adhesive Properties, Surface Roughness.","PeriodicalId":504501,"journal":{"name":"INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT","volume":"52 7","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141809000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IoT-Driven Infusion Monitoring & Management System","authors":"Srashti Shukla, Prof. Dr. Meghana Mishra","doi":"10.55041/ijsrem36742","DOIUrl":"https://doi.org/10.55041/ijsrem36742","url":null,"abstract":"This research investigates the monitoring and management of an intravenous drip infusion system using the Internet of Things (IoT) and non- contact liquid level sensors, an Arduino circuit board, a GSM interface, and a cloud storage facility. The three sensors in the system are able to detect the presence of fluid without coming into contact with it. They can also send the data they collect to the cloud facility, where it can be used to access drip conditions and monitor fluid levels as well as control infusion flow when needed. This system can be considered an improvement over several systems on the market that are similarly intended to use optical sensors, TDR (Time domain reflectometry), and other types of sensors to monitor the IV drip flow. While it is true that each type of sensor has a combination of benefits and drawbacks, none of the other systems on the market can further regulate the drip flow like this one does. Since the sensors we've employed don't respond to fluids, the patients don't suffer any damage at all. This is now a crucial necessity in the biomedical industry since human reliance on IV drip infusions has led to a number of incidents, the most serious of which involved the patient suffering severe injuries from back blood flow in the nozzle. This system is made to guarantee that all safety precautions are taken and that the patient and attendant are in the best possible circumstances in order to minimize such incidents, accurately monitor and control fluid flow from drip to patients' veins, and prevent back blood flow. Keywords: Internet of Things, Intravenous drip infusion, Non‐contact Liquid Level Sensor, Thing speak, Esp-32, GSM.","PeriodicalId":504501,"journal":{"name":"INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT","volume":"50 23","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141809561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"STUDY OF RISK AND RETURN OF MUTUAL FUNDS","authors":"Aditya Gupta, of Dr. Shilpa Bahl","doi":"10.55041/ijsrem36743","DOIUrl":"https://doi.org/10.55041/ijsrem36743","url":null,"abstract":"There are many avenues in financial market. An Investor can invest in Bank deposit, corporate debenture and bonds which has law risk with low return. He may also Investor in stock of company which has high risk with hight return. Investors look for safer investment avenues and want to maximize their returns in according to their risk. Whereas people also tries to invest money as early as possible so that the money will grow accordingly in his lifetime. Choose a good investing option is very critical because a balance is required to be maintained between the risks and returns involved in investment. Return is inspiring force and principal reward in the investment process. One of the essential, reason because ofwhich one needs to invest fairly is to meet the cost of inflation. Inflation is the rate at which the cost of living increases at that time. A mutual fund is an expertly overseen company of collective investments that swimming pools money from numerous buyers and puts it in stocks, bonds, momentary money market instruments, as nicely as distinct securities. Mutual money is emerging as helpful instrument for a large scope of speculators, from people looking to put some thing aside for retirement to subtle socialites concentrated on defending their belongings and businesspeople to make wealth. Mutual Fund is a trust that pools the reserve funds of various buyers who share a typical financial objective. Anyone with an investible overflow of as little as two or three thousand rupees can put resources into mutual fund devices as indicated by means of their expressed objective and strategy. Mutual Fund Company pools money from a gathering of individuals with normal hypothesis targets to buy securities, for example, stocks, bonds, money market instruments, a mixture of these instruments, or significantly unique belongings so as to acquire the reward of enhancement and expertly oversaw container of protections at a reasonably ease. In a mutual fund, the fund manager, who is likewise excellent as the portfolio manager, trades the funds underlying securities, acknowledging capital positive factors or losses, and gathers the dividend or hobby income. The income are passed alongside to the investors. The charge of a share of the mutual fund, acknowledged as the net asset value (NAV), which is determined on day through day base, in mild of the absolute estimation of the mutual fund divided by the extent of high-quality shares presently issued.","PeriodicalId":504501,"journal":{"name":"INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT","volume":"31 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141809081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Threats due To Side Channel Attacks (SCA) in Smartphones","authors":"Anushka Naik","doi":"10.55041/ijsrem36777","DOIUrl":"https://doi.org/10.55041/ijsrem36777","url":null,"abstract":"Today’s mobile devices contain densely packaged system-on-chips (SoCs) with multi-core, high frequency CPUs and complex pipelines. In parallel, sophisticated SoC-assisted security mechanisms have become commonplace for protecting device data, such as trusted execution environments, full disk and file-based encryption. Both advancements have dramatically complicated the use of conventional physical attacks, requiring the development of specialised attacks Our proposed classification system allows to analyze side-channel attacks systematically, and facilitates the development of novel countermeasures. Besides this new categorization system, the extensive survey of existing attacks and attack strategies provides valuable insights into the evolving field of side-channel attacks, especially when focusing on mobile devices.. Key Words: Side-channel Attack, active, passive","PeriodicalId":504501,"journal":{"name":"INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT","volume":"39 17","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141809622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Real-time College Bus Tracking System","authors":"Divya R, Hemanth Kumar","doi":"10.55041/ijsrem36730","DOIUrl":"https://doi.org/10.55041/ijsrem36730","url":null,"abstract":"In the today’s society the major issue facing by the student is to catch the college bus on time to reached the destination, the student will be unaware of the college bus whether it has already left the place of the pickup or not?, where is bus? in that case there is no proper solution which identifies the location of a bus. Henceforth in the order to help the students in finding the accurate location of bus, the proposed system implements an Android applications which could help in finding the solution to this problem. By applying latest idea regarding the solution based on GPS (global positioning system) on Internet of Things(IoT), the college students can effectively organize and schedule the bus movement on a campus and also helps to tracking and document it in real time. Thus, the user’s application receives from the Google Map API the map that highlights the recent position of bus. This system also included with the emergency panic button if any accident occur in between the travelling by clicking the panic button student has sent to the notification of alert message to the admin it is equipped with exact location of bus through Gmail. Key Words: Android, GPS, Google Map API, Gmail.","PeriodicalId":504501,"journal":{"name":"INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT","volume":"41 8","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141809750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Lakshmipriya, S.P. Charu Prafulla, S. Lokesh, O. U. Maheswari
{"title":"Malicious UAV Detection Using Blind Source Separation Algorithm and Neural Network Classifier","authors":"K. Lakshmipriya, S.P. Charu Prafulla, S. Lokesh, O. U. Maheswari","doi":"10.55041/ijsrem36797","DOIUrl":"https://doi.org/10.55041/ijsrem36797","url":null,"abstract":"Unmanned aerial vehicle(UAV) technology is the rapid growing technology in the field of monitoring for security purposes, pesticides spraying and various other applications. In the recent days, one of the major concerns is entering of malicious UAVs into the secured perimeter that might result in Drone-based cyberattacks. So, the detection of these malicious UAVs are crucial. In this work, an acoustic method of detecting malicious UAVs is proposed. The mixed form of the acoustic signals of two kinds of drones, namely, Fixed- wing and Multi- rotor are passed through the Blind Source Separation (BSS) block, where the kurtosis is measured along with Independent Component Analysis (ICA) for the separation of the signals. Then the distinctive features, Mel-Frequency Cepstral Coefficient(MFCC), Gamma tone-Frequency Cepstral Coefficient(GTCC) and short time energy are extracted from the acoustic signal and are trained using Neural Network(NN) classifier to identify the malicious UAV. The proposed method under different conditions outperforms the existing techniques with an accuracy of 100% in identification of malicious UAV. Key Words: Blind Source Separation Algorithm, kurtosis, Independent Component Analysis, Mel-Frequency Cepstral Coefficient(MFCC), Gamma tone-Frequency Cepstral Coefficient(GTCC), short time energy, Neural Networks","PeriodicalId":504501,"journal":{"name":"INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT","volume":"51 11","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141806904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Predictive Models in the Chronic Disease Diagnosis","authors":"Anshuman Samantaray, Dr. Sujit Ku Panda","doi":"10.55041/ijsrem36558","DOIUrl":"https://doi.org/10.55041/ijsrem36558","url":null,"abstract":"This paper reviews applications of machine learning (ML) predictive models in the diagnosis of chronic diseases. Chronic diseases (CDs) are responsible for a major portion of global health costs. Patients who suffer from these diseases need lifelong treatment. Nowadays, predictive models are frequently applied in the diagnosis and forecasting of these diseases. In this study, we reviewed the state-of-the-art approaches that encompass ML models in the primary diagnosis of CD. This analysis covers 453 papers published between 2015 and 2019, and our document search was conducted from PubMed (Medline), and Cumulative Index to Nursing and Allied Health Literature (CINAHL) libraries. Ultimately,22 studies were selected to present all modeling methods in a precise way that explains CD diagnosis and usage models of individual pathologies with associated strengths and limitations. Our outcomes suggest that there are no standard methods to determine the best approach in real-time clinical practice since each method has its advantages and disadvantages. Among clustering were the most used. These models are highly applicable in classification, and diagnosis of CD and are expected to become more important in medical practice in the near future. Keywords: chronic diseases; prediction models; pathologies; accuracy; disease classification; K-Nearest Neighbors (KNN); Convolutional Neural Networks(CNN); disease forecasting; disease management.","PeriodicalId":504501,"journal":{"name":"INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT","volume":"62 12","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141806955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A STUDY ON IMPACT OF AI ON E-COMMERCE IN MUMBAI REGION","authors":"Dipali Gopane","doi":"10.55041/ijsrem36712","DOIUrl":"https://doi.org/10.55041/ijsrem36712","url":null,"abstract":"AI is the use of computers that can do things that only humans can do, such as thinking, making decisions, and solving problems. In today’s world, artificial intelligence (AI) refers to a vast array of technologies that drive many of the products and services we use on a daily basis – from TV show recommendations to chatbots providing real-time customer support. But is AI really what most of us think it is? If not, why do we keep hearing the term ‘AI’ so often? In this article, researcher will cover everything you need to know about AI, what it does, and how it is used in e-commerce. Researcher will cover some of its advantages and disadvantages as well as impact of artificial intelligence(AI) on e- commerce. Keywords - E-commerce, Artificial Intelligence (AI).","PeriodicalId":504501,"journal":{"name":"INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT","volume":"94 9","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141808118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}