March 2025

  1. Suman Kumar Shrestha, Govinda Neupane, Rajendra Pokharel and Jantaraj Karky
    ABSTRACT:
    Pub. Date: March 28, 2025
    Paper No:
  2. Suman Kumar Shrestha, Govinda Neupane, Rajendra Pokharel and Jantaraj Karky
    ABSTRACT:

    This study examines the role of meditation in students' emotional intelligence, self-awareness, and individual development.The study was conducted at Excel Public School, Kathmandu, using a qualitative, descriptive approach. The school was chosen through purposive sampling, and data were collected from stakeholders over six months through interviews, focus group discussions, and observations.According to research, meditation dramatically enhances kids' capacity to focus, manage difficult emotions, act appropriately in class, and be socially adaptive. Teachers saw increases in attention, patience, and interpersonal interactions, while students reported feeling less stressed, more self-aware, and more confident about their ability to study. Despite challenges like time constraints and administrative roadblocks, the effectiveness of mindfulness treatments is maximized through systematic, teacher-delivered sessions and continuous feedback.A mindful classroom environment generates emotional resilience, reduces acting-out, and promotes collaboration among students. Expanding meditation programs requires highly trained instructors who can modify techniques across ages and integrate mindfulness into curriculum. New developments could include technology-based tools and interdisciplinary approaches to maximize long-term impact. This study highlights the importance of sustained mindfulness programs in education; pointing to meditation's capacity for creating a supportive and engaged learning environment.

    Pub. Date: March 28, 2025
    Paper No:
    5737
  3. Durai Rajesh Natarajan, Sreekar Peddi, Dharma Teja Valivarthi, Swapna Narla, Sai Sathish Kethu and Arulkumaran, G.
    ABSTRACT:

    Internet of Things networks are proliferating rapidly, and securing document sharing over the cloud presents a significant challenge. Traditional encryption techniques cannot create a compromise between security, efficiency, and scalability. The known encryption techniques such as AES, RSA, and ABE have high computational overheads and their inefficient key management render them unsuitable for larger-scale IoT environments. Homomorphic encryption and security models based on blockchain are said to deliver better security, but they come with high storage and processing costs along with latency concerns. Moreover, end-to-end encryption is lacking in cloud-based systems leading to data breach vulnerabilities, whereas machine-learning-based algorithms for anomaly detection do not readily adapt in real time and are susceptible to adversarial attacks. This research proposes in detail a Secure Multi-Party Computation (SMPC) framework capable of Private Set Intersection (PSI) by integrating homomorphic encryption with new cryptographic optimization techniques, thereby improving secure document exchange in cloud-based IoT environments. The research also applies Gaussian Walk Group Search Optimization, Adaptive Differential Evolution, and Anisotropic Random Walks (ARW) to optimize cryptographic key generation for privacy preserving data sharing. Besides, security and efficiency will be fortified through dynamic load balancing based on Infinite Gaussian Mixture Models (IGMM) and PLONK-based Zero-Knowledge Proofs. The experimental results demonstrate improved encryption strength, computational efficiency, accurate document matching, and low overhead as compared to traditional cryptographic models. The presented solution attains 92% on cloud efficiency, optimized speed in encryption and decryption, and security in the document-sharing platform. This makes the proposed framework very viable for securing IoT-based cloud applications.

    Pub. Date: March 28, 2025
    Paper No:
    5739
  4. Chaitanya Vasamsetty, Subramanyam Boyapati, Rajani Priya Nippatla, Sunil Kumar Alavilli, Bhavya Kadiyala and Purandhar, N.
    Journal Area:
    ABSTRACT:

    The advent of cloud computing in healthcare has made it possible for storage to become scalable and cost effective, which allows sensitive healthcare data to be accessed remotely and promotes collaboration among healthcare providers. The challenge in this data during the time of storage and retrieval will need to be secured and have privacy because it is at risk from cyber threats and unauthorized access existing solutions that do not protect healthcare data from vulnerabilities during decryption and usage.The study proposes developing a methodology for retrieving healthcare data from cloud storage for sensitive information. The system generates a key that will enable a decryption process by using the Blowfish algorithm in order to perform fast and secure decryption of healthcare data. Auditing and monitoring mechanisms are implemented to keep track of unauthorized activities while Threat Intelligence Platforms(TIPs) are used for detecting threats in real time. Further, sensitive information is protected from other forms of misappropriation through data masking. Thus, it suffices to say that all these components make secure handling of healthcare data in compliance with privacy regulation possible.The outcomes show that the key generation time increases linearly with the increase in prime sizes and varies from 200 ms for 0 bits to 1400 ms at 2000 bits. Similarly, the decryption times have risen with the rise of the number of files: the decryption time is 0.82 seconds for 0 files at one point, whereas, for 1000 files, it goes up to 9.33 seconds. There is a suitable match between the predicted CPU usage values and the actual observed values, and thus it confirms the efficiency of the system.This study provides secure methodologies for retrieving health care data from clouds using decryption, monitoring, and masking for sensitive information. This would add value by giving a framework for acquiring fairly secure health data from the cloud in a way that advances health data protection and minimizes vulnerabilities.

    Pub. Date: March 28, 2025
    Paper No:
    5740
  5. Koteswararao Dondapati, Himabindu Chetlapalli, Sharadha Kodadi, Durga Praveen Deevi, Naga Sushma Allur and Aravindhan Kurunthachalam
    ABSTRACT:

    Maintenance of performance, reliability, and efficiency of any system within distributed computing environments is central to QoS. Conventional QoS optimization methods confront challenges regarding dynamic resource allocation, failure, and adaptation of systems. To overcome these limitations, a hybrid artificial neural network and Ant Colony Optimization model are proposed to provide an efficient QoS optimization strategy. The ANN part predicts possible degradation in QoS through parameters like CPU utilization, memory usage, network latency, and response time, while the ACO component dynamically optimizes resource allocation for better system performance. The proposed model considers a systematic workflow comprising data collection, pre-processing, feature extraction, QoS prediction, and ACO-based optimization. The system model training and evaluation are done using the Kaggle dataset Synthetic Log Data of Distributed Systems.As a complement to the handling of missing values with outlier treatment, the fact that Principal Component Analysis (PCA) can be used for feature selection is not omitted. The ANN model establishes the QoS importance trend, which is then optimized by ACO via pheromone-based learning and heuristic value adjustments for improved resource allocation. The experimental findings present the Hybrid ANN-ACO Model with better performance results compared to the existing QoS optimization approaches such as Rule-Based, Genetic Algorithm (GA), and Probabilistic Model Checking (PMC). In this context, the new proposed model saw a performance increase in accuracy to 96.2%, improvement to 59.4% response time, 93.1% CPU utilization efficiency, and 51.2% network latency performance.MSE is less than 0.029, meaning that we have a high level of accuracy for predicting QoS. This study illustrates the successful application of machine learning in combination with bio-inspired optimization for adaptive, scalable, and efficient QoS management in distributed computing environments.

    Pub. Date: March 28, 2025
    Paper No:
    5741
  6. Rajeswaran Ayyadurai, Karthikeyan Parthasarathy, Naresh Kumar Reddy Panga, Jyothi Bobba, Ramya Lakshmi Bolla and Pushpakumar, R.
    ABSTRACT:

    Financial fraud activities are a serious threat to the security and integrity of online banking systems. Traditional fraud detection approaches, such as rule-based and simple machine learning models, are not effective in detecting changing patterns of fraud and suffer from high false positive rates and scalability. To overcome these drawbacks, this research introduces BankSafeNet, a Dual-Autoencoder and Transformer-Based Anomaly Detection System for detecting financial fraud. The suggested framework utilizes a dual-autoencoder architecture to learn transaction patterns and identify anomalies, while a transformer-based classification model learns sequential relationships in transaction data. The system provides a fraud probability score and marks suspicious transactions for investigation. Measured on the PaySim dataset, the developed model records 99.45% accuracy, 99.54% precision, 99.37% recall, and 99.45% F1-score, performing much better than conventional fraud detection methods. The model also has a false positive rate (FPR) of 0.469% and a false negative rate (FNR) of 0.634%, which prove it to be highly resilient in terms of reducing false positives while its fraud detection correctness remains high. The findings demonstrate the effectiveness of BankSafeNet in furnishing an scalable, real-time fraud detection platform that complements financial security of digital transactions.

    Pub. Date: March 28, 2025
    Paper No:
    5742
  7. Kalyan Gattupalli, Poovendran Alagarsundaram, Surendar Rama Sitaraman, Harikumar Nagarajan, Venkata Surya Bhavana Harish Gollavilli and Jayanthi, S.
    ABSTRACT:

    Dermatological disorders, and especially skin cancer, are a worldwide health issue. Precise and early diagnosis is critical in order to pursue efficient treatment, and machine learning, in this case Convolutional Neural Networks (CNNs), has tremendous potential in computerizing the diagnostic process. This research suggests a Visual Geometry Group Network (VGGNet) model for dermatological disorder diagnosis, specifically for skin disorders like melanoma, psoriasis, and eczema. The intended system utilizes cloud image processing for better diagnostic results and scalability. The process involved includes data retrieval, preprocessing (resizing, normalization, and augmentation), extraction of features based on VGGNet, classification with fully connected layers, and AWS-based storage in the cloud for data maintenance. The model demonstrates a noteworthy accuracy of 99%, even better than previous techniques like Hybrid GBDT+ALBERT+Firefly with 92% accuracy. Assessment of performance metric accuracy, precision, recall, and F1-score indicate that the suggested method performs better compared to others, with 96% precision, 97% recall, and 95.16% F1-score.

    Pub. Date: March 28, 2025
    Paper No:
    5745
  8. Rahul Jadon, Kannan Srinivasan, Guman Singh Chauhan, Rajababu Budda, Venkata Surya Teja Gollapalli and Prema, R.
    ABSTRACT:

    Ransomware attacks have emerged as a major cybersecurity threat in terms of the massive financial and data losses it has inflicted across the globe. Such attacks cannot easily be detected by traditional detection techniques, including signature-based and rule-based detection, because these are issues that rely heavily on predefined characteristics and static rules for their identification purposes. These were thus conventional systems that turned out to be poor in adaptability, having high false-positive rates, and insufficient detection when it came to the ever-evolving ransomware attacks. To overcome such limitations, we introduce in this study an improved framework for detecting and preventing ransomware through deep behavioural analysis using Convolutional Neural Network Bidirectional Long Short-Term Memory (CNN-BiLSTM). Here, the CNN would extract spatial features from different system activity logs, whereas the BiLSTM would capture sequential dependencies to improve the accuracy and robustness of the detection. The current proposed system identifies behaviour related to the ransomware domestication instantly and further integrates it with prevention and response mechanisms to counteract the threats before encryption either occurs or can take place. The experimental results indicate that the method realizes the detection accuracy level of 97.5%, which beats the traditional model. The proposed approach outperforms the traditional methods with 18% improved detection rate and 22% of false-positive reduction, making ransomware defence much more reliable. This contribution to much-needed next-generation protection against ransomware is scalable, intelligent, and proactive, thus increasing cyberspace resilience against sophisticated ransomware threats in real-world applications.

    Pub. Date: March 28, 2025
    Paper No:
    5747
  9. Dennis Agyin Osei and Joseph Kwame Mintah
    ABSTRACT:

    The purpose of this study was to investigate the influence of imagery, concentration, level of experience and playing position on penalty kick performance success among the players of the University of Cape Coast (UCC) Youngsters Football Club (FC). Thirty registered players of UCC Youngsters FC for the 2022/2023 season participated in the study. The players were subjected to the taking of kicks from the penalty spot after imagery and concentration intervention programs. The study revealed that imagery (β = .032, p > .05), concentration (β = .232, p > .05), level of experience (β = -.086, p > .05), and playing position (β = -.269, p > .05) are not significant predictors of penalty kick performance success among the players of UCC Youngsters FC. Thus, success in penalty kick among the players is not associated with imagery, concentration, level of experience and playing position.

    Pub. Date: March 30, 2025
    Paper No:
    5712
  10. Dr. Rimmi Datta and Dr. Jayanta Mete
    ABSTRACT:

    Introduction: This research examines the Santhal tribe of India while exploring their cultural and sociological patterns with indigenous populations from countries within South and Southeast Asia which include Nepal, Bangladesh, Myanmar, Thailand and Vietnam. Objectives: This research objective evaluates common traditions within these groups along with their oral storytelling, farming activities and religious beliefs and their ecological stewardship. The ethnographic research compared different cultural groups through qualitative analysis of data that included literature review findings and interview and observational data to find common patterns between cultures and their resilience measures. Discussion: The study shows that community structures alongside sustainable resource management alongside traditional beliefs formed a common cultural value system to protect the environment. The exchange analyzes both the difficulties that globalization along with modernization creates by causing displacement and cultural erosion and shows indigenous adaptability and cultural blending to sustain their traditions. Conclusion: The study demonstrates that indigenous tribes provide essential knowledge about sustainable practices and biodiversity protection and cultural unity which should be integrated into worldwide sustainability systems. Researchers and officials handling environmental advoccacy and cultural protection can use this study as their reference point.

    Pub. Date: March 25, 2025
    Paper No:
    5755
  11. Aida Smajlagić, Ermina Cilović-Kozarević, Jasmina Siočić, Merima Ibišević, Amra Džambić, Maida Šljivić Husejnović , Enida Karić and Merima Salković
    Journal Area:
    ABSTRACT:

    Lycopene is a natural, red-coloured, organic compound notable for its antioxidant properties. Red pigment with a simple molecular formula (C40H56), as a good antioxidant is beneficial for human health. This research represents the positive properties of lycopene and its protective effect on the cardiovascular system; it reduces blood pressure, prevents the oxidation of LDL cholesterol, lipids, etc. This red carotenoid has a number of health effects resulting from its antioxidant effect. In this experimental research, lycopene was isolated by a simple procedure from red grapefruit. The solvents used for the isolation procedure are acetone and petroleum ether. The identification and characterization of lycopene was confirmed by FTIR, UV/Vis and TLC methods.

    Pub. Date: March 25, 2025
    Paper No:
    5722
  12. Thirusubramanian Ganesan, Mohanarangan Veerapperumal Devarajan, Akhil Raj Gaius Yallamelli, Vijaykumar Mamidala, Rama Krishna Mani Kanta Yalla and Veerandra Kumar R.
    ABSTRACT:

    Efficient resource allocation is crucial for cloud data centers performance, scalability, and cost effectiveness. Traditional load balancing systems frequently fail to adjust changing workloads resulting in poor resource use, increased latency and excessive energy consumption. Adaptive Load Balancing Algorithm that optimizes resource allocation in cloud systems is implemented. It combines heuristic and metaheuristic techniques to efficiently distribute workloads among virtual machines resulting in lower response times and balanced computing loads. Centralised Control System monitors real time system data and dynamically reallocates resources in response to workload needs. Performance evaluation shows suggested solution reduces delay by 35 percentage from 120 ms to 85 ms and reduces energy consumption by 30 percent from 200W to 140W. This increases efficiency of resources from 65 to 98 percent. Suggested adaptive technique improves distribution of loads, energy usage and level of service in cloud computing settings. It provides fault tolerance by dynamically shifting jobs during server failures, reducing downtime and increasing system dependability. Comparative research with existing load balancing approaches confirms its advantages in managing large scale dynamic workloads demonstrating suitability for implementation in cloud data centers.

    Pub. Date: March 25, 2025
    Paper No:
    5746
  13. Chhavi Acharya, Prakash Kumar, Aditi Singh and Priyanka Singh
    ABSTRACT:

    Citrus sinensis (sweet orange) and Citrus reticulata fruit is widely consumed the world over for its sweet juice. The peels, pulps and seeds may have some nutrients and antimicrobial properties but are essentially discarded with attendant waste generation. In this study, antimicrobial properties have been analysed in peels, pulp and seeds of Citrus sinensis (sweet orange) and Citrus reticulata (kinnow). Phytochemical screening showed the presence of flavonoid, saponin, terpenoids, proteins, carbohydrates and phenolic compounds. Flavonoid was extracted from these extracts and its quantity was analyzed using aluminium chloride assay methodology. They will be further characterized using thin layer chromatography. These extracts showed effective zone of inhibition against growth of pathogens like Klebsiella pneumoniae and Enterococcus bacteria. These flavonoids could be used for synthesis of nanoparticles and used commercially in biotechnology sectors.

    Pub. Date: March 25, 2025
    Paper No:
    5750
  14. Dr. Rama Rao Bonagani
    ABSTRACT:

    The disaster management includes a complex set of activities, which are carried out both in the pre and post disaster stage.The disaster emergency management practitioners and scholars refer to these activities as the four phases of the comprehensive emergency management cycle, which include mitigation, preparedness, response and recovery. Mitigation and preparedness are pre-disaster activities, while response and recovery constitute post-disaster activities.The governmental institutions response role is very important than the private sphere activity for handling the disaster management.The Kerala(state) floods took place in the month of august ,2018. Bothe the Kerala(state)government and the central government of Indiahad played an immense response role by various policies for successfully dealtthis state’sfloods in 2018 in India.

    Pub. Date: March 25, 2025
    Paper No:
    5754
  15. Bruno Riccardi and Sergio Resta
    Journal Area:
    ABSTRACT:

    I began this article by paraphrasing a historical quote , taken from the famous “Manifesto of the Communist Party” by Karl Marx - Friedrich Engels (1848), which reads as follows: “ A spectre is haunting Europe - the spectre of communism”. I quoted it not because I have sympathies for this ideology like the authors of the manifesto, but because I am against any form of inequality and oppression, and I intend to draw attention to what is stated in the subtitle of this article, which is the thesis I want to demonstrate. In this examination, in fact, I intend to identify and report, based on the documentation presented, what was the true origin of the SARS-CoV-2 pandemic, and for what purposes it was orchestrated, and highlight the advantages that this new strategy for global hegemony, implemented by world power groups, has compared to traditional means of mass destruction. I also propose the need for a general awareness to emancipate ourselves from the uncivilized conditions that characterize our societies. What is published is not the result of the Author's conspiracy paranoia, but faithfully reports the documentation supporting his thesis, which can be verified by anyone.

    Pub. Date: March 25, 2025
    Paper No:
    5765
  16. Christopher Ononiwu Elemuwa, Gloria O. Adoyi, Uchenna Geraldine Elemuwa, Emma Effiong Akpan and Tochukwu Daniel Elemuwa
    Journal Area:
    ABSTRACT:

    Effective community development requires active participation and ownership from local stakeholders. In Nigeria, Ward Development Committees (WDCs) have the potential to drive sustainable community development and social impact. However, these committees often face various challenges in terms of capacity, resources, and effectiveness. This study aims to empower WDCs in Nigeria, enhancing their ability to promote sustainable community development and social impact. By strengthening community governance and promoting participatory development, this initiative seeks to improve the lives of citizens and contribute to Nigeria's sustainable development goals. Ward Development Committees are critical to improving health outcomes and fostering sustainable community development in Nigeria. This study evaluates an intervention aimed at strengthening WDCs to enhance maternal, newborn, and child health (MNCH) outcomes and fortify community health systems. Using a mixed-methods approach, the study was conducted across five states: Bauchi, Ebonyi, Sokoto, Kebbi, and the Federal Capital Territory (FCT). The interventions comprised capacity-building, resource mobilization, community engagement, and implementation of optimized MNCH Week activities. Key achievements included the training of 510 WDC members, transportation of 33,508 pregnant women for antenatal care, and mobilization of over 44 million NGN for health initiatives. Additionally, 606 sensitization activities that reached 24,860 individuals, significantly increasing community participation. However, challenges such as disparities in WDC performance, resource constraints, and weak coordination mechanisms were identified, alongside limitations in state-level support and follow-up mechanisms. To address these issues, the study recommends tailored capacity-strengthening programs, enhanced collaboration with local governments, and increased funding for WDC activities. The findings underscore the transformative potentialities of empowering WDCs to strengthen health systems, reduce maternal and child mortality, and achieve sustainable, community-driven development in Nigeria.

    Pub. Date: March 25, 2025
    Paper No:
    5709
  17. Tejaswi Chillara
    Journal Area:
    ABSTRACT:

    This article takes us through reflection, positioning and the role played by women throughout the history of humanity from an ethical and professional perspective, based on pertinent aspects such as the achievement of equality between women and men. Historically, men and women have always fulfilled well-defined roles. Many of these distinctions were due to biological evidence between the two, different ways are invented with each passing day in order to perpetuate ancestral behaviors, through myths, religions and rituals of historical tales. The inclusion of women in the job market is relatively recent, which was previously only available to men. From working outside the home to intellectual development, there is a long way to go, where in general women do not find a partner in the male class, if not the challenge , to conquer their place that is often overshadowed by the professional ethics represented on a large scale by the male class. As the main objective we saw, to analyze the position of women in the face of the challenges they face in the field of work, as well as their link with Ethics and professional deontology, to carry out the research in this article, questionnaires were applied to employees in the public and private companies in the province of Cabinda composed of male and female individuals whose premise was to highlight the role of women as employees in the public or private sector as well as their ethical profile. Debate issues relating to its development dating back to the beginning, equal rights between men and women, the pressure imposed on women and others. The investigation was carried out using the logic of exploratory research on the contribution of political philosophy, with a concern for optimizing ethics and professional deontology in the workplace and the place of women, in the family and in society.

    Pub. Date: March 25, 2025
    Paper No:
    5734
  18. Ayat Shakir Jawad, Saif Barazan Nteshwn and Hazim Eadan Salim Abu Alhour Al-Finooni
    ABSTRACT:

    The Apology Strategies of Malaysian and Iraqi undergraduate students represent an investigation of cultural norms which affect spoken Apology Speech Acts. The study evaluated apology methods used between Malaysian and Iraqi students while studying the effects of collectivism and hierarchy on these techniques. The research included 120 participants sorted into equal groups of 60 students from Malaysia and Iraq ranging in age from 18 to 23 who studied different academic subjects. Data collection used Discourse Completion Tasks (DCTs), surveys, semi-structured interviews, followed by combined quantitative and qualitative analysis of these data. The study produced substantial variations between the chosen apology methods of both populations. The majority of Malaysian research participants (58.33%) deployed indirect apologetic approaches that incorporated both social harmony markers and hedging techniques due to their collectivist and harmonious cultural values. The Iraqi student participants showed preference toward directness (63.33%) as well as formal language methods that explicitly expressed responsibility, in accordance with their society’s hierarchical structure. The research demonstrated Malaysian students worked to protect their group harmony yet Iraqi students emphasized individual performance combined with proper respect to authority figures. The research results affect both intercultural communication practices as well as second-language acquisition methods. Language education professionals benefit from cultural enlightenment about apology strategies to create training materials and educational curricula. The findings gather from this study help people from different cultures understand each other better while reducing communication errors between people of different backgrounds. The research adds knowledge to cross-cultural pragmatics through its exploration of cultural forces that direct language strategies in apology situations.

    Pub. Date: March 25, 2025
    Paper No:
    5756
  19. Kritikhaa A.P Sundar, Kavitha Devi A.P. Suppayah, Samunthieswari A.P M. Nedumaran, Thanusha A.P Ramachanderan and Madhumita Sen
    Journal Area:
    ABSTRACT:

    This study investigates the level of awareness about Type 2 Diabetes Mellitus (T2DM) among non-medical students at AIMST University, analysing the knowledge and misconceptions surrounding the causes, symptoms, and management of T2DM. The research aims to explore awareness differences across gender and ethnicity among students. Our sample size was 158 respondents, with participants being between 21-23 years of age from the faculties of engineering and business. Our study found that students possess varied levels of awareness, with the majority recognizing basic symptoms like frequent urination and thirst but many holding misconceptions about diet and exercise in managing diabetes. For example, a significant number mistakenly believe diabetes is best monitored by urine testing or that increased exercise heightens the need for insulin, highlighting the need for better health education. Only 65 out of 158 respondents (42%) were aware that diet and exercise are more important than medication to control Diabetes. Overall, this study identifies notable gaps in diabetes knowledge, emphasizing the importance of targeted educational strategies.

    Pub. Date: March 25, 2025
    Paper No:
    5759
  20. Dr. Anju Paul, Dr. Vaibhav Mohansing Solanke, Madhuri Deelip Tayade, Dr. Taseen Sida A.S., Dr. Kuldeep Kumar and Dr Sonu Rajeshwar Madavi
    Journal Area:
    ABSTRACT:

    Neural tube defects are one of the common congenital birth defects and are a relative contraindication for spinal anaesthesia. Spinal anaesthesia for neural tube defects like spinal bifida occulta needs careful neurological evaluation. Neuraxial anaesthesia can be considered if the benefit outweighs the risk. Here, we are presenting a case of a spina bifida patient with a difficult airway and lower respiratory tract infection posted for above-knee amputation managed with spinal anaesthesia as an anaesthetic technique.

    Pub. Date: March 25, 2025
    Paper No:
    5794