{"title":"Assessment of Micronutrient Deficiencies and their Impact on Maternal Health in Secunderabad","authors":"Rashmi Singh, Preeti Sharma, Nakuleshwar Dut Jasuja","doi":"10.26671/ijirg.2024.2.13.101","DOIUrl":"https://doi.org/10.26671/ijirg.2024.2.13.101","url":null,"abstract":"","PeriodicalId":118199,"journal":{"name":"International Journal of Innovative Research and Growth","volume":"26 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140734531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-06DOI: 10.26671/ijirg.2024.2.13.103
P. L. Verma, Sanjay Dwivedi, Shivendra Kumar Dwivedi
{"title":"Analyzing Global Terrorism Database for Identification of Terrorist Group","authors":"P. L. Verma, Sanjay Dwivedi, Shivendra Kumar Dwivedi","doi":"10.26671/ijirg.2024.2.13.103","DOIUrl":"https://doi.org/10.26671/ijirg.2024.2.13.103","url":null,"abstract":"","PeriodicalId":118199,"journal":{"name":"International Journal of Innovative Research and Growth","volume":"43 21","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140735137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-19DOI: 10.26671/ijirg.2024.1.13.104
Anita Shukla
{"title":"Geomagnetic Storms in Relation to Magnetic Clouds, Hard X-Ray Solar Flares, and Disturbances in Interplanetary Magnetic Fields During 1996-2008","authors":"Anita Shukla","doi":"10.26671/ijirg.2024.1.13.104","DOIUrl":"https://doi.org/10.26671/ijirg.2024.1.13.104","url":null,"abstract":"","PeriodicalId":118199,"journal":{"name":"International Journal of Innovative Research and Growth","volume":"441 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140502599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-17DOI: 10.26671/ijirg.2024.1.13.101
Manisha Bajpai, Kishan Sharma, Vishal Saxena
Fractional Calculus and Generalized K-Function
分数微积分和广义 K 函数
{"title":"Fractional calculus and generalized K-function","authors":"Manisha Bajpai, Kishan Sharma, Vishal Saxena","doi":"10.26671/ijirg.2024.1.13.101","DOIUrl":"https://doi.org/10.26671/ijirg.2024.1.13.101","url":null,"abstract":"Fractional Calculus and Generalized K-Function","PeriodicalId":118199,"journal":{"name":"International Journal of Innovative Research and Growth","volume":"131 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140505142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-17DOI: 10.26671/ijirg.2024.1.13.102
Rashmi Sharma, Kishan Sharma, Brajraj S. Chauhan
Sharma, R., Sharma, K., and Chauhan, B. S. (2024). The Generalized K-Function and Its Recurrence Relations. Int J Innovat Res Growth , 13, 14-17. Abstract The aim of this paper is to investigate the recurrence relations of the generalized K-function introduced earlier by Sharma [10]. Several special cases have also been discussed.
Sharma, R., Sharma, K., and Chauhan, B. S. (2024).广义 K 函数及其递推关系》。Int J Innovat Res Growth , 13, 14-17.摘要 本文旨在研究 Sharma [10] 早先提出的广义 K 函数的递推关系。本文还讨论了几种特殊情况。
{"title":"The generalized K-function and its recurrence relations","authors":"Rashmi Sharma, Kishan Sharma, Brajraj S. Chauhan","doi":"10.26671/ijirg.2024.1.13.102","DOIUrl":"https://doi.org/10.26671/ijirg.2024.1.13.102","url":null,"abstract":"Sharma, R., Sharma, K., and Chauhan, B. S. (2024). The Generalized K-Function and Its Recurrence Relations. Int J Innovat Res Growth , 13, 14-17. Abstract The aim of this paper is to investigate the recurrence relations of the generalized K-function introduced earlier by Sharma [10]. Several special cases have also been discussed.","PeriodicalId":118199,"journal":{"name":"International Journal of Innovative Research and Growth","volume":"153 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140505040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-16DOI: 10.26671/ijirg.2024.1.13.103
Anita Shukla, Dhanraj
{"title":"Solar and Interplanetary Causes of Magnetic Cloud Related Forbush Decreases During Solar Cycle 23,24","authors":"Anita Shukla, Dhanraj","doi":"10.26671/ijirg.2024.1.13.103","DOIUrl":"https://doi.org/10.26671/ijirg.2024.1.13.103","url":null,"abstract":"","PeriodicalId":118199,"journal":{"name":"International Journal of Innovative Research and Growth","volume":"28 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140505752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-12DOI: 10.26671/ijirg.2024.1.13.105
P. L. Verma, Shivendra Kumar Dwivedi
{"title":"Cloud Computing in Higher Education: Applications and Future Perspectives","authors":"P. L. Verma, Shivendra Kumar Dwivedi","doi":"10.26671/ijirg.2024.1.13.105","DOIUrl":"https://doi.org/10.26671/ijirg.2024.1.13.105","url":null,"abstract":"","PeriodicalId":118199,"journal":{"name":"International Journal of Innovative Research and Growth","volume":"28 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140509517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-09-05DOI: 10.26671/ijirg.2023.2.12.102
J. Arya, S. Tiwari
Quick Response codes or QR codes are two-dimensional barcodes that can be scanned by mobile phone with embedded camera. In the automatic identification fields QR code has been widely. Picture steganography pictures are to establish the information of the mystery to such an extent that its reality cannot be recognized by the sender and other people separated from the recipient. Security of the secret information has been a challenge when a large amount of data is exchanged on the internet. Protected exchanges of data can be especially accomplished by steganography and cryptography. Steganography is a tool to hide data inside a photograph. Cryptography is a tool that provides encryption systems to verify correspondence. These codes can be used to provide fast access to URL, an SMS message, a phone number, a V-card
{"title":"A survey paper on quick response codes and its image pre-processing methods based on steganography","authors":"J. Arya, S. Tiwari","doi":"10.26671/ijirg.2023.2.12.102","DOIUrl":"https://doi.org/10.26671/ijirg.2023.2.12.102","url":null,"abstract":"Quick Response codes or QR codes are two-dimensional barcodes that can be scanned by mobile phone with embedded camera. In the automatic identification fields QR code has been widely. Picture steganography pictures are to establish the information of the mystery to such an extent that its reality cannot be recognized by the sender and other people separated from the recipient. Security of the secret information has been a challenge when a large amount of data is exchanged on the internet. Protected exchanges of data can be especially accomplished by steganography and cryptography. Steganography is a tool to hide data inside a photograph. Cryptography is a tool that provides encryption systems to verify correspondence. These codes can be used to provide fast access to URL, an SMS message, a phone number, a V-card","PeriodicalId":118199,"journal":{"name":"International Journal of Innovative Research and Growth","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127562097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-09-05DOI: 10.26671/ijirg.2023.2.12.103
A. Rawat, S. Tiwari
The rapid advancement in E-Commerce industry has led to an exponential increase in the use of credit cards for online purchasing and consequently they have been surging in the fraud related to it .In recent years, For banks has become very difficult for detecting the fraud in credit card system and online banking and a large financial loss has greatly affected persons and also merchants and banks. Basically, Fraud is an unlawful way to obtain commodities and resources. The goal of such illegal transaction might be to get yield without paying or gaining an unconstitutional access to an account. That’s why there is a need for an efficient technique that can be used for detecting the credit card fraud. Machine learning algorithms play an important role for detecting the credit card fraud in transactions
{"title":"A comprehensive review on credit card fraud detection using machine learning techniques","authors":"A. Rawat, S. Tiwari","doi":"10.26671/ijirg.2023.2.12.103","DOIUrl":"https://doi.org/10.26671/ijirg.2023.2.12.103","url":null,"abstract":"The rapid advancement in E-Commerce industry has led to an exponential increase in the use of credit cards for online purchasing and consequently they have been surging in the fraud related to it .In recent years, For banks has become very difficult for detecting the fraud in credit card system and online banking and a large financial loss has greatly affected persons and also merchants and banks. Basically, Fraud is an unlawful way to obtain commodities and resources. The goal of such illegal transaction might be to get yield without paying or gaining an unconstitutional access to an account. That’s why there is a need for an efficient technique that can be used for detecting the credit card fraud. Machine learning algorithms play an important role for detecting the credit card fraud in transactions","PeriodicalId":118199,"journal":{"name":"International Journal of Innovative Research and Growth","volume":"21 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130816785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-09-05DOI: 10.26671/ijirg.2023.2.12.101
S. Tiwari, R. P. Sarang
Pervasive computing environments with their interconnected devices and services promise seamless integration of digital infrastructure into our everyday lives. While the focus of current research is on how to connect new devices and build useful applications to improve functionality, the security and privacy issues in such environments have not been explored in any depth. While traditional distributed computing research attempts to abstract away physical location of users and resources, pervasive computing applications often exploit physical location and other context information about users and resources to enhance the user experience. The need to share resources and collaborate introduces new types of interaction among users as well as between the virtual and physical worlds. In this context, it becomes difficult to separate physical security from digital security. Existing policies and mechanisms may not provide adequate guarantees to deal with new exposures and vulnerabilities introduced by the pervasive computing paradigm. In this paper we explore the challenges for building security and privacy into pervasive computing environments, describe our prototype implementation that addresses some of these issues, and propose some directions for future work
{"title":"Security challenges and requirements in ubiquitous computing","authors":"S. Tiwari, R. P. Sarang","doi":"10.26671/ijirg.2023.2.12.101","DOIUrl":"https://doi.org/10.26671/ijirg.2023.2.12.101","url":null,"abstract":"Pervasive computing environments with their interconnected devices and services promise seamless integration of digital infrastructure into our everyday lives. While the focus of current research is on how to connect new devices and build useful applications to improve functionality, the security and privacy issues in such environments have not been explored in any depth. While traditional distributed computing research attempts to abstract away physical location of users and resources, pervasive computing applications often exploit physical location and other context information about users and resources to enhance the user experience. The need to share resources and collaborate introduces new types of interaction among users as well as between the virtual and physical worlds. In this context, it becomes difficult to separate physical security from digital security. Existing policies and mechanisms may not provide adequate guarantees to deal with new exposures and vulnerabilities introduced by the pervasive computing paradigm. In this paper we explore the challenges for building security and privacy into pervasive computing environments, describe our prototype implementation that addresses some of these issues, and propose some directions for future work","PeriodicalId":118199,"journal":{"name":"International Journal of Innovative Research and Growth","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115192541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}