首页 > 最新文献

International Journal of Innovative Research and Growth最新文献

英文 中文
Assessment of Micronutrient Deficiencies and their Impact on Maternal Health in Secunderabad 塞康德拉巴德微量营养素缺乏及其对产妇健康影响的评估
Pub Date : 2024-04-06 DOI: 10.26671/ijirg.2024.2.13.101
Rashmi Singh, Preeti Sharma, Nakuleshwar Dut Jasuja
{"title":"Assessment of Micronutrient Deficiencies and their Impact on Maternal Health in Secunderabad","authors":"Rashmi Singh, Preeti Sharma, Nakuleshwar Dut Jasuja","doi":"10.26671/ijirg.2024.2.13.101","DOIUrl":"https://doi.org/10.26671/ijirg.2024.2.13.101","url":null,"abstract":"","PeriodicalId":118199,"journal":{"name":"International Journal of Innovative Research and Growth","volume":"26 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140734531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analyzing Global Terrorism Database for Identification of Terrorist Group 分析全球恐怖主义数据库以识别恐怖组织
Pub Date : 2024-04-06 DOI: 10.26671/ijirg.2024.2.13.103
P. L. Verma, Sanjay Dwivedi, Shivendra Kumar Dwivedi
{"title":"Analyzing Global Terrorism Database for Identification of Terrorist Group","authors":"P. L. Verma, Sanjay Dwivedi, Shivendra Kumar Dwivedi","doi":"10.26671/ijirg.2024.2.13.103","DOIUrl":"https://doi.org/10.26671/ijirg.2024.2.13.103","url":null,"abstract":"","PeriodicalId":118199,"journal":{"name":"International Journal of Innovative Research and Growth","volume":"43 21","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140735137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Geomagnetic Storms in Relation to Magnetic Clouds, Hard X-Ray Solar Flares, and Disturbances in Interplanetary Magnetic Fields During 1996-2008 1996-2008 年间地磁暴与磁云、硬 X 射线太阳耀斑和行星际磁场扰动的关系
Pub Date : 2024-01-19 DOI: 10.26671/ijirg.2024.1.13.104
Anita Shukla
{"title":"Geomagnetic Storms in Relation to Magnetic Clouds, Hard X-Ray Solar Flares, and Disturbances in Interplanetary Magnetic Fields During 1996-2008","authors":"Anita Shukla","doi":"10.26671/ijirg.2024.1.13.104","DOIUrl":"https://doi.org/10.26671/ijirg.2024.1.13.104","url":null,"abstract":"","PeriodicalId":118199,"journal":{"name":"International Journal of Innovative Research and Growth","volume":"441 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140502599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fractional calculus and generalized K-function 分数微积分和广义 K 函数
Pub Date : 2024-01-17 DOI: 10.26671/ijirg.2024.1.13.101
Manisha Bajpai, Kishan Sharma, Vishal Saxena
Fractional Calculus and Generalized K-Function
分数微积分和广义 K 函数
{"title":"Fractional calculus and generalized K-function","authors":"Manisha Bajpai, Kishan Sharma, Vishal Saxena","doi":"10.26671/ijirg.2024.1.13.101","DOIUrl":"https://doi.org/10.26671/ijirg.2024.1.13.101","url":null,"abstract":"Fractional Calculus and Generalized K-Function","PeriodicalId":118199,"journal":{"name":"International Journal of Innovative Research and Growth","volume":"131 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140505142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The generalized K-function and its recurrence relations 广义 K 函数及其递推关系
Pub Date : 2024-01-17 DOI: 10.26671/ijirg.2024.1.13.102
Rashmi Sharma, Kishan Sharma, Brajraj S. Chauhan
Sharma, R., Sharma, K., and Chauhan, B. S. (2024). The Generalized K-Function and Its Recurrence Relations. Int J Innovat Res Growth , 13, 14-17. Abstract The aim of this paper is to investigate the recurrence relations of the generalized K-function introduced earlier by Sharma [10]. Several special cases have also been discussed.
Sharma, R., Sharma, K., and Chauhan, B. S. (2024).广义 K 函数及其递推关系》。Int J Innovat Res Growth , 13, 14-17.摘要 本文旨在研究 Sharma [10] 早先提出的广义 K 函数的递推关系。本文还讨论了几种特殊情况。
{"title":"The generalized K-function and its recurrence relations","authors":"Rashmi Sharma, Kishan Sharma, Brajraj S. Chauhan","doi":"10.26671/ijirg.2024.1.13.102","DOIUrl":"https://doi.org/10.26671/ijirg.2024.1.13.102","url":null,"abstract":"Sharma, R., Sharma, K., and Chauhan, B. S. (2024). The Generalized K-Function and Its Recurrence Relations. Int J Innovat Res Growth , 13, 14-17. Abstract The aim of this paper is to investigate the recurrence relations of the generalized K-function introduced earlier by Sharma [10]. Several special cases have also been discussed.","PeriodicalId":118199,"journal":{"name":"International Journal of Innovative Research and Growth","volume":"153 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140505040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Solar and Interplanetary Causes of Magnetic Cloud Related Forbush Decreases During Solar Cycle 23,24 太阳周期 23、24 期间磁云相关福布什减少的太阳和行星际原因
Pub Date : 2024-01-16 DOI: 10.26671/ijirg.2024.1.13.103
Anita Shukla, Dhanraj
{"title":"Solar and Interplanetary Causes of Magnetic Cloud Related Forbush Decreases During Solar Cycle 23,24","authors":"Anita Shukla, Dhanraj","doi":"10.26671/ijirg.2024.1.13.103","DOIUrl":"https://doi.org/10.26671/ijirg.2024.1.13.103","url":null,"abstract":"","PeriodicalId":118199,"journal":{"name":"International Journal of Innovative Research and Growth","volume":"28 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140505752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cloud Computing in Higher Education: Applications and Future Perspectives 高等教育中的云计算:应用与未来展望
Pub Date : 2024-01-12 DOI: 10.26671/ijirg.2024.1.13.105
P. L. Verma, Shivendra Kumar Dwivedi
{"title":"Cloud Computing in Higher Education: Applications and Future Perspectives","authors":"P. L. Verma, Shivendra Kumar Dwivedi","doi":"10.26671/ijirg.2024.1.13.105","DOIUrl":"https://doi.org/10.26671/ijirg.2024.1.13.105","url":null,"abstract":"","PeriodicalId":118199,"journal":{"name":"International Journal of Innovative Research and Growth","volume":"28 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140509517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A survey paper on quick response codes and its image pre-processing methods based on steganography 基于隐写术的快速响应码及其图像预处理方法综述
Pub Date : 2023-09-05 DOI: 10.26671/ijirg.2023.2.12.102
J. Arya, S. Tiwari
Quick Response codes or QR codes are two-dimensional barcodes that can be scanned by mobile phone with embedded camera. In the automatic identification fields QR code has been widely. Picture steganography pictures are to establish the information of the mystery to such an extent that its reality cannot be recognized by the sender and other people separated from the recipient. Security of the secret information has been a challenge when a large amount of data is exchanged on the internet. Protected exchanges of data can be especially accomplished by steganography and cryptography. Steganography is a tool to hide data inside a photograph. Cryptography is a tool that provides encryption systems to verify correspondence. These codes can be used to provide fast access to URL, an SMS message, a phone number, a V-card
QR码是一种可以通过内置摄像头的手机扫描的二维条形码。在自动识别领域,QR码得到了广泛的应用。图片隐写术的目的是建立信息的神秘性,使其真实性无法被发送者和其他与接收者分离的人所识别。当大量数据在互联网上交换时,机密信息的安全性成为一个挑战。受保护的数据交换尤其可以通过隐写术和密码学来实现。隐写术是一种将数据隐藏在照片中的工具。密码学是一种提供加密系统来验证通信的工具。这些代码可用于提供对URL、SMS消息、电话号码、v -卡的快速访问
{"title":"A survey paper on quick response codes and its image pre-processing methods based on steganography","authors":"J. Arya, S. Tiwari","doi":"10.26671/ijirg.2023.2.12.102","DOIUrl":"https://doi.org/10.26671/ijirg.2023.2.12.102","url":null,"abstract":"Quick Response codes or QR codes are two-dimensional barcodes that can be scanned by mobile phone with embedded camera. In the automatic identification fields QR code has been widely. Picture steganography pictures are to establish the information of the mystery to such an extent that its reality cannot be recognized by the sender and other people separated from the recipient. Security of the secret information has been a challenge when a large amount of data is exchanged on the internet. Protected exchanges of data can be especially accomplished by steganography and cryptography. Steganography is a tool to hide data inside a photograph. Cryptography is a tool that provides encryption systems to verify correspondence. These codes can be used to provide fast access to URL, an SMS message, a phone number, a V-card","PeriodicalId":118199,"journal":{"name":"International Journal of Innovative Research and Growth","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127562097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A comprehensive review on credit card fraud detection using machine learning techniques 使用机器学习技术进行信用卡欺诈检测的综合综述
Pub Date : 2023-09-05 DOI: 10.26671/ijirg.2023.2.12.103
A. Rawat, S. Tiwari
The rapid advancement in E-Commerce industry has led to an exponential increase in the use of credit cards for online purchasing and consequently they have been surging in the fraud related to it .In recent years, For banks has become very difficult for detecting the fraud in credit card system and online banking and a large financial loss has greatly affected persons and also merchants and banks. Basically, Fraud is an unlawful way to obtain commodities and resources. The goal of such illegal transaction might be to get yield without paying or gaining an unconstitutional access to an account. That’s why there is a need for an efficient technique that can be used for detecting the credit card fraud. Machine learning algorithms play an important role for detecting the credit card fraud in transactions
随着电子商务行业的飞速发展,使用信用卡进行网上购物的人数呈指数级增长,与之相关的诈骗案件也随之激增。近年来,对于银行来说,信用卡系统和网上银行的欺诈行为很难被发现,给个人、商家和银行造成了巨大的经济损失。基本上,欺诈是一种获取商品和资源的非法方式。这种非法交易的目标可能是在没有支付或获得违宪访问账户的情况下获得收益。这就是为什么需要一种有效的技术来检测信用卡欺诈。机器学习算法在信用卡交易欺诈检测中发挥着重要作用
{"title":"A comprehensive review on credit card fraud detection using machine learning techniques","authors":"A. Rawat, S. Tiwari","doi":"10.26671/ijirg.2023.2.12.103","DOIUrl":"https://doi.org/10.26671/ijirg.2023.2.12.103","url":null,"abstract":"The rapid advancement in E-Commerce industry has led to an exponential increase in the use of credit cards for online purchasing and consequently they have been surging in the fraud related to it .In recent years, For banks has become very difficult for detecting the fraud in credit card system and online banking and a large financial loss has greatly affected persons and also merchants and banks. Basically, Fraud is an unlawful way to obtain commodities and resources. The goal of such illegal transaction might be to get yield without paying or gaining an unconstitutional access to an account. That’s why there is a need for an efficient technique that can be used for detecting the credit card fraud. Machine learning algorithms play an important role for detecting the credit card fraud in transactions","PeriodicalId":118199,"journal":{"name":"International Journal of Innovative Research and Growth","volume":"21 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130816785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security challenges and requirements in ubiquitous computing 普适计算中的安全挑战和需求
Pub Date : 2023-09-05 DOI: 10.26671/ijirg.2023.2.12.101
S. Tiwari, R. P. Sarang
Pervasive computing environments with their interconnected devices and services promise seamless integration of digital infrastructure into our everyday lives. While the focus of current research is on how to connect new devices and build useful applications to improve functionality, the security and privacy issues in such environments have not been explored in any depth. While traditional distributed computing research attempts to abstract away physical location of users and resources, pervasive computing applications often exploit physical location and other context information about users and resources to enhance the user experience. The need to share resources and collaborate introduces new types of interaction among users as well as between the virtual and physical worlds. In this context, it becomes difficult to separate physical security from digital security. Existing policies and mechanisms may not provide adequate guarantees to deal with new exposures and vulnerabilities introduced by the pervasive computing paradigm. In this paper we explore the challenges for building security and privacy into pervasive computing environments, describe our prototype implementation that addresses some of these issues, and propose some directions for future work
普适计算环境及其相互连接的设备和服务承诺将数字基础设施无缝集成到我们的日常生活中。虽然目前的研究重点是如何连接新设备和构建有用的应用程序来改进功能,但这种环境中的安全和隐私问题尚未得到深入探讨。传统的分布式计算研究试图抽象出用户和资源的物理位置,而普及计算应用程序通常利用物理位置和其他关于用户和资源的上下文信息来增强用户体验。共享资源和协作的需求在用户之间以及虚拟世界和物理世界之间引入了新的交互类型。在这种情况下,很难将物理安全和数字安全分开。现有的策略和机制可能无法提供足够的保证来处理普适计算范式引入的新暴露和漏洞。在本文中,我们探讨了在普适计算环境中构建安全和隐私的挑战,描述了解决其中一些问题的原型实现,并提出了未来工作的一些方向
{"title":"Security challenges and requirements in ubiquitous computing","authors":"S. Tiwari, R. P. Sarang","doi":"10.26671/ijirg.2023.2.12.101","DOIUrl":"https://doi.org/10.26671/ijirg.2023.2.12.101","url":null,"abstract":"Pervasive computing environments with their interconnected devices and services promise seamless integration of digital infrastructure into our everyday lives. While the focus of current research is on how to connect new devices and build useful applications to improve functionality, the security and privacy issues in such environments have not been explored in any depth. While traditional distributed computing research attempts to abstract away physical location of users and resources, pervasive computing applications often exploit physical location and other context information about users and resources to enhance the user experience. The need to share resources and collaborate introduces new types of interaction among users as well as between the virtual and physical worlds. In this context, it becomes difficult to separate physical security from digital security. Existing policies and mechanisms may not provide adequate guarantees to deal with new exposures and vulnerabilities introduced by the pervasive computing paradigm. In this paper we explore the challenges for building security and privacy into pervasive computing environments, describe our prototype implementation that addresses some of these issues, and propose some directions for future work","PeriodicalId":118199,"journal":{"name":"International Journal of Innovative Research and Growth","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115192541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Innovative Research and Growth
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1