Pub Date : 2023-06-17DOI: 10.48047/nq.2022.20.8.nq221060
{"title":"Design and Analysis of Biomedical Implants for Enhanced Biocompatibility and Durability","authors":"","doi":"10.48047/nq.2022.20.8.nq221060","DOIUrl":"https://doi.org/10.48047/nq.2022.20.8.nq221060","url":null,"abstract":"","PeriodicalId":19148,"journal":{"name":"NeuroQuantology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45221569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-17DOI: 10.48047/nq.2022.20.8.nq221056
{"title":"PDTB-IDS: A Parameter and Distributed Trust Based Intrusion Detection System for Wireless Sensor Network","authors":"","doi":"10.48047/nq.2022.20.8.nq221056","DOIUrl":"https://doi.org/10.48047/nq.2022.20.8.nq221056","url":null,"abstract":"","PeriodicalId":19148,"journal":{"name":"NeuroQuantology","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135525181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-09DOI: 10.48047/nq.2022.20.5.nq22822
{"title":"THE INFLUENCE OF CULTURE ON GAME DEVELOPMENT AND DESIGN","authors":"","doi":"10.48047/nq.2022.20.5.nq22822","DOIUrl":"https://doi.org/10.48047/nq.2022.20.5.nq22822","url":null,"abstract":"","PeriodicalId":19148,"journal":{"name":"NeuroQuantology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48737784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-09DOI: 10.48047/nq.2022.20.5.nq22820
{"title":"THE PORTRAYAL OF GENDER AND RACE IN VIDEO GAMES","authors":"","doi":"10.48047/nq.2022.20.5.nq22820","DOIUrl":"https://doi.org/10.48047/nq.2022.20.5.nq22820","url":null,"abstract":"","PeriodicalId":19148,"journal":{"name":"NeuroQuantology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46213708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-09DOI: 10.48047/nq.2022.20.5.nq22815
Jyoti Parsola
: Organisations are constantly at risk from cyberattacks in today's digital environment, which can seriously harm their finances, reputations, and operational capabilities. Organisations must take a proactive approach to managing cybersecurity risk in order to protect sensitive data and systems. In order to strengthen organisational security, this research study focuses on the ideas, methodology, and best practises of cybersecurity risk assessment and management. The significance of comprehending the threat landscape, doing risk assessments, putting risk mitigation techniques into practise, and creating an all-encompassing cybersecurity management framework are discussed in the article. The results emphasise the importance of a comprehensive and flexible strategy to cybersecurity that incorporates technology solutions, personnel awareness and training, incident response planning, and ongoing monitoring to maintain strong organisational security.
{"title":"Cybersecurity Risk Assessment and Management for Organizational Security","authors":"Jyoti Parsola","doi":"10.48047/nq.2022.20.5.nq22815","DOIUrl":"https://doi.org/10.48047/nq.2022.20.5.nq22815","url":null,"abstract":": Organisations are constantly at risk from cyberattacks in today's digital environment, which can seriously harm their finances, reputations, and operational capabilities. Organisations must take a proactive approach to managing cybersecurity risk in order to protect sensitive data and systems. In order to strengthen organisational security, this research study focuses on the ideas, methodology, and best practises of cybersecurity risk assessment and management. The significance of comprehending the threat landscape, doing risk assessments, putting risk mitigation techniques into practise, and creating an all-encompassing cybersecurity management framework are discussed in the article. The results emphasise the importance of a comprehensive and flexible strategy to cybersecurity that incorporates technology solutions, personnel awareness and training, incident response planning, and ongoing monitoring to maintain strong organisational security.","PeriodicalId":19148,"journal":{"name":"NeuroQuantology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42744506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-09DOI: 10.48047/nq.2022.20.5.nq22810
{"title":"Wireless Sensor Network System for Clever Vegetation-IoT Using Convolutional Neural Network","authors":"","doi":"10.48047/nq.2022.20.5.nq22810","DOIUrl":"https://doi.org/10.48047/nq.2022.20.5.nq22810","url":null,"abstract":"","PeriodicalId":19148,"journal":{"name":"NeuroQuantology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46912572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-09DOI: 10.48047/nq.2022.20.5.nq22817
Akankasha Kathuria, Asst. Professor
A cartoon isn't only for kids' entertainment. It began to interfere with their normal activities. Thus, these animated characters have both positive and negative effects on the developing brains of these children. Given that they are aware of the importance that youngsters put on these visual characters, corporations are leveraging this as a strategic tactic to expand their customer base. This study attempts to investigate the considerable influence that cartoon characters have on product marketing, notably via advertisements, as well as how these kids choose what to buy. This study modifies the hypodermic needle concept after using a survey to ascertain whether children prefer cartoon characters on merchandise. This research used a quantitative methodology. The sample for the research consists of 100 participants, the majority of whom are children between the ages of 4 and 8.
{"title":"THE USE OF ANIMATION IN ADVERTISING AND MARKETING","authors":"Akankasha Kathuria, Asst. Professor","doi":"10.48047/nq.2022.20.5.nq22817","DOIUrl":"https://doi.org/10.48047/nq.2022.20.5.nq22817","url":null,"abstract":"A cartoon isn't only for kids' entertainment. It began to interfere with their normal activities. Thus, these animated characters have both positive and negative effects on the developing brains of these children. Given that they are aware of the importance that youngsters put on these visual characters, corporations are leveraging this as a strategic tactic to expand their customer base. This study attempts to investigate the considerable influence that cartoon characters have on product marketing, notably via advertisements, as well as how these kids choose what to buy. This study modifies the hypodermic needle concept after using a survey to ascertain whether children prefer cartoon characters on merchandise. This research used a quantitative methodology. The sample for the research consists of 100 participants, the majority of whom are children between the ages of 4 and 8.","PeriodicalId":19148,"journal":{"name":"NeuroQuantology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47446357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-09DOI: 10.48047/nq.2022.20.5.nq22821
Akankasha Kathuria, Asst. Professor
Many teenagers' routines now include extensive time spent playing videogames and computer games. Teens and young adults spend countless hours each week playing violent video games. Media that show someone trying to hurt others on purpose is considered violent. Most of these studies' research locations were wealthy, industrialized nations. The nation's future lies in its children. The results showed that the connection between fundamental psychological requirements and compulsive internet gaming was mediated in a serial fashion by a sense of duty and purpose in life. The results also suggested that having purpose in life and taking on responsibilities might help explain the inverse association between compulsive internet gaming and meeting fundamental psychological requirements. The current study's findings are significant because they imply that satisfying adolescents' fundamental psychological needs may aid in preventing their addiction to online gaming.
{"title":"THE PSYCHOLOGICAL EFFECTS OF VIDEO GAME ADDICTION","authors":"Akankasha Kathuria, Asst. Professor","doi":"10.48047/nq.2022.20.5.nq22821","DOIUrl":"https://doi.org/10.48047/nq.2022.20.5.nq22821","url":null,"abstract":"Many teenagers' routines now include extensive time spent playing videogames and computer games. Teens and young adults spend countless hours each week playing violent video games. Media that show someone trying to hurt others on purpose is considered violent. Most of these studies' research locations were wealthy, industrialized nations. The nation's future lies in its children. The results showed that the connection between fundamental psychological requirements and compulsive internet gaming was mediated in a serial fashion by a sense of duty and purpose in life. The results also suggested that having purpose in life and taking on responsibilities might help explain the inverse association between compulsive internet gaming and meeting fundamental psychological requirements. The current study's findings are significant because they imply that satisfying adolescents' fundamental psychological needs may aid in preventing their addiction to online gaming.","PeriodicalId":19148,"journal":{"name":"NeuroQuantology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48606543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-09DOI: 10.48047/nq.2022.20.5.nq22812
Divya Kapil
: Wireless sensor networks (WSNs) are essential for a variety of applications, such as surveillance, industrial automation, and monitoring of the environment. The distributed and resource-constrained design of WSNs, however, leaves them open to a number of security risks, such as grayhole attacks. Grayhole attacks cause network interruption and compromised data integrity by causing hostile nodes to selectively drop or modify data packets. To counteract grayhole attacks in WSNs, we suggest the cluster-based low-energy adaptive clustering hierarchy (LEACH) algorithm in this study. To improve the security and energy efficiency of WSNs, the suggested method makes use of dynamic cluster formation, energy-efficient routing, and trust-based packet forwarding.
{"title":"Cluster-based Low-Energy Adaptive Clustering Hierarchy for Grayhole Attack in Wireless Sensor Networks","authors":"Divya Kapil","doi":"10.48047/nq.2022.20.5.nq22812","DOIUrl":"https://doi.org/10.48047/nq.2022.20.5.nq22812","url":null,"abstract":": Wireless sensor networks (WSNs) are essential for a variety of applications, such as surveillance, industrial automation, and monitoring of the environment. The distributed and resource-constrained design of WSNs, however, leaves them open to a number of security risks, such as grayhole attacks. Grayhole attacks cause network interruption and compromised data integrity by causing hostile nodes to selectively drop or modify data packets. To counteract grayhole attacks in WSNs, we suggest the cluster-based low-energy adaptive clustering hierarchy (LEACH) algorithm in this study. To improve the security and energy efficiency of WSNs, the suggested method makes use of dynamic cluster formation, energy-efficient routing, and trust-based packet forwarding.","PeriodicalId":19148,"journal":{"name":"NeuroQuantology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45695719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}