Pub Date : 2023-06-12DOI: 10.52783/cienceng.v11i1.379
Jayashree Rajendran
Human resource (HR) systems and cloud computing technologies have both become integral to modern businesses, and their fusion can have significant impacts on business metrics. The goal of this paper is to systematically study the impact of implementing cloud infrastructure on the Human Resource systems of an organization, leveraging which, an organization attains sustainable growth and thus helps the country in achieving its economic goals. The study examines the impact of cloud-based HR systems on key business metrics such as employee productivity, turnover, and profitability. The paper also provides insights into the different phases of implementation, challenges, and benefits of implementing cloud-based HR systems apart from the conceptual framework of the study and offers recommendations for organizations considering adopting such systems. And further research can be done on risk issues associated with adopting cloud computing like data privacy (due to data breaches), Compliance issues.
{"title":"Impact of Cloud-Based HR Systems on Business Performance Metrics","authors":"Jayashree Rajendran","doi":"10.52783/cienceng.v11i1.379","DOIUrl":"https://doi.org/10.52783/cienceng.v11i1.379","url":null,"abstract":"Human resource (HR) systems and cloud computing technologies have both become integral to modern businesses, and their fusion can have significant impacts on business metrics. \u0000The goal of this paper is to systematically study the impact of implementing cloud infrastructure on the Human Resource systems of an organization, leveraging which, an organization attains sustainable growth and thus helps the country in achieving its economic goals. \u0000The study examines the impact of cloud-based HR systems on key business metrics such as employee productivity, turnover, and profitability. The paper also provides insights into the different phases of implementation, challenges, and benefits of implementing cloud-based HR systems apart from the conceptual framework of the study and offers recommendations for organizations considering adopting such systems. \u0000And further research can be done on risk issues associated with adopting cloud computing like data privacy (due to data breaches), Compliance issues.","PeriodicalId":214525,"journal":{"name":"Proceeding International Conference on Science and Engineering","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115747358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-12DOI: 10.52783/cienceng.v11i1.383
Priti Rana, Sunil Chaudhary, Kulvinder Singh
Now-a-days, the importance of x-rays is increasing in fields like medical diagnosis, cancer treatment, nuclear fission energy, x-ray scanning machines for airport and railway station entry and in treatment of food for preservation. But the exposure to x-rays will be harmful for the users of such facilities. Doctors, operators and researchers are required to be protected from the high energy ionizing radiations like x-rays and gamma rays.So to protect them, proper shielding is necessary. Numbers of shielding materials are used at workplaces of high radiation regions at nuclear installations. Most commonly used, shielding material is lead glasses due to its high atomic number (Z=82). This insures high absorption by the shielding material. Recently light polymer sheets of polyvinyl alcohol (PVA) are replacing heavy glass sheets. To prepare lead polymer sheets lead compounds are mixed with polymer. In the present work, we selected to mix lead iodide in polymer composite to analyze its X-ray shielding capability. Polymer composites sheets of lead iodide with PVA were prepared by solution method. These sheets of Polymer composites were subjected to soft x-rays (30 KeV- 60KeV) switching studies at room temperature. These sheets found to provide the x-ray absorption69.6% higher than conventional shielding material like lead and are light in weight too.
{"title":"Study on Lead Iodide-Polyvinyl Alcohol Polymer Composites as an X-ray Shielding Material","authors":"Priti Rana, Sunil Chaudhary, Kulvinder Singh","doi":"10.52783/cienceng.v11i1.383","DOIUrl":"https://doi.org/10.52783/cienceng.v11i1.383","url":null,"abstract":"Now-a-days, the importance of x-rays is increasing in fields like medical diagnosis, cancer treatment, nuclear fission energy, x-ray scanning machines for airport and railway station entry and in treatment of food for preservation. But the exposure to x-rays will be harmful for the users of such facilities. Doctors, operators and researchers are required to be protected from the high energy ionizing radiations like x-rays and gamma rays.So to protect them, proper shielding is necessary. Numbers of shielding materials are used at workplaces of high radiation regions at nuclear installations. Most commonly used, shielding material is lead glasses due to its high atomic number (Z=82). This insures high absorption by the shielding material. Recently light polymer sheets of polyvinyl alcohol (PVA) are replacing heavy glass sheets. To prepare lead polymer sheets lead compounds are mixed with polymer. In the present work, we selected to mix lead iodide in polymer composite to analyze its X-ray shielding capability. Polymer composites sheets of lead iodide with PVA were prepared by solution method. These sheets of Polymer composites were subjected to soft x-rays (30 KeV- 60KeV) switching studies at room temperature. These sheets found to provide the x-ray absorption69.6% higher than conventional shielding material like lead and are light in weight too.","PeriodicalId":214525,"journal":{"name":"Proceeding International Conference on Science and Engineering","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122138450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-12DOI: 10.52783/cienceng.v11i1.380
B. K. M. Pushparani
Cloud computing (CC) is rapidly increasing and being used more and more in information technology (IT) contexts. Among the hottest issues in the world of CC is task scheduling. In cloud datacentres, load balancing is accomplished using a variety of scheduling techniques, although lengthening the parallel time. By taking task duration and VM capacity into account, this study proposes a cluster-based task scheduling paradigm. The makespan and execution duration should be reduced, the suggested system engages in dynamic load balancing. In this study, we suggest a unique method called HDDSC-JSO, which employs the Jellyfish Swarm Optimization (JSO) algorithm for load balancing and heterogeneous Density based dominant sequence clustering (HDDSC) for job scheduling. Using the HDSC technique, It presents a graph of one or more groups representing user tasks, the tasks of users are first clustered. The Adapted Diverse Expeditious Termination Time (ADETT) method is used to score each work after task clustering. whenever the job with the greatest priority is scheduled first. Next, using a JSO algorithm, load balancing is carried out, distributing the load according to the weight and capacity of the server as well as the connection of the client to the server. Task allocation chooses a heavily weighted or unconnected server, lengthening the response time. Finally, measures including response time, makespan, resource consumption, and service dependability were used to assess the suggested architecture.
{"title":"A Novel Heterogenous Dominant Sequence Clustering for Task Scheduling and Optimal Load Balancing Using JSO in Cloud","authors":"B. K. M. Pushparani","doi":"10.52783/cienceng.v11i1.380","DOIUrl":"https://doi.org/10.52783/cienceng.v11i1.380","url":null,"abstract":"Cloud computing (CC) is rapidly increasing and being used more and more in information technology (IT) contexts. Among the hottest issues in the world of CC is task scheduling. In cloud datacentres, load balancing is accomplished using a variety of scheduling techniques, although lengthening the parallel time. By taking task duration and VM capacity into account, this study proposes a cluster-based task scheduling paradigm. The makespan and execution duration should be reduced, the suggested system engages in dynamic load balancing. In this study, we suggest a unique method called HDDSC-JSO, which employs the Jellyfish Swarm Optimization (JSO) algorithm for load balancing and heterogeneous Density based dominant sequence clustering (HDDSC) for job scheduling. Using the HDSC technique, It presents a graph of one or more groups representing user tasks, the tasks of users are first clustered. The Adapted Diverse Expeditious Termination Time (ADETT) method is used to score each work after task clustering. whenever the job with the greatest priority is scheduled first. Next, using a JSO algorithm, load balancing is carried out, distributing the load according to the weight and capacity of the server as well as the connection of the client to the server. Task allocation chooses a heavily weighted or unconnected server, lengthening the response time. Finally, measures including response time, makespan, resource consumption, and service dependability were used to assess the suggested architecture.","PeriodicalId":214525,"journal":{"name":"Proceeding International Conference on Science and Engineering","volume":"324 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123403406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-12DOI: 10.52783/cienceng.v11i1.382
Sweta Chauhan, Praveen Bhatt, Kulvinder Singh
Technology has modified nearly every aspect of modern life and digital devices have made an important place in every field. In medical field also the digital X-ray applications have contributed a lot. The most important component of digital imaging system is X-Ray sensor. Solid state sensor materials are used as X-ray sensors, like lead iodide, Zinc Sulphide, Titanium dioxide and Mercuric idodide, etc. Mercury Iodide has some favourable properties which make it most suitable material for X-Ray sensor. In present study, polymer composites of Mercury Iodide were prepared using polyvinyl Alcohol (PVA) at room temperature. Studies revealed that Mercury Iodide - PVA sheets show a stable detection of X-rays for all concentrations and the value of (Imax-Imin) increases with increase in the concentration of Mercury iodide to 32 %, and after concentration of 61 % value of (Imax-Imin) starts decreasing. An optimized range of concentration is worked out (32 % to 61%) at which the maximum value of photocurrent is obtained. X-ray switching studies conducted on these sheets show low rise and fall time making the material good for imaging applications. For the concentration of 32.2 % concentration rise time was recorded as 0.99 for a pulse of 2s and more.
{"title":"X-Ray Sensing by Mercury Iodide Poly-Vinyl Alcohol Composite","authors":"Sweta Chauhan, Praveen Bhatt, Kulvinder Singh","doi":"10.52783/cienceng.v11i1.382","DOIUrl":"https://doi.org/10.52783/cienceng.v11i1.382","url":null,"abstract":"Technology has modified nearly every aspect of modern life and digital devices have made an important place in every field. In medical field also the digital X-ray applications have contributed a lot. The most important component of digital imaging system is X-Ray sensor. Solid state sensor materials are used as X-ray sensors, like lead iodide, Zinc Sulphide, Titanium dioxide and Mercuric idodide, etc. Mercury Iodide has some favourable properties which make it most suitable material for X-Ray sensor. In present study, polymer composites of Mercury Iodide were prepared using polyvinyl Alcohol (PVA) at room temperature. Studies revealed that Mercury Iodide - PVA sheets show a stable detection of X-rays for all concentrations and the value of (Imax-Imin) increases with increase in the concentration of Mercury iodide to 32 %, and after concentration of 61 % value of (Imax-Imin) starts decreasing. An optimized range of concentration is worked out (32 % to 61%) at which the maximum value of photocurrent is obtained. X-ray switching studies conducted on these sheets show low rise and fall time making the material good for imaging applications. For the concentration of 32.2 % concentration rise time was recorded as 0.99 for a pulse of 2s and more.","PeriodicalId":214525,"journal":{"name":"Proceeding International Conference on Science and Engineering","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130601151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-12DOI: 10.52783/cienceng.v11i1.381
C. Sekhar, Dr. Suja S Nair
Motivation is an important aspect that determines human behaviour and various studies have been carried out to establish the determinants of human behaviour and its motivational aspects. Military profession offers a different set of working conditions where the magnitude of challenges is well above those found in commercial and other business organisations. The aspects of motivation are peculiar to the military profession and Military motivation is in a league of its own. Militaries across the world face physical and psychological challenges at work that most other people don't. Being armed with the right set of motivational techniques is critical for rising to the demands of such challenges and ensuring the best performance from the soldiers. This study aims to review the different motivational theories and determine their relevance in the context of military motivation. Four of the primary motivation theories in practice today have been reviewed for this purpose. These motivational theories include Maslow’s Hierarchy of Needs Theory, Herzberg’s Motivation-Maintenance Theory, McClelland’s Theory of Need Motivation and McGregor’s Theory X/ Theory Y. These theories show how employees can be motivated to achieve tasks set upon them in the workplace. The relevance of these theories to Military motivation is analysed. Given the peculiarities of the working conditions of the military and the challenges faced therein, these motivational theories can be suitably adapted to modify the functional aspects of military and institute suitable changes in the leadership styles and working mechanisms to improve motivation and enhance task achievement. It has been found that all these motivational theories are still relevant in military environment and can be factored in effectively in the Armed forces.
{"title":"Motivational Theories and Their Relevance in Military Motivation","authors":"C. Sekhar, Dr. Suja S Nair","doi":"10.52783/cienceng.v11i1.381","DOIUrl":"https://doi.org/10.52783/cienceng.v11i1.381","url":null,"abstract":"Motivation is an important aspect that determines human behaviour and various studies have been carried out to establish the determinants of human behaviour and its motivational aspects. Military profession offers a different set of working conditions where the magnitude of challenges is well above those found in commercial and other business organisations. The aspects of motivation are peculiar to the military profession and Military motivation is in a league of its own. Militaries across the world face physical and psychological challenges at work that most other people don't. Being armed with the right set of motivational techniques is critical for rising to the demands of such challenges and ensuring the best performance from the soldiers. \u0000This study aims to review the different motivational theories and determine their relevance in the context of military motivation. Four of the primary motivation theories in practice today have been reviewed for this purpose. These motivational theories include Maslow’s Hierarchy of Needs Theory, Herzberg’s Motivation-Maintenance Theory, McClelland’s Theory of Need Motivation and McGregor’s Theory X/ Theory Y. These theories show how employees can be motivated to achieve tasks set upon them in the workplace. \u0000The relevance of these theories to Military motivation is analysed. Given the peculiarities of the working conditions of the military and the challenges faced therein, these motivational theories can be suitably adapted to modify the functional aspects of military and institute suitable changes in the leadership styles and working mechanisms to improve motivation and enhance task achievement. It has been found that all these motivational theories are still relevant in military environment and can be factored in effectively in the Armed forces.","PeriodicalId":214525,"journal":{"name":"Proceeding International Conference on Science and Engineering","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129130177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-12DOI: 10.52783/cienceng.v11i1.371
Shaik Mohammad Rasool, Shifa Fathima, Mohammed Saqlain, Sadiq Hussain
There are nine billion dumb people in the world. The communication between dumb people and normal people is always a challenging task. One of the key technologies to afford reality is usual interaction between human and objects or living-things in the implicit world created in a computer. Disabled persons are an important part of our society. With the advent of science and technology, efforts are being made to develop certain systems that make them feel and act normally. Especially hearing impaired people interact through hand gestures or signs. It is difficult to find a well experienced translator for the sign language conversion every time and everywhere.
{"title":"Use of Gesture Recognition for Differently Abled Persons","authors":"Shaik Mohammad Rasool, Shifa Fathima, Mohammed Saqlain, Sadiq Hussain","doi":"10.52783/cienceng.v11i1.371","DOIUrl":"https://doi.org/10.52783/cienceng.v11i1.371","url":null,"abstract":"There are nine billion dumb people in the world. The communication between dumb people and normal people is always a challenging task. One of the key technologies to afford reality is usual interaction between human and objects or living-things in the implicit world created in a computer. Disabled persons are an important part of our society. With the advent of science and technology, efforts are being made to develop certain systems that make them feel and act normally. Especially hearing impaired people interact through hand gestures or signs. It is difficult to find a well experienced translator for the sign language conversion every time and everywhere.","PeriodicalId":214525,"journal":{"name":"Proceeding International Conference on Science and Engineering","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116965691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-01DOI: 10.52783/cienceng.v11i1.386
Nitesh Kumar
The education sector is important and continuously upgrades in all aspects. Some essential needs are learning materials, teacher involvement, and student potential to use the resources for better knowledge gain. In a post-pandemic scenario, looking back at pandemic situations, educational reformation took place quickly. Virtual training, virtual laboratories, and online educational facilities must provide flexible training to students, working professionals, and corporate certifications to stay current in this technological era. Hence, this paper presents the virtual assistance strategy using artificial intelligence and blockchain to schedule various tasks at the convenience of the learner and instructor. The paper also uses quantitative analysis to present the post-research feasibility analysis for the proposed system.
{"title":"Development of Virtual Assistance Strategy for Students Using Blockchain and Artificial Intelligence Framework","authors":"Nitesh Kumar","doi":"10.52783/cienceng.v11i1.386","DOIUrl":"https://doi.org/10.52783/cienceng.v11i1.386","url":null,"abstract":"The education sector is important and continuously upgrades in all aspects. Some essential needs are learning materials, teacher involvement, and student potential to use the resources for better knowledge gain. In a post-pandemic scenario, looking back at pandemic situations, educational reformation took place quickly. Virtual training, virtual laboratories, and online educational facilities must provide flexible training to students, working professionals, and corporate certifications to stay current in this technological era. Hence, this paper presents the virtual assistance strategy using artificial intelligence and blockchain to schedule various tasks at the convenience of the learner and instructor. The paper also uses quantitative analysis to present the post-research feasibility analysis for the proposed system.","PeriodicalId":214525,"journal":{"name":"Proceeding International Conference on Science and Engineering","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133511253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-01DOI: 10.52783/cienceng.v11i1.365
Rohit Ravindra Nikam, Rekha Shahapurkar
This Data security and privacy are essential things nowadays due to a large amount of sensitive data broadcasting on social media websites. Most of Internet of Things (IoT) and health care applications having quite challenges to achieve privacy preservation when number of distributed resources has involved during the data broadcasting. In this paper, we proposed a distributed data analysis and privacy preservation framework. In this paper, we introduced numerous privacy preservation techniques during data distribution to achieve high privacy. Some traditional methods, data anonymization, generalization, random permutation, specialization, top-down and bottom-up data generalization, fingerprint insertion etc., are also evaluated on extensive data when distributing with multi parties: the proposed one-way hashing privacy, XOR operation for generating multiple secure copies. First, we develop a few dynamic policies for each copy using XOR operation and insert fingerprints in individual documents. The collaboration of XOR operation and custom policies archives higher security from internal as well as external attacks. On the other hand, the data recovery approach has been designed to extract a fingerprint from secure copies. In the extensive experimental analysis, we evaluate proposed results with numerous existing systems and show the effectiveness of proposed modules in a distributed environment.
{"title":"Privacy Preservation Techniques for Secure Data Broadcasting using in Distributed Environments","authors":"Rohit Ravindra Nikam, Rekha Shahapurkar","doi":"10.52783/cienceng.v11i1.365","DOIUrl":"https://doi.org/10.52783/cienceng.v11i1.365","url":null,"abstract":"This Data security and privacy are essential things nowadays due to a large amount of sensitive data broadcasting on social media websites. Most of Internet of Things (IoT) and health care applications having quite challenges to achieve privacy preservation when number of distributed resources has involved during the data broadcasting. In this paper, we proposed a distributed data analysis and privacy preservation framework. In this paper, we introduced numerous privacy preservation techniques during data distribution to achieve high privacy. Some traditional methods, data anonymization, generalization, random permutation, specialization, top-down and bottom-up data generalization, fingerprint insertion etc., are also evaluated on extensive data when distributing with multi parties: the proposed one-way hashing privacy, XOR operation for generating multiple secure copies. First, we develop a few dynamic policies for each copy using XOR operation and insert fingerprints in individual documents. The collaboration of XOR operation and custom policies archives higher security from internal as well as external attacks. On the other hand, the data recovery approach has been designed to extract a fingerprint from secure copies. In the extensive experimental analysis, we evaluate proposed results with numerous existing systems and show the effectiveness of proposed modules in a distributed environment.","PeriodicalId":214525,"journal":{"name":"Proceeding International Conference on Science and Engineering","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124960775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-01DOI: 10.52783/cienceng.v11i1.364
Renuka S. Durge, V. Deshmukh
To accomplish end users data security, it appears that the methods currently used to ensure data security, privacy, integrity, and availability to cloud users are insufficient. An encryption method will be required to guarantee the private preservation of users data while it is in transit or persistent state. The security of cloud data is ensured by a hybrid encryption algorithm that includes the use of the symmetric Advanced Encryption Standard (AES) and an asymmetric RSA algorithm ,combining an asymmetric algorithm (public-key cryptography, or PKC) with a symmetric algorithm (also called private key cryptography), which employs a single key for encryption and decryption, to increase the security of cloud data. Hybird encryption has significant benefits over single encryption in terms of security, speed and computation time. By first encrypting data with AES and then encrypting the AES key with RSA while in the cloud, the suggested method offers a hybrid encryption scheme that improves the security of cloud data. This paper examines various forms of cryptographic encryption and also offers a enchanced hybrid encryption technique for online applications.
{"title":"Comparative analysis of enhanced hybrid encryption algorithm with single encryption algorithm","authors":"Renuka S. Durge, V. Deshmukh","doi":"10.52783/cienceng.v11i1.364","DOIUrl":"https://doi.org/10.52783/cienceng.v11i1.364","url":null,"abstract":"To accomplish end users data security, it appears that the methods currently used to ensure data security, privacy, integrity, and availability to cloud users are insufficient. An encryption method will be required to guarantee the private preservation of users data while it is in transit or persistent state. The security of cloud data is ensured by a hybrid encryption algorithm that includes the use of the symmetric Advanced Encryption Standard (AES) and an asymmetric RSA algorithm ,combining an asymmetric algorithm (public-key cryptography, or PKC) with a symmetric algorithm (also called private key cryptography), which employs a single key for encryption and decryption, to increase the security of cloud data. Hybird encryption has significant benefits over single encryption in terms of security, speed and computation time. By first encrypting data with AES and then encrypting the AES key with RSA while in the cloud, the suggested method offers a hybrid encryption scheme that improves the security of cloud data. This paper examines various forms of cryptographic encryption and also offers a enchanced hybrid encryption technique for online applications.","PeriodicalId":214525,"journal":{"name":"Proceeding International Conference on Science and Engineering","volume":"46 25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116355959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-01DOI: 10.52783/cienceng.v11i1.363
Keshav Walke, Shyamrao Koreti, Amen Xavier
Forests are essential ecosystems that support biodiversity, regulate climate, and provide critical resources for local communities. However, forest-dwelling communities face numerous challenges, including poverty, lack of access to education, healthcare, and basic infrastructure, and conflict with wildlife conservation. The Kanha-Kisli Protected Area (KKPA) in Madhya Pradesh, India, is one such forest landscape where tribal communities have been living for generations. Despite efforts to integrate forest conservation and community development, forest dwellers in KKPA continue to struggle with various issues.
{"title":"Uncovering the Realities of Forest-Dwelling Communities in Kanha-Kisli Protected Area of Madhya Pradesh: An Examination of Livelihood and Socio-Economic, Challenges","authors":"Keshav Walke, Shyamrao Koreti, Amen Xavier","doi":"10.52783/cienceng.v11i1.363","DOIUrl":"https://doi.org/10.52783/cienceng.v11i1.363","url":null,"abstract":"Forests are essential ecosystems that support biodiversity, regulate climate, and provide critical resources for local communities. However, forest-dwelling communities face numerous challenges, including poverty, lack of access to education, healthcare, and basic infrastructure, and conflict with wildlife conservation. The Kanha-Kisli Protected Area (KKPA) in Madhya Pradesh, India, is one such forest landscape where tribal communities have been living for generations. Despite efforts to integrate forest conservation and community development, forest dwellers in KKPA continue to struggle with various issues.","PeriodicalId":214525,"journal":{"name":"Proceeding International Conference on Science and Engineering","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125971020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}