ISSN: 2582 - 9734

Past Issue

Scientifically Based Measures To Combat Erosion Of Slope Lands In Azerbaijan

Prof. Dr. Z. H. Aliyev

CrossRef DOI URL :


Different geographical areas of the country have also been identified the possible distances between stripes on different slopes. Soil preparation should be carried out with a strip of 1–2 m in every 3–5 m in areas of 10–200 incidence, moderate to severe, and 1.5–3 m wide in each of the 2–3 m in severely washed areas of 20–300 m. trench to be dug. In large areas with more than 15-200 thick, thick soils and where the tractor can operate, deforestation should be carried out on terraces. On the slopes where heavily washed and often rigid rocks are exposed, soil preparation can be used to make yards and ditches..

Enhancing Nigeria’s Security Capacity Through Biotechnology

Ekpa, E. A, Micheal N. E, Amina S.B, Oluwatosin C.O, Oluwatosin Comfort Oluwatoyin

CrossRef DOI URL :


The race by developed Nations to enhance their security capacities in recent times calls for careful and deliberate actions by other third world countries. No less thanks to the ongoing war between Russia and Ukraine. It seems bigger Nations are suddenly becoming bullies due to their perceived superior military might. Since everything is fair and square in war, all kinds of weapons including bioweapons are now been deployed in order to subdue opponents. Apart from these developed Nations who are constantly developing their defense capacity, rogue states and terrorist organizations are also exploring novel methods of creating weapons of mass destruction. The intentional release of traditional or combinatorial bioweapons remains one of the most important challenges that will continue to shape national and global security in the nearest future. Therefore, in order to use biotechnology for medical intelligence, forensic operations, bio-threat awareness, and mitigation, attention has to be redirected towards the development of molecular techniques in boosting our security system. This article is an attempt to highlight some of these benefits and challenges that field of biotechnology confronts in terms of biodefence. Issues related to the analysis of pathogen genomes and emerging methods and knowledge management and their impact on intelligence, forensics, biosecurity, and policymaking will also be discussed. The essence of the essay is a wake-up call to our authorities on the need to develop their local capacity via the instruments of science and technology especially biotechnology in order to ensure the security of our country..

The New Education Policy 2020: Features, Opportunities And Challenges

Syed Abdul Raouf, Inam UL Haq

CrossRef DOI URL :


The objective of India's National Education Policy (NEP) 2020 is to revamp the country's educational system so that it is more contemporary, forward-thinking, and equitable. The key goals of the new strategy are to increase students' levels of literacy and numeracy upon graduation from elementary schools, to decrease the number of students who drop out of middle and secondary schools, and to implement a multidisciplinary approach into the nation's system of higher education.Early childhood education is going to be incorporated into formal education as part of the NEP's plan to implement a change away from the current 10+2 framework and toward a 5+3+3+4 structure. The NEP regards Education, especially SDG4, (Agenda for Sustainable Development 2030) as a priority for India, and it draws on the country's rich cultural traditions and value systems. In addition, the NEP 2020 places an emphasis on paring down the amount of material covered in the curriculum in order to free up more time for critical thinking and, as a result, cultivate individuals who have 21st-century abilities ingrained in them. As a result, the entire educational programme as well as the teaching methodology need to be revised in order to achieve these objectives. Adapting the curriculum so that it fits within the parameters of the National Curriculum Framework is one of the obstacles that must be overcome in order to properly execute these changes. Additionally, educators are required to reevaluate the learning content rubric and make appropriate adjustments to the textbooks..

Antecedents And Consequences Of Employee’s Intention To Quit The Job

Prof. Rajashree K.Gethe, Prof. Shomee Sharma, Prof. Nikita Bachhawat, Dr. Rajalakshmi M

CrossRef DOI URL : https://doi.org/10.31426/ijesti.2022.2.12.2954


The research paper aim is to portray factors which makes employee’s intention to quit the job when they are doing well. The research also wants to predict some factors influencing Employee’s turnover in any organizations and how its impacting on employees mental and emotional health. This study is both quantitative and qualitative in nature utilizing some national and international level research reports like Retention report 2019 by work institute etc..

The Interplay Between Artificial Intelligence And Intellectual Property Law

Akriti Singh, Dr. Santosh Kumar Tiwari

CrossRef DOI URL : https://doi.org/10.31426/ijesti.2022.2.12.2955


Artificial intelligence in the modern world has attained universal acknowledgement and sudden progression in today’s advance world. As more advanced technologies are integrated into the same, it won't be long until these systems begin to create amazing ideas on their own, completely independent of human input. This raises important issues with regard to intellectual property rights (IPR) since it casts doubt on conventional understandings of ideas like patents and copyrights and raises issues with regard to how these inventions should be regulated among other things. Considering that AI is not new, after its evolution and development with due course of time the capabilities of AI have developed to the point where they can now support inventors and artists in almost every field. This paper seeks to delve into the expanding scope of IPR laws and its application regarding artificial intelligence, along with the unavoidable and unforeseen challenges. It also attempts to provide some discourse with respect to IPR, and seeks to address issues concerned with liability for the content created by such technologies and machine learning. .

Employee Motivation Theories and Practical Applications

Dr. Dharmesh Srivastava, Dr. Ranjana Srivastav

CrossRef DOI URL : https://doi.org/10.31426/ijesti.2022.2.12.2956


Employee motivation is critical for organizational success, impacting performance, satisfaction, and productivity. This paper explores various motivation theories, including Maslow's Hierarchy of Needs, Herzberg's Two-Factor Theory, and Self-Determination Theory, examining their practical applications across different industries. The paper also addresses challenges and criticisms, highlighting the importance of adapting strategies to specific contexts. Emerging perspectives, such as the Motivation Beliefs Inventory and the integration of personality dynamics, offer innovative approaches to understanding motivation. By leveraging these theories, organizations can tailor strategies to enhance employee engagement, satisfaction, and performance, ultimately contributing to long-term success..

Cyber Security and The Role of Cyber Insurance in Financial Institutions

Alok Gupta

CrossRef DOI URL : https://doi.org/10.31426/ijesti.2022.2.12.2957


Financial services, which play an essential role in the economy, are fast to embrace new technology that will benefit their customers and help them run their businesses more smoothly. The safety of their customers' private data and the honesty of their financial dealings are therefore essential concerns for banks. The widespread usage of these cutting-edge technology has, however, led to a significant increase in the number of cyber security vulnerabilities. To mitigate the impact of internet-related hazards, banks may decide to get cyber insurance, which covers both persons and companies. The main objective of this study is to investigate the current and potential cyber hazards to India's banking system, as well as the function of cyber insurance in reducing these risks. The essay goes even farther by analyzing the various cyber insurance policies provided by Indian businesses. .

Inspection of DDoS Attack in Network Through ML: A Comprehensive Analysis

Mamidi Sai Akash

CrossRef DOI URL : https://doi.org/10.31426/ijesti.2022.2.12.2958


DDoS attacks and the rise of more sophisticated forms of them are constantly evolving threats to network security, yet the emergence of increasingly sophisticated cyber threats and complex attack vectors has marked the age of DDoS attacks as a key player in the threats impacting availability, integrity and economy. MATLAB provides automated technique that enables detection of DDoS attacks in the network environment using machine learning (ML) based technique which we are going to explore in this paper. This involved an extensive approach in which the node configurations used to replicate different scales of DDoS attacks (10, 20, 30, and 40 nodes) in simulating the network traffic. To do so, Distributed Traffic Generators and Botnet Simulators were used for legitimate traffic and malicious traffic. Relevant application features including packet arrival time, packet size, flow duration, protocol type, etc. have been extracted and then pre-processed, including but not limited to normalization, feature selection with Correlation Analysis and Principal Component Analysis (PCA). Data split in the ratio of 80:20 and six machine learning (ML) algorithms, namely Support Vector Machine (SVM), Random Forest (RF), K-Nearest Neighbours (KNN), Neural Networks (NN), Logistic Regression (LR) and Decision Trees (DT) were trained and evaluated, using accuracy, precision, recall, F1-score and Area Under the ROC Curve (AUC-ROC) score as metrics. Our decision tree model produced an accuracy of 99.9%, with a 0.1% false positive rate, outperforming the other algorithms. This study shows how effective the supervised ML models can be in accurately capturing DDoS attacks and how they can be used in the advances of intelligent analysis of network traffic in real-time to address the potential danger that can take an outage of a network..

Call For Papers

May

2025

Call For Papers
May 2025
May

31

Publication:
31-May-2025