ISSN: 2582 - 9734

Past Issue

Evaluating Euclidean and Cryptographic Techniques for Image Encryption: Chaos Theory and Comparative Analysis

Salunke Nilesh Tatyasaheb , Dr. Vinod Kumar

CrossRef DOI URL : https://doi.org/10.31426/ijesti.2024.4.7.4511


This research investigates the application of the Euclidean algorithm and various cryptographic techniques to image recognition, focusing on chaos-based and non-chaos-based block ciphers, and categorizing them by compression methods. Traditional encryption methods like AES and RSA struggle with image encryption due to pixel correlation and data volume. Chaos theory, with its sensitivity to initial conditions and stochastic behaviour, offers a promising alternative. The study employs both qualitative and quantitative analyses, using primary and secondary data to evaluate security metrics. Practical limitations such as resource constraints and access to proprietary algorithms are acknowledged. The findings enhance the understanding of real-time image encryption, showcasing the robustness and reliability of computational techniques, and providing a comparative analysis of different methods. This research contributes to advancing image encryption technology by integrating traditional and innovative cryptographic approaches, highlighting potential for improved security in practical applications..

Regulatory Action on Data Protection in India: A Present Scenario

Kushagra Sah, Dr. Shashank Shekhar Singh

CrossRef DOI URL : https://doi.org/10.31426/ijesti.2024.4.7.4512


Despite the fact that privateness is a simple human right recognized anywhere in the world, it is the maximum deliberately violated by the person in our on-line world. Humans revel in having their very own private space and need to hold the space. Systematic use of private facts structures inside the research or tracking of the actions or communications of one or greater people is known as statistics vigilance..

Protective Legislation against Cyber Stalking in India

Janhavi Prakash Tiwari, Dr. Shashank Shekhar Singh

CrossRef DOI URL : https://doi.org/10.31426/ijesti.2024.4.7.4513


In terms of technological increase, the world is unexpectedly advancing in a very first-rate course universally. But some horrible elements are also added to mild. One of the elements is the rapid improvement of virtual and community generation which has aided inside the formation of a digital cyberspace worldwide. Has ushered in a modern generation of development in every factor of lifestyles and business enterprise, however it has additionally ushered in a new kind of crime called cybercrime. To begin with, the net became designed as a tool for take a look at and statistics sharing, however it's far nowadays utilized by each the intention and the offender to perpetrate cybercrime. Communique, e-commerce, and e- governance, as an instance, were given extra transactional as time stepped forward. Cyber legal guidelines cowl the crook additives of net crime. because the wide form of cybercrime incidents including unauthorized get entry to and hacking, Trojan assaults, virus and worm attacks, denial of company attacks, and special kinds of cybercrime upward thrust, so does the demand for corresponding prison recommendations and their enforcement..

An Examination of The Extent of Financial Empowerment and Its Impact on Society Among Individuals Who Are Socially and Economically Isolated

Janhvee Mishra,Dr Shantanu Srivastava

CrossRef DOI URL : https://doi.org/10.31426/ijesti.2024.4.7.4514


Although financial empowerment is a crucial strategy for reducing poverty and promoting prosperity, little research has been done on how it affects groups that are economically marginalized. The scope of financial empowerment initiatives and their social ramifications for populations that are economically disadvantaged are examined in this study. A mixed-methods approach was used to gather data from surveys, interviews, and case studies conducted in a number of emerging locations with high levels of economic disparity. The degree to which these groups utilize financial services such digital payment systems, insurance, microfinance, and banking is described in the paper. Important findings show a strong correlation between improved socioeconomic outcomes—such as higher rates of entrepreneurship, household stability, and educational opportunities—and increased access to financial services. Significantly, the study identifies key barriers to financial empowerment, including a lack of financial literacy..

Advancing Photovoltaic Systems through Enhanced MPPT Algorithms

Lalit Kumar, Dr. Sanjay Kumar Jagannath Bagul

CrossRef DOI URL : https://doi.org/10.31426/ijesti.2024.4.7.4515


The study focuses on optimizing photovoltaic (P-V) systems by enhancing the Maximum Power Point Tracking (MPPT) algorithms, particularly the Perturb and Observe (PNO) method. Challenges like slow convergence, oscillations, and inefficiencies under fluctuating environmental conditions are addressed through the introduction of the Optimum Gained Power Threshold (OGPT) concept. The OGPT dynamically adjusts perturbation steps based on real-time environmental changes, improving stability, convergence speed, and efficiency. Simulation and experimental validation demonstrated significant enhancements, with the OGPT-based PNO algorithm outperforming traditional methods such as Genetic Algorithms (GA) and Incremental Conductance (INC). Periodical efficiency estimation revealed consistent energy output improvements across seasonal and daily cycles, confirming the algorithm's practical viability for residential and large-scale applications. This paper reducing power losses and ensuring stable operation, this advancement contributes to more efficient and cost-effective solar energy systems, supporting the global transition to renewable energy. Future research may explore extreme weather adaptability, AI integration, and dynamic P-V system applications for further optimization..

Call For Papers

May

2025

Call For Papers
May 2025
May

31

Publication:
31-May-2025