Current Issue(Vol-4/Issue-3)

  • home
  • Current Issue(Vol-4/Issue-3)

VOLUME-4 ISSUE-III October-December,2025
Download Current Issue



S.No.

Title of Paper

Name of Author(s)

Page No.

#

1.

AI-Driven Software Testing: A Machine Learning Approach for Automated Bug Detection
DOI: https://doi.org/10.5281/zenodo.18091635

Brijesh Parmar, Yogesh T. Patil, Mahendra Kumar Kishor Bhai Chauhan

1-12

Download 

2.

Biometric Security System
DOI: https://doi.org/10.5281/zenodo.18137224

Pallavi Soni, Nitesh Kanojiya, Harsh Bariya

13-20

Download 

3.

A Blockchain-Integrated Cryptographic Protocol for Secure IoT Data Exchange
DOI: https://doi.org/10.5281/zenodo.18137771

Nitesh Kanojiya, Yogesh T. Patil , Jaimin Chavda

21-36

Download 

4.

Cloud-Based Energy Optimization and Automation in Smart Homes Using IoT
https://doi.org/10.5281/zenodo.18137840

Pallavi Soni, Yogesh T. Patil, Aman Pratap Singh

37-52

Download 

5.

Cyber Security Protection
DOI: https://doi.org/10.5281/zenodo.18137981

KM Bittu Pandey, Yogesh Tarachand Patil , Pallavi Soni

53-67

Download 

6.

Digital Forensics Framework for Investigating Cloud-Based Cyber Crimes
DOI: https://doi.org/10.5281/zenodo.18138084

Yogesh T. Patil, Pallavi Soni

68-85

Download 

7.

The Fundamental Role of the Artificial Intelligence in the IT Industry
DOI: https://doi.org/10.5281/zenodo.18138236

KM Bittu Pandey, Pallavi Soni, Yogesh T. Patil

86-107

Download 

8.

Human Computer Interaction
DOI: https://doi.org/10.5281/zenodo.18138317

KM Bittu Pandey, Yogesh Tarachand Patil , Pallavi Soni

108-121

Download 

9.

Integration of IoT with 6G Networks: Challenges and Future Directions
DOI: https://doi.org/10.5281/zenodo.18195304

Pallavi Soni, Harsh Bariya, Brijesh Parmar

122-139

Download 

10.

Securing Optical Wireless Communication: A Cryptographic Approach for Li-Fi Networks
DOI: https://doi.org/10.5281/zenodo.18195343

Yogesh T. Patil, Pallavi Soni

140-151

Download 

11.

Context-Aware Large Language Models for Multilingual Understanding
DOI: https://doi.org/10.5281/zenodo.18195814

Harsh Rajwani, Tushar Chouhan, Badresh Katara

152-161

Download 

12.

Fraud Detection in Financial Transactions Using Anomaly Detection Techniques: A Cybersecurity Perspective
DOI: https://doi.org/10.5281/zenodo.18195874

Yogesh T. Patil, KM Bittu Pandey, Pallavi Soni

162-168

Download 

13.

Lightweight Cryptography Algorithms for IoT and Embedded Systems
DOI: https://doi.org/10.5281/zenodo.18195935

Dharmi Pate1, Twinkle More, Trusha Maurya

169-178

Download 

13.

Machine Learning Techniques for Cryptographic Attack Detection
DOI: https://doi.org/10.5281/zenodo.18196040

KM Bittu Pandey

179-187

Download 

13.

Test-Driven Development (TDD): Benefits, Challenges, and Best Practices
DOI: https://doi.org/10.5281/zenodo.18196136

Badresh Katara, Harsh Rajwani, Divyansh Sharma

179-187

Download