Empowering Marginalised Communities With Cloud Based Legal Platforms DOI

Gargi Sharma,

Bharti Joshi

IGI Global eBooks, Journal Year: 2025, Volume and Issue: unknown, P. 163 - 184

Published: April 4, 2025

Cloud-based legal platforms can transform aid for marginalized communities, according to this chapter. Geography, cost, and social stigma prevent many people from seeking aid. Underserved populations are disproportionately affected by justice gap, which makes it difficult them navigate complex systems assert their rights. Legal service providers overcome these barriers with cloud technology, making services more accessible affordable. Virtual consultations, document submission, case management allow users interact lawyers anywhere, anytime. Marginalised where location or cost traditional services, need flexibility.

Language: Английский

Digital Currency Adoption: A Comparative Analysis of Global Trends and the Nigerian eNaira Digital Currency DOI
Marzuk Abdullahi,

Abubakar Ahmad,

Binay Kumar Pandey

et al.

SN Computer Science, Journal Year: 2024, Volume and Issue: 5(5)

Published: May 29, 2024

Language: Английский

Citations

80

Pattern Analysis for Feature Extraction in Complex Images DOI
Balakumar Muniandi, Vinay Kumar Nassa, Digvijay Pandey

et al.

Advances in psychology, mental health, and behavioral studies (APMHBS) book series, Journal Year: 2024, Volume and Issue: unknown, P. 145 - 167

Published: Feb. 26, 2024

A concept that has been shown to be valuable in one circumstance and is likely useful others known as a pattern. pattern can interpreted variety of ways, each interpretation its own particularizations are suited the particular form it represents. The term “pattern” used describe anything, like group items function tandem with another. analysis these patterns important order improve recognition. Finding data primary emphasis field analysis, which subfield artificial intelligence computer science employs usage algorithms. In context stream, refers any underlying correlations, regularities, or structures. If finds significant already stored, system may able anticipate generating predictions based on fresh information arriving from source analogous currently using.

Language: Английский

Citations

75

An Industry-Focused Traffic System Utilising Internet of Things DOI
Binay Kumar Pandey, Vinay Kumar Nassa, Mukundan Appadurai Paramashivan

et al.

Advances in civil and industrial engineering book series, Journal Year: 2024, Volume and Issue: unknown, P. 200 - 213

Published: May 6, 2024

Radio frequency identification technology (RFID) and time series forecasts are used to create a dependable IoT-based traffic system. The system regulates city traffic. suggested method estimates junction volume over using LSTM neural networks. RFID improves data collection accuracy reliability. Data preparation includes outlier remove anomalies. Training the model on preprocessed reveals trends. trained predicts historical data. Prediction performance is quantified by MAE, MAPE, R2. proposed approach tested four intersection Results indicate that LSTM-based estimation works. optimal design determined evaluating for 12-to-168-time steps. experimental findings suggest can accurately anticipate volume, helping managers enhance flow. projections bolster

Language: Английский

Citations

72

Enhancing Sensing and Imaging Capabilities Through Surface Plasmon Resonance for Deepfake Image Detection DOI

R Maheshwari,

B. Paulchamy,

Binay Kumar Pandey

et al.

Plasmonics, Journal Year: 2024, Volume and Issue: unknown

Published: Sept. 6, 2024

Language: Английский

Citations

60

Advanced Digital Data Processing Using Cloud Cryptography DOI
Digvijay Pandey, Binay Kumar Pandey, Mukundan Appadurai Paramashivan

et al.

Advances in civil and industrial engineering book series, Journal Year: 2024, Volume and Issue: unknown, P. 255 - 268

Published: May 6, 2024

Cloud computing uses the internet instead of discs or memory. Computing services include servers, databases, networks, and programmes. The primary benefit cloud is easy cheap data backup access from anywhere. storage doesn't store consumer data, raising safety concerns. users may not know how transported. user unaware a third party secretly accessing their data. For safety, we offer numerous encryption algorithms. This book chapter covered cryptography computing.

Language: Английский

Citations

56

A Recent Survey on 6G Vehicular Technology DOI
Binay Kumar Pandey, Mukundan Appadurai Paramashivan, Digvijay Pandey

et al.

Advances in information security, privacy, and ethics book series, Journal Year: 2024, Volume and Issue: unknown, P. 337 - 350

Published: June 28, 2024

Most cars of the future might be intelligent and self-driving. 6G will main technology used in automobiles. An overview 6G-enabling technologies is presented this current study their application. The primary role that play automotive to accomplish this. Furthermore, a new called wireless connection on rise has potential completely transform technology. It anticipated more items connected via Therefore, it must outperform contemporary, cutting-edge communication like 5G terms performance. Heterogeneous object connectivity, ultra-low latency, high throughput, low power consumption, data reliability are characteristics Additionally, use artificial intelligence facilitate secure communication.

Language: Английский

Citations

42

Blockchain's Potential Effect on the Healthcare Industry DOI
Binay Kumar Pandey, Mukundan Appadurai Paramashivan, Vinay Kumar Nassa

et al.

Advances in civil and industrial engineering book series, Journal Year: 2024, Volume and Issue: unknown, P. 214 - 232

Published: May 6, 2024

Block chain secures data. Blockchain imitates computerised trading markets. The 2008 cryptocurrency and transaction network Bitcoin leads blockchain technology. When buyers or sellers declare payments, transfers bitcoin. can change finance like the Internet. technology may affect medicine. This fast-growing issue affects many healthcare providers. Open, irreversible, stable, collaborative are preferred by over regulated, hidden, proprietary, changeable ones. is used in medical records, security, database management, biotechnology regulation. helps biopharmaceuticals track illicit medications. It monitors medicines counterfeiters. book chapter presents a comprehensive block for health sector decision makers explores difficulties constraints using suitable markup. Here current potential applications.

Language: Английский

Citations

29

Future Directions of Digital Twin Architectures for 6G Communication Networks DOI
Binay Kumar Pandey, Mukundan Appadurai Paramashivan, Digvijay Pandey

et al.

Advances in wireless technologies and telecommunication book series, Journal Year: 2024, Volume and Issue: unknown, P. 197 - 211

Published: June 28, 2024

Initiating the study into digital twin technology, planning and implementation of 6G network necessitates real-time interaction alignment between physical systems their virtual representation. From simple parts to intricate systems, twin's flexibility agility improve design operational procedure efficiency in a predictable manner. It can validate policies, give representation entity, or evaluate how system entity behaves setting. evaluates effectiveness suitability QoS regulations communication, addition creation management novel services. Physical maintenance costs security threats also be reduced, but doing so requires standardization efforts that open door previously unheard-of difficulties with fault tolerance, efficiency, accuracy, security. The fundamental needs are focused on communication covered this chapter. These include decoupling, scalable intelligent analytics, data using blockchain.

Language: Английский

Citations

29

Utilizing the Internet of Everything and Artificial Intelligence for Real-Time Workforce Management DOI
Manish Kumar,

Potharaboina Prasanna,

M K Lalitha

et al.

Advances in computational intelligence and robotics book series, Journal Year: 2024, Volume and Issue: unknown, P. 153 - 168

Published: Dec. 13, 2024

The real-time pool operation through the combination of Internet Everything (IoE) and Artificial Intelligence (AI). purpose this study is to evaluate how technologies, which connect people, processes, data, effects, may best optimize effectiveness production when paired with predictive logical skills artificial intelligence utilization IoE detectors bias allows for continuous collection analysis provides insight into hand performance, workload allocation, functional backups. systems also take advantage data provide decision assistance, enables dynamic work allocation envisions solutions problems. Among significant advantages that are brought light by investigation improved resource application, increased translucency, enhanced engagement. practical operations problems associated integrated approach demonstrated case studies coming from diligence.

Language: Английский

Citations

25

Circular Economy: A Catalyst for Economic Growth - An Empirical Study DOI

K. V. N. Lakshmi,

S. Geetanjali,

H. R. Swapna

et al.

Circular Economy and Sustainability, Journal Year: 2024, Volume and Issue: unknown

Published: Oct. 10, 2024

Language: Английский

Citations

23