<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://ijietas.com/lib/pkp/xml/oai2.xsl" ?>
<OAI-PMH xmlns="http://www.openarchives.org/OAI/2.0/"
	xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
	xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/
		http://www.openarchives.org/OAI/2.0/OAI-PMH.xsd">
	<responseDate>2026-04-23T13:25:12Z</responseDate>
	<request metadataPrefix="oai_dc" verb="ListRecords">https://ijietas.com/index.php/files/oai</request>
	<ListRecords>
		<record>
			<header>
				<identifier>oai:ojs.ijietas.com:article/3</identifier>
				<datestamp>2025-10-30T08:13:52Z</datestamp>
				<setSpec>files:ART</setSpec>
			</header>
			<metadata>
<oai_dc:dc
	xmlns:oai_dc="http://www.openarchives.org/OAI/2.0/oai_dc/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
	xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/oai_dc/
	http://www.openarchives.org/OAI/2.0/oai_dc.xsd">
	<dc:title xml:lang="en">A Modular Broking Architecture for Optimized Cloud Service Deployment and Scheduling</dc:title>
	<dc:creator xml:lang="en">Harshit Kesharwani</dc:creator>
	<dc:creator xml:lang="en">Aakash Nakarmi</dc:creator>
	<dc:creator xml:lang="en">Tamoshree Mallick</dc:creator>
	<dc:subject xml:lang="en">Cloud, optimization algorithm, load balancing, scheduling strategies, service workload</dc:subject>
	<dc:description xml:lang="en">In today’s world, most companies are shifting their servers from onpremises to cloud infrastructure to deliver the most efficient service to their customers. To serve this, many cloud service providers provide different services of virtual machines, storage, networking, load balancing, and all the facilities a company will require to run its business. For the best implementation of cloud services, these companies utilize different scheduling strategies for a particular service. The competition is not just providing the service but it is providing the quickest and most efficient service. Many companies fail to automatically manage all components involved during the deployment of architecture in the cloud. This paper proposes a modular architecture that can be used for the optimal deployment of services provided in the cloud. Along with that, this architecture will be compatible with scheduling strategies as well so that different optimization criteria like cost, performance, storage, load balancing criteria, and so on. There was also an analysis of the architecture by performing the deployment of a website under various conditions like optimization criteria and maximum user requests</dc:description>
	<dc:publisher xml:lang="en">Dr. Anil Kumar Sagar</dc:publisher>
	<dc:date>2025-02-18</dc:date>
	<dc:type>info:eu-repo/semantics/article</dc:type>
	<dc:type>info:eu-repo/semantics/publishedVersion</dc:type>
	<dc:type xml:lang="en">Peer-reviewed Article</dc:type>
	<dc:format>application/pdf</dc:format>
	<dc:identifier>https://ijietas.com/index.php/files/article/view/3</dc:identifier>
	<dc:identifier>10.64764/8nq7q287</dc:identifier>
	<dc:source xml:lang="en">International Journal of Innovations in Engineering Technology and Applied Sciences; IJIETAS: Vol 1, Issue 1,  January –June 2025; 1-12</dc:source>
	<dc:source>3107-4081</dc:source>
	<dc:language>eng</dc:language>
	<dc:relation>https://ijietas.com/index.php/files/article/view/3/1</dc:relation>
	<dc:rights xml:lang="en">https://creativecommons.org/licenses/by-nc/4.0</dc:rights>
</oai_dc:dc>
			</metadata>
		</record>
		<record>
			<header>
				<identifier>oai:ojs.ijietas.com:article/4</identifier>
				<datestamp>2025-10-30T08:15:56Z</datestamp>
				<setSpec>files:ART</setSpec>
			</header>
			<metadata>
<oai_dc:dc
	xmlns:oai_dc="http://www.openarchives.org/OAI/2.0/oai_dc/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
	xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/oai_dc/
	http://www.openarchives.org/OAI/2.0/oai_dc.xsd">
	<dc:title xml:lang="en">Real-Time Pose Estimation Using Mediapipe for Gesture and Sentiment Analysis</dc:title>
	<dc:creator xml:lang="en">Ishant Yadav</dc:creator>
	<dc:subject xml:lang="en">Body estimation, landmarks, Mediapipe, deep learning, computer vision, accuracy, pre-processing, facial expression</dc:subject>
	<dc:description xml:lang="en">Signs and Visual Learnings are considered as the easiest ways to learn and interact with your surroundings and people. These interpretations are performed by the changes in direction of hand landmarks, face landmarks, and body landmarks. Technological advancement in the field of computer vision, the possibility to predict these tasks will progress through the combination of image processing, deep learning, and machine learning techniques. In this research, we will learn how to leverage Mediapipe to estimate both facial and body landmarks. With the data we will then be able to build custom pose classification models that allow you to decode what a person might be saying with their body language with fine grain accuracy. While learning about the project, we can also customize the suits based on the needs. These estimations are low -dimensional based on skeleton poses. To predict the whole notion and description of the body and face in real time, we make a model using the real-time pipeline. We will then evaluate the routine of our project on a dataset preprocessed by us and show it achieve high accuracy in decoding body language</dc:description>
	<dc:publisher xml:lang="en">Dr. Anil Kumar Sagar</dc:publisher>
	<dc:date>2025-02-18</dc:date>
	<dc:type>info:eu-repo/semantics/article</dc:type>
	<dc:type>info:eu-repo/semantics/publishedVersion</dc:type>
	<dc:type xml:lang="en">Peer-reviewed Article</dc:type>
	<dc:format>application/pdf</dc:format>
	<dc:identifier>https://ijietas.com/index.php/files/article/view/4</dc:identifier>
	<dc:identifier>10.64764/50pky596</dc:identifier>
	<dc:source xml:lang="en">International Journal of Innovations in Engineering Technology and Applied Sciences; IJIETAS: Vol 1, Issue 1,  January –June 2025; 13-19</dc:source>
	<dc:source>3107-4081</dc:source>
	<dc:language>eng</dc:language>
	<dc:relation>https://ijietas.com/index.php/files/article/view/4/2</dc:relation>
	<dc:rights xml:lang="en">https://creativecommons.org/licenses/by-nc/4.0</dc:rights>
</oai_dc:dc>
			</metadata>
		</record>
		<record>
			<header>
				<identifier>oai:ojs.ijietas.com:article/6</identifier>
				<datestamp>2025-10-30T08:21:36Z</datestamp>
				<setSpec>files:ART</setSpec>
			</header>
			<metadata>
<oai_dc:dc
	xmlns:oai_dc="http://www.openarchives.org/OAI/2.0/oai_dc/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
	xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/oai_dc/
	http://www.openarchives.org/OAI/2.0/oai_dc.xsd">
	<dc:title xml:lang="en">Intruder Detection System Using Deep Learning</dc:title>
	<dc:creator xml:lang="en">Nikhil Rajput</dc:creator>
	<dc:creator xml:lang="en">Shubham kumar</dc:creator>
	<dc:creator xml:lang="en">Tejaswi Pratap</dc:creator>
	<dc:subject xml:lang="en">CNN, CosMos, SMTP, SVM.</dc:subject>
	<dc:description xml:lang="en">A higher standard of living is primarily dependent on the safety of people and their possessions. Much progress has been made in the areas of making homes automatic and more secured. The home environment has seen increased remote monitoring, home security, and appliance control because to technological advancements and the (IoT). In order to track activity inside the user&#039;s house and offer a report, a number of home automation systems have been developed. Modern home automation systems include cameras and motion detectors for home security. However, one of the biggest challenges still lies in the logical component of avoiding bogus or superfluous messages. Smart home automation is effective because of intelligent monitoring and response.Utilizing a deep learning model, a technique is developed to enhance the smart home automation system intruder detection and reduce the likelihood of false alarm. Based on his walk, a person seen on video is either categorized as an intruder or a resident of the home. A PIR motion sensor, an ESP8266 development board, a 5 V four-channel relay module, an ESP32 security camera, and the recommended method&#039;s prototype were all used in the construction of the system. A CNN model experiment using human motion patterns was carried out to assess the classification for the identification of people.</dc:description>
	<dc:publisher xml:lang="en">Dr. Anil Kumar Sagar</dc:publisher>
	<dc:date>2025-02-18</dc:date>
	<dc:type>info:eu-repo/semantics/article</dc:type>
	<dc:type>info:eu-repo/semantics/publishedVersion</dc:type>
	<dc:type xml:lang="en">Peer-reviewed Article</dc:type>
	<dc:format>application/pdf</dc:format>
	<dc:identifier>https://ijietas.com/index.php/files/article/view/6</dc:identifier>
	<dc:identifier>10.64764/kt15ap96</dc:identifier>
	<dc:source xml:lang="en">International Journal of Innovations in Engineering Technology and Applied Sciences; IJIETAS: Vol 1, Issue 1,  January –June 2025; 20-32</dc:source>
	<dc:source>3107-4081</dc:source>
	<dc:language>eng</dc:language>
	<dc:relation>https://ijietas.com/index.php/files/article/view/6/3</dc:relation>
	<dc:rights xml:lang="en">https://creativecommons.org/licenses/by-nc/4.0</dc:rights>
</oai_dc:dc>
			</metadata>
		</record>
		<record>
			<header>
				<identifier>oai:ojs.ijietas.com:article/8</identifier>
				<datestamp>2025-10-30T08:22:07Z</datestamp>
				<setSpec>files:ART</setSpec>
			</header>
			<metadata>
<oai_dc:dc
	xmlns:oai_dc="http://www.openarchives.org/OAI/2.0/oai_dc/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
	xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/oai_dc/
	http://www.openarchives.org/OAI/2.0/oai_dc.xsd">
	<dc:title xml:lang="en">Encoding and Decoding Hidden Messages in Images Using Steganography</dc:title>
	<dc:creator xml:lang="en">Sushmita</dc:creator>
	<dc:creator xml:lang="en">Mir Rimsha</dc:creator>
	<dc:creator xml:lang="en">Ali Murtaza Zaidi</dc:creator>
	<dc:subject xml:lang="en">Cryptography, Steganography, Cipher, Hidden Image, Visual Cryptography, Encryption, Decryption, Asymmetric key, Symmetric key</dc:subject>
	<dc:description xml:lang="en">Visual Cryptography is a technique to share secret code in the form of images. Steganography is usedto encrypt these images into hidden codes which in earlier times is used as a mode of communication in the time of war. These hidden codes have their way of decryption, sharing images multiple times can decrypt these images. The encryption in these images is done in pixels so that it won’t be visible to the naked eye. The small changes in these images can be only visible by superimposing. After superimposing we can not recoverthe original image because of contrast and expansion in pixels of the image. The visual form of steganography is the safest form that is present nowadays. In this paper, we will know how we can encrypt this image in hidden form using cipher text and steganography and prevent itfrom being disposed of by the naked eye</dc:description>
	<dc:publisher xml:lang="en">Dr. Anil Kumar Sagar</dc:publisher>
	<dc:date>2025-02-18</dc:date>
	<dc:type>info:eu-repo/semantics/article</dc:type>
	<dc:type>info:eu-repo/semantics/publishedVersion</dc:type>
	<dc:type xml:lang="en">Peer-reviewed Article</dc:type>
	<dc:format>application/pdf</dc:format>
	<dc:identifier>https://ijietas.com/index.php/files/article/view/8</dc:identifier>
	<dc:identifier>10.64764/dfszfx42</dc:identifier>
	<dc:source xml:lang="en">International Journal of Innovations in Engineering Technology and Applied Sciences; IJIETAS: Vol 1, Issue 1,  January –June 2025; 33-40</dc:source>
	<dc:source>3107-4081</dc:source>
	<dc:language>eng</dc:language>
	<dc:relation>https://ijietas.com/index.php/files/article/view/8/4</dc:relation>
	<dc:rights xml:lang="en">https://creativecommons.org/licenses/by-nc/4.0</dc:rights>
</oai_dc:dc>
			</metadata>
		</record>
		<record>
			<header>
				<identifier>oai:ojs.ijietas.com:article/9</identifier>
				<datestamp>2025-10-30T08:26:43Z</datestamp>
				<setSpec>files:ART</setSpec>
			</header>
			<metadata>
<oai_dc:dc
	xmlns:oai_dc="http://www.openarchives.org/OAI/2.0/oai_dc/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
	xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/oai_dc/
	http://www.openarchives.org/OAI/2.0/oai_dc.xsd">
	<dc:title xml:lang="en">Voice Recognition Security for Android </dc:title>
	<dc:creator xml:lang="en">Tarcisius Forjong Dewingong</dc:creator>
	<dc:subject xml:lang="en">voice recognition, android security</dc:subject>
	<dc:description xml:lang="en">On this platform, speech recognition is achieved by converting the input voice signal into textual output, which is then transmitted via Bluetooth to an embedded system containing an arduino atmega328 microcontroller as a means of serial communication between an android application and a control system. Android is a mobile software stack that consists of an operating system, middleware, and critical apps. The Android platform provides the tools and APIs required to begin building applications using programming language, which leads to today&#039;s digitalized world where voice recognition is a rapidly growing area. The use of voice recognition technology on an Android platform lends a nice touch to this project. Android is a much-anticipated opensource mobile operating system that serves as a foundation for other operating systems. Android features entail a distinct security model that provides the user&#039;s control over the device. The open nature of the platform allows for proprietary additions and updates, thus Android devices don&#039;t all originate from the same location. We should be familiar with Android&#039;s core architecture and important abstractions, such as Intents, Activities, Broadcast Receivers, Services, Content Providers, and Binder, before starting this article. The received text string on an arduino may be compared to a predetermined voice command that was previously supplied using embedded c programming. The required process is completed by setting the corresponding pin of an arduino to high if they match in c programming. In the disciplines of industrial automation, home automation, and digitalized robotics, this concept is immensely valuable. where an electrical system is triggered by voice command via Android application as depicted in this article.</dc:description>
	<dc:publisher xml:lang="en">Dr. Anil Kumar Sagar</dc:publisher>
	<dc:date>2025-02-18</dc:date>
	<dc:type>info:eu-repo/semantics/article</dc:type>
	<dc:type>info:eu-repo/semantics/publishedVersion</dc:type>
	<dc:type xml:lang="en">Peer-reviewed Article</dc:type>
	<dc:format>application/pdf</dc:format>
	<dc:identifier>https://ijietas.com/index.php/files/article/view/9</dc:identifier>
	<dc:identifier>10.64764/6gn2rd59</dc:identifier>
	<dc:source xml:lang="en">International Journal of Innovations in Engineering Technology and Applied Sciences; IJIETAS: Vol 1, Issue 1,  January –June 2025; 41-47</dc:source>
	<dc:source>3107-4081</dc:source>
	<dc:language>eng</dc:language>
	<dc:relation>https://ijietas.com/index.php/files/article/view/9/6</dc:relation>
	<dc:rights xml:lang="en">https://creativecommons.org/licenses/by-nc/4.0</dc:rights>
</oai_dc:dc>
			</metadata>
		</record>
		<record>
			<header>
				<identifier>oai:ojs.ijietas.com:article/14</identifier>
				<datestamp>2025-10-15T05:58:35Z</datestamp>
				<setSpec>files:ART</setSpec>
			</header>
			<metadata>
<oai_dc:dc
	xmlns:oai_dc="http://www.openarchives.org/OAI/2.0/oai_dc/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
	xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/oai_dc/
	http://www.openarchives.org/OAI/2.0/oai_dc.xsd">
	<dc:title xml:lang="en">Analyzing the impact of video content on women&#039;s empowerment and self-expression</dc:title>
	<dc:creator xml:lang="en">Vinay Kumar Singh</dc:creator>
	<dc:creator xml:lang="en">Veena Hada</dc:creator>
	<dc:subject xml:lang="en">Women Empowerment, Self-Expression, Video Content, Digital Media, Social Platforms, Gender Studies</dc:subject>
	<dc:description xml:lang="en">This paper examines the role of video content as a catalyst for women’s empowerment and self-expression in the digital age. With the rapid growth of social media platforms and video-sharing technologies, women increasingly utilize visual narratives to challenge stereotypes, articulate personal experiences, and engage in broader socio-cultural dialogues. The study explores how video content fosters self-confidence, amplifies marginalized voices, and provides women with opportunities for creative agency and digital entrepreneurship. It also highlights the dual impact of such platforms: while enabling empowerment through visibility and audience reach, women often encounter challenges related to online harassment, digital inequality, and the reinforcement of gendered expectations. By analyzing case studies, content trends, and participatory practices, the paper underscores the transformative potential of video as both a tool for advocacy and a medium of personal expression. The findings suggest that video content can reshape power dynamics, promote gender inclusivity, and contribute significantly to women’s agency in both private and public spheres.</dc:description>
	<dc:publisher xml:lang="en">Dr. Anil Kumar Sagar</dc:publisher>
	<dc:date>2025-07-21</dc:date>
	<dc:type>info:eu-repo/semantics/article</dc:type>
	<dc:type>info:eu-repo/semantics/publishedVersion</dc:type>
	<dc:type xml:lang="en">Peer-reviewed Article</dc:type>
	<dc:format>application/pdf</dc:format>
	<dc:identifier>https://ijietas.com/index.php/files/article/view/14</dc:identifier>
	<dc:identifier>10.64764/bfz1jr91</dc:identifier>
	<dc:source xml:lang="en">International Journal of Innovations in Engineering Technology and Applied Sciences; IJIETAS: Vol 1, Issue 2, JULY- DECEMBER 2025; 1-7</dc:source>
	<dc:source>3107-4081</dc:source>
	<dc:language>eng</dc:language>
	<dc:relation>https://ijietas.com/index.php/files/article/view/14/7</dc:relation>
</oai_dc:dc>
			</metadata>
		</record>
		<record>
			<header>
				<identifier>oai:ojs.ijietas.com:article/15</identifier>
				<datestamp>2025-10-15T05:58:35Z</datestamp>
				<setSpec>files:ART</setSpec>
			</header>
			<metadata>
<oai_dc:dc
	xmlns:oai_dc="http://www.openarchives.org/OAI/2.0/oai_dc/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
	xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/oai_dc/
	http://www.openarchives.org/OAI/2.0/oai_dc.xsd">
	<dc:title xml:lang="en">Women’s Entrepreneurship and India’s Economic Development: A Decadal Overview</dc:title>
	<dc:creator xml:lang="en">Veena Hada</dc:creator>
	<dc:creator xml:lang="en">Vinay Kumar Singh</dc:creator>
	<dc:subject xml:lang="en">Women Empowerment, Women Entrepreneurship, Economic Development, India, Poverty Reduction, Policy, Technology, AI, Data Analytics.</dc:subject>
	<dc:description xml:lang="en">This paper offers a conceptual and empirical evaluation of girls&#039;s entrepreneurship and its effect on the monetary development of India over the last decade, drawing insights from the supplied resources. It defines women&#039;s empowerment and socio-financial improvement, examining their inherent courting. The take a look at identifies key demanding situations faced via girls entrepreneurs in India, consisting of societal discrimination, lack of sources, and confined mobility, alongside vital enablers like training, capabilities, and coverage aid. Furthermore, it explores the capacity position of technological improvements, in particular Artificial Intelligence (AI) and Data Analytics, in fostering girls&#039;s financial participation. Utilizing available facts, the paper ambitions to investigate the boom and demanding situations of girls&#039;s entrepreneurship and its contribution to poverty discount, in addition to compare the function of coverage and technology in accelerating this improvement. The findings underscore that while large strides have been made, sustained coverage dedication, structural reforms, and moral technological integration are essential for understanding the full capacity of ladies entrepreneurs in using India&#039;s inclusive and sustainable financial growth.</dc:description>
	<dc:publisher xml:lang="en">Dr. Anil Kumar Sagar</dc:publisher>
	<dc:date>2025-09-12</dc:date>
	<dc:type>info:eu-repo/semantics/article</dc:type>
	<dc:type>info:eu-repo/semantics/publishedVersion</dc:type>
	<dc:type xml:lang="en">Peer-reviewed Article</dc:type>
	<dc:format>application/pdf</dc:format>
	<dc:identifier>https://ijietas.com/index.php/files/article/view/15</dc:identifier>
	<dc:identifier>10.64764/nw74ya32</dc:identifier>
	<dc:source xml:lang="en">International Journal of Innovations in Engineering Technology and Applied Sciences; IJIETAS: Vol 1, Issue 2, JULY- DECEMBER 2025; 8-15</dc:source>
	<dc:source>3107-4081</dc:source>
	<dc:language>eng</dc:language>
	<dc:relation>https://ijietas.com/index.php/files/article/view/15/8</dc:relation>
</oai_dc:dc>
			</metadata>
		</record>
		<record>
			<header>
				<identifier>oai:ojs.ijietas.com:article/16</identifier>
				<datestamp>2025-10-15T08:45:11Z</datestamp>
				<setSpec>files:ART</setSpec>
			</header>
			<metadata>
<oai_dc:dc
	xmlns:oai_dc="http://www.openarchives.org/OAI/2.0/oai_dc/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
	xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/oai_dc/
	http://www.openarchives.org/OAI/2.0/oai_dc.xsd">
	<dc:title xml:lang="en">Expanding Digital Connectivity: The Role of Emerging Technologies in Social Media Spread</dc:title>
	<dc:creator xml:lang="en">Veena Hada</dc:creator>
	<dc:creator xml:lang="en">Shalini Bahuguna</dc:creator>
	<dc:subject xml:lang="en">Emerging Technologies, Social Media Penetration, Artificial Intelligence, 5G Connectivity, Big Data Analytics, Cloud Computing, Mobile Technologies, Digital Inclusion, User Engagement, Digital Communication</dc:subject>
	<dc:description xml:lang="en">The rapid rise of social media has been heavily influenced by advances in emerging technologies. Artificial intelligence, 5G connectivity, big data analytics, and cloud computing have not only increased access, but also changed the way people connect, communicate, and engage online. These technologies enhance user experiences through faster networks, personalized recommendations, real-time interactions, and interactive features that keep audiences engaged. At the same time, mobile technologies and affordable digital infrastructure are helping bridge the digital divide, allowing communities that were once excluded to actively participate in the digital ecosystem. This paper examines how these technological enablers influence adoption patterns, making social media more inclusive and impactful. The findings highlight that emerging technologies serve as both catalysts and sustainers of social media growth, reshaping communication, culture, and commerce in today’s interconnected world.</dc:description>
	<dc:publisher xml:lang="en">Dr. Anil Kumar Sagar</dc:publisher>
	<dc:date>2025-09-12</dc:date>
	<dc:type>info:eu-repo/semantics/article</dc:type>
	<dc:type>info:eu-repo/semantics/publishedVersion</dc:type>
	<dc:type xml:lang="en">Peer-reviewed Article</dc:type>
	<dc:format>application/pdf</dc:format>
	<dc:identifier>https://ijietas.com/index.php/files/article/view/16</dc:identifier>
	<dc:identifier>10.64764/p88az384</dc:identifier>
	<dc:source xml:lang="en">International Journal of Innovations in Engineering Technology and Applied Sciences; IJIETAS: Vol 1, Issue 2, JULY- DECEMBER 2025; 16-21</dc:source>
	<dc:source>3107-4081</dc:source>
	<dc:language>eng</dc:language>
	<dc:relation>https://ijietas.com/index.php/files/article/view/16/9</dc:relation>
	<dc:rights xml:lang="en">https://creativecommons.org/licenses/by-nc/4.0</dc:rights>
</oai_dc:dc>
			</metadata>
		</record>
		<record>
			<header>
				<identifier>oai:ojs.ijietas.com:article/17</identifier>
				<datestamp>2025-10-15T05:58:35Z</datestamp>
				<setSpec>files:ART</setSpec>
			</header>
			<metadata>
<oai_dc:dc
	xmlns:oai_dc="http://www.openarchives.org/OAI/2.0/oai_dc/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
	xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/oai_dc/
	http://www.openarchives.org/OAI/2.0/oai_dc.xsd">
	<dc:title xml:lang="en">The Multifaceted Impact of Digital Disruption in the Contemporary Era</dc:title>
	<dc:creator xml:lang="en">Veena Hada</dc:creator>
	<dc:creator xml:lang="en">Shalini Bahuguna</dc:creator>
	<dc:subject xml:lang="en">Social Media, Business Organizations, Social Media Marketing, Customer Engagement, Brand Awareness, Innovation, Market Intelligence.</dc:subject>
	<dc:description xml:lang="en">The rapid rise of social media has completely transformed the way businesses operate. Platforms like Facebook, YouTube, Instagram, and Twitter have given organizations powerful tools to connect directly with customers, grow their markets, and build stronger brands. Unlike traditional marketing, these platforms break down geographical and time barriers, allowing businesses to reach global audiences instantly. Research shows that nearly 60% of consumers now discover brands through social media, with many checking online reviews before making a purchase. Beyond promotion, social media offers valuable insights—helping companies track competitors, gather feedback, and spark innovation. Blogs, forums, and online campaigns are now essential parts of marketing strategies, strengthening advertising, customer service, and public relations. Many organizations blend traditional and digital channels to maximize their reach and brand image. Often described as a “gold mine” for business growth, the success of social media adoption depends on leadership support, clear advantages, adaptability, and the ability to align with changing market demands.</dc:description>
	<dc:publisher xml:lang="en">Dr. Anil Kumar Sagar</dc:publisher>
	<dc:date>2025-09-12</dc:date>
	<dc:type>info:eu-repo/semantics/article</dc:type>
	<dc:type>info:eu-repo/semantics/publishedVersion</dc:type>
	<dc:type xml:lang="en">Peer-reviewed Article</dc:type>
	<dc:format>application/pdf</dc:format>
	<dc:identifier>https://ijietas.com/index.php/files/article/view/17</dc:identifier>
	<dc:identifier>10.64764/x8jn4h76</dc:identifier>
	<dc:source xml:lang="en">International Journal of Innovations in Engineering Technology and Applied Sciences; IJIETAS: Vol 1, Issue 2, JULY- DECEMBER 2025; 22-25</dc:source>
	<dc:source>3107-4081</dc:source>
	<dc:language>eng</dc:language>
	<dc:relation>https://ijietas.com/index.php/files/article/view/17/10</dc:relation>
</oai_dc:dc>
			</metadata>
		</record>
		<record>
			<header>
				<identifier>oai:ojs.ijietas.com:article/18</identifier>
				<datestamp>2025-10-15T08:47:35Z</datestamp>
				<setSpec>files:ART</setSpec>
			</header>
			<metadata>
<oai_dc:dc
	xmlns:oai_dc="http://www.openarchives.org/OAI/2.0/oai_dc/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
	xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/oai_dc/
	http://www.openarchives.org/OAI/2.0/oai_dc.xsd">
	<dc:title xml:lang="en">Enhancing Data Protection through an Advanced Biometric Security Framework</dc:title>
	<dc:creator xml:lang="en">Aman Kumar</dc:creator>
	<dc:creator xml:lang="en">Subrata Sahana</dc:creator>
	<dc:description xml:lang="en">Data privacy has happened as a major concern for both individuals and corporations in this technologically advanced world. The persistent risk of individuality theft draws attention to the shortcomings of conventional security protocols like encrypted passwords and verified identification documents. This work offers a novel biometric security model that focuses on fingerprint identification in particular to solve the escalating cybersecurity challenges. Since each person&#039;s fingerprints are distinct, they have long been a trustworthy means of identifying themselves. Our study promotes the incorporation of fingerprint recognition into conventional password-based authentication procedures by utilizing its shown accuracy and effectiveness. Passwords and fingerprint recognition work together to protect sensitive data from theft and misuse by limiting access to it to authorized people only. The growing use of biometric data is being driven by the pressing need for strong information security. In addition to talking his dual objectives of user authentication and privacy, this study offers a thorough examination of biometrics as a viable substitute for conventional techniques. Excellent security against theft, loss, or unauthorized access is offered by biometric authentication based on a person&#039;s physical and behavioural traits. gives a thorough rundown and offers information about its advantages and disadvantages. By pointing out gaps and offering ideas for future research directions, this work supports continuing efforts to fix weaknesses in present authentication methods. In the digital age, the suggested biometric security approach is a significant step in improving data security and thwarting changing cyber threats.</dc:description>
	<dc:publisher xml:lang="en">Dr. Anil Kumar Sagar</dc:publisher>
	<dc:date>2025-09-21</dc:date>
	<dc:type>info:eu-repo/semantics/article</dc:type>
	<dc:type>info:eu-repo/semantics/publishedVersion</dc:type>
	<dc:type xml:lang="en">Peer-reviewed Article</dc:type>
	<dc:format>application/pdf</dc:format>
	<dc:identifier>https://ijietas.com/index.php/files/article/view/18</dc:identifier>
	<dc:identifier>10.64764/tqvaag28</dc:identifier>
	<dc:source xml:lang="en">International Journal of Innovations in Engineering Technology and Applied Sciences; IJIETAS: Vol 1, Issue 2, JULY- DECEMBER 2025; 26-32</dc:source>
	<dc:source>3107-4081</dc:source>
	<dc:language>eng</dc:language>
	<dc:relation>https://ijietas.com/index.php/files/article/view/18/12</dc:relation>
	<dc:rights xml:lang="en">Copyright (c) 2025 International Journal of Innovations in Engineering Technology and Applied Sciences</dc:rights>
	<dc:rights xml:lang="en">https://creativecommons.org/licenses/by-nc/4.0</dc:rights>
</oai_dc:dc>
			</metadata>
		</record>
		<record>
			<header>
				<identifier>oai:ojs.ijietas.com:article/19</identifier>
				<datestamp>2025-10-18T11:47:32Z</datestamp>
				<setSpec>files:ART</setSpec>
			</header>
			<metadata>
<oai_dc:dc
	xmlns:oai_dc="http://www.openarchives.org/OAI/2.0/oai_dc/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
	xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/oai_dc/
	http://www.openarchives.org/OAI/2.0/oai_dc.xsd">
	<dc:title xml:lang="en">Integrating Spatial Computing for Next-Generation Game Experiences</dc:title>
	<dc:creator xml:lang="en">Dheerendra Pratap</dc:creator>
	<dc:creator xml:lang="en">Subrata Sahana</dc:creator>
	<dc:description xml:lang="en">Spatial computing is a rapid development of technology in recent years. The term spatial computing means interaction between an individual and 3D-environment. It overlaps with the concepts of Augmented Reality (AR) , Virtual Reality (VR) ,Mixed Reality (MR). Important features of spatial computing consist of - spatial mapping, gesture and motion tracking, human computer interaction. This abstract highlights spatial computing&#039;s promising future in the technological field. This technology is used in a wide range of industries, including manufacturing, architecture, construction, gaming, healthcare, and education, retail, E- commerce and Automotive industry. This study aims to explore the potential of spatial computing. In recent years lot of companies implemented this technology in their products like -  Meta Quest 2, Apple Vision Pro, Microsoft HoloLens.  </dc:description>
	<dc:publisher xml:lang="en">Dr. Anil Kumar Sagar</dc:publisher>
	<dc:date>2025-09-21</dc:date>
	<dc:type>info:eu-repo/semantics/article</dc:type>
	<dc:type>info:eu-repo/semantics/publishedVersion</dc:type>
	<dc:type xml:lang="en">Peer-reviewed Article</dc:type>
	<dc:format>application/pdf</dc:format>
	<dc:identifier>https://ijietas.com/index.php/files/article/view/19</dc:identifier>
	<dc:identifier>10.64764/z83cwf87</dc:identifier>
	<dc:source xml:lang="en">International Journal of Innovations in Engineering Technology and Applied Sciences; IJIETAS: Vol 1, Issue 2, JULY- DECEMBER 2025; 33-39</dc:source>
	<dc:source>3107-4081</dc:source>
	<dc:language>eng</dc:language>
	<dc:relation>https://ijietas.com/index.php/files/article/view/19/11</dc:relation>
	<dc:rights xml:lang="en">Copyright (c) 2025 International Journal of Innovations in Engineering Technology and Applied Sciences</dc:rights>
	<dc:rights xml:lang="en">https://creativecommons.org/licenses/by-nc/4.0</dc:rights>
</oai_dc:dc>
			</metadata>
		</record>
	</ListRecords>
</OAI-PMH>
