Editor(s)
Dr. Leo Willyanto Santoso
Assistant Professor, Petra Christian University, Indonesia.

Short Biosketch

ISBN 978-81-968656-8-9 (Print)
ISBN 978-81-968656-7-2 (eBook)
DOI: 10.9734/bpi/cpstr/v2

This book covers key areas of science, technology and research. The contributions by the authors include littoral drift, shields parameter, tidal prism, cobble armoring, medication optimization, healthcare transformation, electronic health records (EHRs), medication reconciliation tools, Discovery Protocol, Address Resolution Protocol, MAC address, wireless network connection, ethernet, ultrawideband, indoor localization, Newton-Raphson, Gauss-Newton, steepest descent iteration, UWB remote innovation, Boost converter, CUK converter, electric vehicle, Solar PV, torque ripple, solar energy, rural wastewater, pollution parameters, treatment technologies, reuse of purified wastewater, environmental degradation, industrial revolution, education 4.0, learning environments, artificial intelligence, machine learning, data science, Vehicular Ad Hoc Networks, cryptographic text, cloud storage, sewage water treatment plant, GPRS technology, internet of things, augmented reality; virtual reality; mixed reality; construction industry; immersive technology. This book contains various materials suitable for students, researchers and academicians in the field of science, technology and research.

 

Media Promotion:


Chapters


Advances and Challenges in Patient-Centric Medication Optimization in Health Care Settings

Rajesh Hadia , Rahul Trivedi, Cyril Sajan, Varunsingh Saggu , Sunil Baile , Sunil Kardani , Hemraj Singh Rajput

Contemporary Perspective on Science, Technology and Research Vol. 2, 29 December 2023, Page 1-11
https://doi.org/10.9734/bpi/cpstr/v2/8242A

The landscape of healthcare is undergoing a significant evolution marked by a growing emphasis on patient-centered care. Patient-centric medication optimization is a transformative paradigm that recognizes patients as active participants in their healthcare journey. This shift involves tailoring medication regimens to individual needs, fostering shared decision-making, and leveraging innovative technologies. This chapter explores the principles, technologies, and best practices underpinning patient-centric medication optimization. It highlights the impact of personalization, shared decision-making, adherence support, and patient empowerment on health outcomes. Technologies such as Electronic Health Records, medication reconciliation tools, telehealth, mobile apps, and pharmacogenomics play pivotal roles in driving this transformation. Evidence from studies underscores the benefits, including improved satisfaction, adherence, and clinical outcomes. As healthcare progresses toward a more patient-centered future, understanding and implementing patient-centric medication optimization principles become increasingly crucial.

Localization for IoT Based Systems Using UWB

B. Venkata Krishnaveni , A. Venkatalakshmi, B. Ravi Kumar

Contemporary Perspective on Science, Technology and Research Vol. 2, 29 December 2023, Page 12-26
https://doi.org/10.9734/bpi/cpstr/v2/11383F

The sophisticated, cutting-edge low power, low cost wireless technologies of today make the Internet of Things (IOTs) a significant platform. IOT applications are being used on an increasing basis in a variety of contexts, including smart factories, smart cities, smart industries, and smart homes. Achieving a suitable level of precision and accuracy in localizing the person, object, or device is crucial for each of these applications. In IOT, every gadget is connected to every other device through the internet. One way to classify localization is as measurements of area, angle, distance, etc. Numerous wireless technologies, including radio frequency identification (RFID), Bluetooth low energy (BLE), WiFi, and ultra-wideband (UWB), are utilized in Internet of Things (IOT) systems to achieve dependable localization. It has been discovered that UWB plays a crucial function. Since UWB has a wide frequency range (3.1GHz–10.6GHz), a low duty cycle (maximum on time 5ms and off time 38ms), high accuracy of ranging (cm), uses very small pulses (ns to localize), can pass through obstacles, can prevent multipath fading, and other advantages, it has been found to be important for localization in IOTs. It performs well in a wireless sensor network (WSN) and has been looked into as a possible option for indoor localization. We present the age and gathering of UWB signal first and afterward we examine the confinement calculation for IoT applications utilizing UWB remote innovation.

Efficient Ways of Rural Wastewater Treatment in Developing Countries

Harena Chan-Se Maharisoa, Mohamed Tahiri

Contemporary Perspective on Science, Technology and Research Vol. 2, 29 December 2023, Page 27-44
https://doi.org/10.9734/bpi/cpstr/v2/2528G

We aim to develop low-cost technologies for the treatment and reuse of rural domestic wastewater in agricultural irrigation and landscaping. These technologies are based on gravity flow and do not require energy for pumping, agitation, or aeration. Additionally, the sludge generated from the mini-Steps can be used as organic fertilizers for agriculture. The chosen technologies are CAR or UASB reactor. The structures are designed based on the average daily flow rate and constructed using local concrete. The treated water storage basin is also covered to prevent accelerated evaporation caused by sunlight, particularly in sub-Saharan countries that are vulnerable to the impacts of climate disturbances.

Performance Evaluation of DC-DC Converters for Solar Photovoltaic-fed Switched Reluctance Motor Applications in Electric Vehicles

G. Mahalakshmi, S. Kanthalakshmi, K. Maharaja

Contemporary Perspective on Science, Technology and Research Vol. 2, 29 December 2023, Page 45-61
https://doi.org/10.9734/bpi/cpstr/v2/1859G

This chapter describes the performance of a Solar PV-powered switched reluctance motor with low torque ripple in electric vehicle applications. The conspicuous impression of solar energy in our nation’s energy requirements has become predominant in recent years. It is a boundless source of energy and the finest substitute for any other non-renewable sources in our country. Switched reluctance motors have become increasingly common in the electric car sector due to their unbreakable features, which include their self-starting ability, simple structure, lack of rotor windings, and low maintenance requirements. However, because to its nonlinear features, SRM's large torque ripple is a constraint. This paper analyzes the performance of a switching reluctance motor with several DC-DC converters, and compares the findings in terms of the motor's speed and torque ripple %. The switching time of the converter is controlled by the MPPT controller, which uses incremental conductance and the Integrator method. The converters presented in this work are the Boost converter and the Cuk converter. These two types of converters are designed in MATLAB software and their characteristics are analysed while supplying the switched reluctance motor. . The DC-DC converter output is given to the input of power converter, which is asymmetric bridge converter. This converter drives the switched reluctance motor under variable load conditions. By varying the duty cycle of the DC-DC converter circuit the output voltage can be controlled. This in turn controls the speed of the motor effectively. The findings of the simulation are used to analyze how well the suggested system works with the motor. From the results, it is evident that using this kind of converter improves the speed and torque ripple performance of the solar PV powered switched reluctance motor. Hence, it is suitable for electric vehicle applications, which require less torque ripple and mechanical vibrations.

An Effective Scheme for Revocation of User Attributes for Data Outsourcing in Cloud Storage

Fang Zheng, Xinguang Peng, Zhidan Li

Contemporary Perspective on Science, Technology and Research Vol. 2, 29 December 2023, Page 62-87
https://doi.org/10.9734/bpi/cpstr/v2/6488C

This chapter proposes a novel and fast scheme based on CP-ABE algorithm from the respect of the user’s attribute revocation to make it faster. With the advances of cloud data centers and cloud service, many application scenarios are developed such as enterprise business, the Vehicular Ad Hoc Networks (VANET), Sensor network. VANET is a particular case of wireless multihop network, which has the constraint of fast topology changes due to the high node mobility. Two major issues are efficiency and confidentiality. One of the fine-grained access control cryptography technologies, CP-ABE, is frequently used in cloud storage for outsourced data to safeguard user privacy. Furthermore, in addition to anonymity, computational cost is a key component that enables the use of CPABE in the circumstancesIn this scheme, we construct an identical tree T2 that has the same structure as the actual access control tree T1. Upon receiving a request from the user for the encrypted text to be preserved on CSP, CSP attempts to decrypt CT2, which is encrypted using the subset of secret keys that correspond to the user-provided attribute indexes and is also preserved on CSP based on the same tree T2. CSP will send CT1 to the user if they are able to decrypt it successfully, as this verifies their authorization to access the cryptographic text. In the event that CT1 is not sent to the user, CSP acknowledges that the user does not have access to it. Namely, we can decide if we authorize the right to access CT1 by judging if the secret key provided by the user can decrypt CT2. Because CT1 and CT2 have the same access control structure, they have the same secret key for decryption; that is, when some attributes are revoked, if the secret key cannot decrypt CT2, it cannot decrypt CT1. While CSP can directly decrypt CT2, but not CT1, CSP can judge if the  user has access to CT1 after the attribute revocation by decryption of CT2. Moreover, we propose the construction method of CT1 and CT2. Finally, we prove that the scheme is secure and viable. Our scheme realizes the attribute revocation and does not add too much computation overload on the system.

The chapter is disuses on the fourth industrial revolution, characterized by the convergence of digital technologies and data-driven approaches, has transformed education, giving rise to Education 4.0. Data Science plays a pivotal role in this paradigm shift by harnessing technologies, addressing challenges, and deploying tools to enhance learning experiences. This Book Chapter Unveils the Dynamic World of Data Science in Education 4.0: A Comprehensive Exploration of Technologies, Challenges, and Tools with the Main Objective of Understanding and Navigating this Transformative Era.. Technologies in Education 4.0 encompass Big Data Analysis, Machine Learning, Data Visualization, Predictive Analytics, Blockchain, IoT, and EdTech Platforms, each contributing uniquely to educational improvement. The role of each technology is dissected, highlighting their significance in personalized learning, administrative efficiency, and academic performance prediction.

Challenges in the realm of Data Science in Education are multifaceted, including data privacy and security, data integration, ethical concerns, teacher training, and resource constraints. An examination of these challenges offers a deeper understanding of the complexities faced by educational institutions in adopting data-driven approaches while ensuring ethical and secure practices. The landscape of tools available to educators and administrators for leveraging data science is diverse. Learning Analytics Platforms, Data Visualization Tools, Machine Learning Frameworks, Predictive Analytics Software, IoT Devices, and Blockchain Platforms offer a rich array of options.

Working with Nature to Manage Tidal Inlets

Jonathan Akin French

Contemporary Perspective on Science, Technology and Research Vol. 2, 29 December 2023, Page 103-119
https://doi.org/10.9734/bpi/cpstr/v2/6930B

Sandy inlets are in a dynamic equilibrium between wave-driven littoral drift acting to close them, and tidal flows keeping them open. Their beds are in a continual state of suspension and deposition, so their bathymetry and even location are always in flux. Even so, for sandy inlets a nearly linear relationship between an inlet’s cross-sectional flow area and the inshore tidal prism is maintained - except when major wind and/or runoff events act to close or widen an inlet. Inlet location can be stabilized by jetties, but dredging may still be necessary to maintain a navigable channel. Armoring with rock large enough to resist erosion can protect an inlet bed or river mouth from excessive storm flow erosion. Armoring can also be used as a strategem to close inlets.

MAC Address Cloning Technique Results

Md. Abdullah Yusuf Imam , Prodip Kumar Biswas

Contemporary Perspective on Science, Technology and Research Vol. 2, 29 December 2023, Page 120-129
https://doi.org/10.9734/bpi/cpstr/v2/6782E

MAC address cloning causes the Docker container to use the MAC address of the host, and the host to use the MAC address of either an address you specify or a randomly generated one. MAC filtering is not an effective way in wireless networking as attackers cannot search easily MAC address on wireless transmissions mode. On the other hand, in a wired network, MAC filtering works better since it is simpler for an attacker to determine an approved MAC address. Every LAN card has a unique MAC address allocated to it. In this way, Changing MAC address is necessary in network virtualization. It can also be used in the process of exploiting security of a system. By cloning MAC address makes one device hidden from outsider, in the same way cloning MAC address makes a network vulnerable. It is important to choice who wants to do what. In IP networks, the MAC address of an interface is query given the IP address using the Address Resolution Protocol (ARP) for Internet Protocol Version 4 (IPv4) or the Neighbor Discovery Protocol (NDP) for IPv6. ARP and NDP are used to relate IP addresses (OSI layer 3) to Ethernet MAC addresses (OSI layer 2). Security can be enhanced through MAC address cloning because it enables you to use a dedicated virtual NIC for the Admin Network, Grid Network, and Client Network. Having the Docker container use the MAC address of the dedicated NIC on the host allows you to avoid using promiscuous mode network configurations.

Self-Sustained E-Toilet System Using IOT

S. S. Gurav , V. V. Khandare , G. A. Chougule

Contemporary Perspective on Science, Technology and Research Vol. 2, 29 December 2023, Page 130-136
https://doi.org/10.9734/bpi/cpstr/v2/7075C

At present, the e-Toilet system which exists are operates manually. Seeing, current situation of Covid-19 and Omicron there is a risk to use such manual system. So, by considering health and hygiene factor we are trying to give a solution which can solve issues related to cleanliness by using a automated system. e-Toilets are self-contained, self-cleaning, user-friendly, unmanned, automated toilet pots installed in public places. The entire unit is made of stainless steel. E-Toilets have sensors to initiate automatic functions.

E-Toilet is a coin operated pay Toilet. Multiple sensors are used to automate the whole system. The whole sensor data is provided to authorize person through IoT. The waste water from the system is then supplied to the underground tank through which it goes for purification purpose. The major aim of wastewater treatment is to remove as much of the suspended solids as possible before the remaining water, called effluent, is discharged back to the environment.

Wastewater Plant is used here, that will treat the outlet water coming out from e-Toilet system and make the reusable water which will further used for multiple purposes like for Agriculture purpose. So in this way we can control a lot of diseases that are occurring because of wastewater.

Unveilling the Application, Advantage and Limitation of AR, VR & MR in Immersive Learning Technologies in AEC

Ar. Gayatri Mahajan , Kaustubh Kinge

Contemporary Perspective on Science, Technology and Research Vol. 2, 29 December 2023, Page 137-172
https://doi.org/10.9734/bpi/cpstr/v2/19950D

Immersive technologies are now implemented in construction in India. Immersive technology is an integration of virtual content with the physical environment in a way that allows the user to engage naturally with the blended reality. In an immersive experience, the user accepts virtual elements of their environment as part of the whole, potentially becoming less conscious that those elements are not part of physical reality. In this paper, some key terms /features such as applications, uses, benefits, challenges, limitations, education, and future aspects of AR/VR/MR/and XR have been highlighted vis-a-vis with the implication of each case in the construction industry, construction management, and construction project. The advantages and disadvantages, impact, and purpose of each technology are extended in this article for each technology. Emphasis is given to introducing and including each technology in tertiary education and curricula of undergraduate and postgraduate architectural engineering and construction management. Adoption of these technologies in construction leads to improvement in construction productivity, efficiency, low cost, and time, which is, in turn, beneficial to the owner, contractor, builders, and stakeholders on the implication of these immersive technologies.