{"id":10950,"date":"2026-04-03T10:54:22","date_gmt":"2026-04-03T10:54:22","guid":{"rendered":"https:\/\/www.raijmr.com\/ijrhs\/?p=10950"},"modified":"2026-04-03T15:50:02","modified_gmt":"2026-04-03T15:50:02","slug":"vol-14-sp-issue-3-march-2026-conference-proceedings","status":"publish","type":"post","link":"https:\/\/www.raijmr.com\/ijrhs\/vol-14-sp-issue-3-march-2026-conference-proceedings\/","title":{"rendered":"Vol. 14, Sp. Issue 3, March 2026 (Conference Proceedings)"},"content":{"rendered":"<table style=\"width: 100.208%; height: 1081px;\">\n<tbody>\n<tr style=\"height: 23px;\">\n<td style=\"text-align: center; height: 23px; width: 6.6%;\"><strong>Sr.<\/strong><\/td>\n<td style=\"text-align: center; height: 23px; width: 79%;\"><strong>Title of Research Paper\/Article<\/strong><\/td>\n<td style=\"text-align: center; height: 23px; width: 13.6%;\"><strong>Download<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 10px;\">\n<td style=\"height: 10px; width: 6.6%; text-align: center;\"><span style=\"font-family: 'book antiqua', palatino, serif; font-size: 12pt;\">1<\/span><\/td>\n<td style=\"width: 79%; height: 10px;\" width=\"358\"><a href=\"http:\/\/www.raijmr.com\/ijrhs\/wp-content\/uploads\/2026\/04\/1_Samrat-Pravin-Patel.pdf\"><span style=\"font-family: 'book antiqua', palatino, serif;\"><strong>Blockchain Technology for Space Surveillance in Indian Airspace: A Comprehensive Academic Review<\/strong><\/span><\/a><\/p>\n<p><span style=\"font-family: 'book antiqua', palatino, serif;\">Samrat Pravin Patel<\/span><\/p>\n<p>DOI: <a href=\"https:\/\/doi.org\/10.5281\/zenodo.19400018\">https:\/\/doi.org\/10.5281\/zenodo.19400018<\/a><\/td>\n<td style=\"width: 13.6%; height: 10px;\"><a href=\"http:\/\/www.raijmr.com\/ijrhs\/wp-content\/uploads\/2026\/04\/1_Samrat-Pravin-Patel.pdf\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-2888\" src=\"http:\/\/www.raijmr.com\/ijrhs\/wp-content\/uploads\/2017\/11\/download-article-300x78.jpg\" alt=\"\" width=\"137\" height=\"36\" srcset=\"https:\/\/www.raijmr.com\/ijrhs\/wp-content\/uploads\/2017\/11\/download-article-300x78.jpg 300w, https:\/\/www.raijmr.com\/ijrhs\/wp-content\/uploads\/2017\/11\/download-article-475x130.jpg 475w, https:\/\/www.raijmr.com\/ijrhs\/wp-content\/uploads\/2017\/11\/download-article.jpg 500w\" sizes=\"auto, (max-width: 137px) 100vw, 137px\" \/><\/a><\/td>\n<\/tr>\n<tr style=\"height: 120px;\">\n<td style=\"width: 6.6%; text-align: center; height: 120px;\"><span style=\"font-family: 'book antiqua', palatino, serif; font-size: 12pt;\">2<\/span><\/td>\n<td style=\"width: 79%; height: 120px;\" width=\"358\"><a href=\"http:\/\/www.raijmr.com\/ijrhs\/wp-content\/uploads\/2026\/04\/2_Dr.-Girish-Vekaria-Dr.-K.-P.-Patel.pdf\"><span style=\"font-family: 'book antiqua', palatino, serif;\"><strong>A Review: India&#8217;s Leading Role in the Evolution of Financial Cryptography and Consequent Data Security in the Digital Era<\/strong><\/span><\/a><\/p>\n<p><span style=\"font-family: 'book antiqua', palatino, serif;\">Dr. Girish Vekaria &amp; Dr. K. P. Patel<\/span><\/p>\n<p>DOI: <a href=\"https:\/\/doi.org\/10.5281\/zenodo.19400458\">https:\/\/doi.org\/10.5281\/zenodo.19400458<\/a><\/td>\n<td style=\"width: 13.6%; height: 120px;\"><a href=\"http:\/\/www.raijmr.com\/ijrhs\/wp-content\/uploads\/2026\/04\/2_Dr.-Girish-Vekaria-Dr.-K.-P.-Patel.pdf\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-2888\" src=\"http:\/\/www.raijmr.com\/ijrhs\/wp-content\/uploads\/2017\/11\/download-article-300x78.jpg\" alt=\"\" width=\"137\" height=\"36\" srcset=\"https:\/\/www.raijmr.com\/ijrhs\/wp-content\/uploads\/2017\/11\/download-article-300x78.jpg 300w, https:\/\/www.raijmr.com\/ijrhs\/wp-content\/uploads\/2017\/11\/download-article-475x130.jpg 475w, https:\/\/www.raijmr.com\/ijrhs\/wp-content\/uploads\/2017\/11\/download-article.jpg 500w\" sizes=\"auto, (max-width: 137px) 100vw, 137px\" \/><\/a><\/td>\n<\/tr>\n<tr style=\"height: 120px;\">\n<td style=\"width: 6.6%; text-align: center; height: 120px;\"><span style=\"font-family: 'book antiqua', palatino, serif; font-size: 12pt;\">3<\/span><\/td>\n<td style=\"width: 79%; height: 120px;\" width=\"358\"><a href=\"http:\/\/www.raijmr.com\/ijrhs\/wp-content\/uploads\/2026\/04\/3_Angik-K.-Patel.pdf\"><span style=\"font-family: 'book antiqua', palatino, serif;\"><strong>A Study on Challenges of Data Security and Data Privacy in the Indian Chemical and Pharmaceutical Industry Sector<\/strong><\/span><\/a><\/p>\n<p><span style=\"font-family: 'book antiqua', palatino, serif;\">Angik K. Patel<\/span><\/p>\n<p>DOI: <a href=\"https:\/\/doi.org\/10.5281\/zenodo.19400957\">https:\/\/doi.org\/10.5281\/zenodo.19400957<\/a><\/td>\n<td style=\"width: 13.6%; height: 120px;\"><a href=\"http:\/\/www.raijmr.com\/ijrhs\/wp-content\/uploads\/2026\/04\/3_Angik-K.-Patel.pdf\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-2888\" src=\"http:\/\/www.raijmr.com\/ijrhs\/wp-content\/uploads\/2017\/11\/download-article-300x78.jpg\" alt=\"\" width=\"137\" height=\"36\" srcset=\"https:\/\/www.raijmr.com\/ijrhs\/wp-content\/uploads\/2017\/11\/download-article-300x78.jpg 300w, https:\/\/www.raijmr.com\/ijrhs\/wp-content\/uploads\/2017\/11\/download-article-475x130.jpg 475w, https:\/\/www.raijmr.com\/ijrhs\/wp-content\/uploads\/2017\/11\/download-article.jpg 500w\" sizes=\"auto, (max-width: 137px) 100vw, 137px\" \/><\/a><\/td>\n<\/tr>\n<tr style=\"height: 96px;\">\n<td style=\"width: 6.6%; text-align: center; height: 96px;\"><span style=\"font-family: 'book antiqua', palatino, serif; font-size: 12pt;\">4<\/span><\/td>\n<td style=\"width: 79%; height: 96px;\" width=\"358\"><a href=\"http:\/\/www.raijmr.com\/ijrhs\/wp-content\/uploads\/2026\/04\/4_Urjaben-Nihar-Patel.pdf\"><span style=\"font-family: 'book antiqua', palatino, serif;\"><strong>Securing the Quantitative Core: Data Integrity, Cryptography, and Financial Stability<\/strong><\/span><\/a><\/p>\n<p><span style=\"font-family: 'book antiqua', palatino, serif;\">Urjaben Nihar Patel<\/span><\/p>\n<p>DOI: <a href=\"https:\/\/doi.org\/10.5281\/zenodo.19401081\">https:\/\/doi.org\/10.5281\/zenodo.19401081<\/a><\/td>\n<td style=\"width: 13.6%; height: 96px;\"><a href=\"http:\/\/www.raijmr.com\/ijrhs\/wp-content\/uploads\/2026\/04\/4_Urjaben-Nihar-Patel.pdf\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-2888\" src=\"http:\/\/www.raijmr.com\/ijrhs\/wp-content\/uploads\/2017\/11\/download-article-300x78.jpg\" alt=\"\" width=\"137\" height=\"36\" srcset=\"https:\/\/www.raijmr.com\/ijrhs\/wp-content\/uploads\/2017\/11\/download-article-300x78.jpg 300w, https:\/\/www.raijmr.com\/ijrhs\/wp-content\/uploads\/2017\/11\/download-article-475x130.jpg 475w, https:\/\/www.raijmr.com\/ijrhs\/wp-content\/uploads\/2017\/11\/download-article.jpg 500w\" sizes=\"auto, (max-width: 137px) 100vw, 137px\" \/><\/a><\/td>\n<\/tr>\n<tr style=\"height: 96px;\">\n<td style=\"width: 6.6%; text-align: center; height: 96px;\"><span style=\"font-family: 'book antiqua', palatino, serif; font-size: 12pt;\">5<\/span><\/td>\n<td style=\"width: 79%; height: 96px;\" width=\"358\"><a href=\"http:\/\/www.raijmr.com\/ijrhs\/wp-content\/uploads\/2026\/04\/5_Sanjaykumar-Ganeshbhai-Patel.pdf\"><span style=\"font-family: 'book antiqua', palatino, serif;\"><strong>Design and Implementation of a Cloud-Based Framework for E-Governance<\/strong><\/span><\/a><\/p>\n<p><span style=\"font-family: 'book antiqua', palatino, serif;\">Sanjaykumar Ganeshbhai Patel<\/span><\/p>\n<p>DOI: <a href=\"https:\/\/doi.org\/10.5281\/zenodo.19401178\">https:\/\/doi.org\/10.5281\/zenodo.19401178<\/a><\/td>\n<td style=\"width: 13.6%; height: 96px;\"><a href=\"http:\/\/www.raijmr.com\/ijrhs\/wp-content\/uploads\/2026\/04\/5_Sanjaykumar-Ganeshbhai-Patel.pdf\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-2888\" src=\"http:\/\/www.raijmr.com\/ijrhs\/wp-content\/uploads\/2017\/11\/download-article-300x78.jpg\" alt=\"\" width=\"137\" height=\"36\" srcset=\"https:\/\/www.raijmr.com\/ijrhs\/wp-content\/uploads\/2017\/11\/download-article-300x78.jpg 300w, https:\/\/www.raijmr.com\/ijrhs\/wp-content\/uploads\/2017\/11\/download-article-475x130.jpg 475w, https:\/\/www.raijmr.com\/ijrhs\/wp-content\/uploads\/2017\/11\/download-article.jpg 500w\" sizes=\"auto, (max-width: 137px) 100vw, 137px\" \/><\/a><\/td>\n<\/tr>\n<tr style=\"height: 136px;\">\n<td style=\"width: 6.6%; text-align: center; height: 136px;\"><span style=\"font-family: 'book antiqua', palatino, serif; font-size: 12pt;\">6<\/span><\/td>\n<td style=\"width: 79%; height: 136px;\" width=\"358\"><a href=\"http:\/\/www.raijmr.com\/ijrhs\/wp-content\/uploads\/2026\/04\/6_Trivedi-Darshankumar-Sureshbhai-.pdf\"><span style=\"font-family: 'book antiqua', palatino, serif;\"><strong>Blockchain-Based Mechanisms for Enhancing Security and Transparency in Financial Systems<\/strong><\/span><\/a><\/p>\n<p><span style=\"font-family: 'book antiqua', palatino, serif;\">Trivedi Darshankumar Sureshbhai &amp;<\/span><\/p>\n<p><span style=\"font-family: 'book antiqua', palatino, serif;\">Dr. Kiritkumar I. Chokhawala<\/span><\/p>\n<p>DOI: <a href=\"https:\/\/doi.org\/10.5281\/zenodo.19401241\">https:\/\/doi.org\/10.5281\/zenodo.19401241<\/a><\/td>\n<td style=\"width: 13.6%; height: 136px;\"><a href=\"http:\/\/www.raijmr.com\/ijrhs\/wp-content\/uploads\/2026\/04\/6_Trivedi-Darshankumar-Sureshbhai-.pdf\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-2888\" src=\"http:\/\/www.raijmr.com\/ijrhs\/wp-content\/uploads\/2017\/11\/download-article-300x78.jpg\" alt=\"\" width=\"137\" height=\"36\" srcset=\"https:\/\/www.raijmr.com\/ijrhs\/wp-content\/uploads\/2017\/11\/download-article-300x78.jpg 300w, https:\/\/www.raijmr.com\/ijrhs\/wp-content\/uploads\/2017\/11\/download-article-475x130.jpg 475w, https:\/\/www.raijmr.com\/ijrhs\/wp-content\/uploads\/2017\/11\/download-article.jpg 500w\" sizes=\"auto, (max-width: 137px) 100vw, 137px\" \/><\/a><\/td>\n<\/tr>\n<tr style=\"height: 96px;\">\n<td style=\"width: 6.6%; text-align: center; height: 96px;\"><span style=\"font-family: 'book antiqua', palatino, serif; font-size: 12pt;\">7<\/span><\/td>\n<td style=\"width: 79%; height: 96px;\" width=\"358\"><a href=\"http:\/\/www.raijmr.com\/ijrhs\/wp-content\/uploads\/2026\/04\/7_Karan-Vekariya.pdf\"><span style=\"font-family: 'book antiqua', palatino, serif;\"><strong>Key Challenges to Digital Financial Services in Emerging Economies: The Indian Context<\/strong><\/span><\/a><\/p>\n<p><span style=\"font-family: 'book antiqua', palatino, serif;\">Karan Vekariya<\/span><\/p>\n<p>DOI: <a href=\"https:\/\/doi.org\/10.5281\/zenodo.19401273\">https:\/\/doi.org\/10.5281\/zenodo.19401273\u00a0<\/a><\/td>\n<td style=\"width: 13.6%; height: 96px;\"><a href=\"http:\/\/www.raijmr.com\/ijrhs\/wp-content\/uploads\/2026\/04\/7_Karan-Vekariya.pdf\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-2888\" src=\"http:\/\/www.raijmr.com\/ijrhs\/wp-content\/uploads\/2017\/11\/download-article-300x78.jpg\" alt=\"\" width=\"137\" height=\"36\" srcset=\"https:\/\/www.raijmr.com\/ijrhs\/wp-content\/uploads\/2017\/11\/download-article-300x78.jpg 300w, https:\/\/www.raijmr.com\/ijrhs\/wp-content\/uploads\/2017\/11\/download-article-475x130.jpg 475w, https:\/\/www.raijmr.com\/ijrhs\/wp-content\/uploads\/2017\/11\/download-article.jpg 500w\" sizes=\"auto, (max-width: 137px) 100vw, 137px\" \/><\/a><\/td>\n<\/tr>\n<tr style=\"height: 96px;\">\n<td style=\"width: 6.6%; text-align: center; height: 96px;\"><span style=\"font-family: 'book antiqua', palatino, serif; font-size: 12pt;\">8<\/span><\/td>\n<td style=\"width: 79%; height: 96px;\" width=\"358\"><a href=\"http:\/\/www.raijmr.com\/ijrhs\/wp-content\/uploads\/2026\/04\/8_Priyanshu-Baldha.pdf\"><span style=\"font-family: 'book antiqua', palatino, serif;\"><strong>Role of Mobile Banking in Financial Inclusion: Evidence from Agro Traders of India<\/strong><\/span><\/a><\/p>\n<p><span style=\"font-family: 'book antiqua', palatino, serif;\">Priyanshu Baldha<\/span><\/p>\n<p>DOI: <a href=\"https:\/\/doi.org\/10.5281\/zenodo.19401337\">https:\/\/doi.org\/10.5281\/zenodo.19401337<\/a><\/td>\n<td style=\"width: 13.6%; height: 96px;\"><a href=\"http:\/\/www.raijmr.com\/ijrhs\/wp-content\/uploads\/2026\/04\/8_Priyanshu-Baldha.pdf\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-2888\" src=\"http:\/\/www.raijmr.com\/ijrhs\/wp-content\/uploads\/2017\/11\/download-article-300x78.jpg\" alt=\"\" width=\"137\" height=\"36\" srcset=\"https:\/\/www.raijmr.com\/ijrhs\/wp-content\/uploads\/2017\/11\/download-article-300x78.jpg 300w, https:\/\/www.raijmr.com\/ijrhs\/wp-content\/uploads\/2017\/11\/download-article-475x130.jpg 475w, https:\/\/www.raijmr.com\/ijrhs\/wp-content\/uploads\/2017\/11\/download-article.jpg 500w\" sizes=\"auto, (max-width: 137px) 100vw, 137px\" \/><\/a><\/td>\n<\/tr>\n<tr style=\"height: 120px;\">\n<td style=\"width: 6.6%; text-align: center; height: 120px;\"><span style=\"font-family: 'book antiqua', palatino, serif; font-size: 12pt;\">9<\/span><\/td>\n<td style=\"width: 79%; height: 120px;\" width=\"358\"><a href=\"http:\/\/www.raijmr.com\/ijrhs\/wp-content\/uploads\/2026\/04\/9_Sutariya-Neel.pdf\"><span style=\"font-family: 'book antiqua', palatino, serif;\"><strong>Inter-Regional Carbon Arbitrage: Real Time Biodiversity Credit Exchange between Gujarat and London via Cross Border Financial Cryptography<\/strong><\/span><\/a><\/p>\n<p><span style=\"font-family: 'book antiqua', palatino, serif;\">Sutariya Neel<\/span><\/p>\n<p>DOI: <a href=\"https:\/\/doi.org\/10.5281\/zenodo.19401417\">https:\/\/doi.org\/10.5281\/zenodo.19401417<\/a><\/td>\n<td style=\"width: 13.6%; height: 120px;\"><a href=\"http:\/\/www.raijmr.com\/ijrhs\/wp-content\/uploads\/2026\/04\/9_Sutariya-Neel.pdf\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-2888\" src=\"http:\/\/www.raijmr.com\/ijrhs\/wp-content\/uploads\/2017\/11\/download-article-300x78.jpg\" alt=\"\" width=\"137\" height=\"36\" srcset=\"https:\/\/www.raijmr.com\/ijrhs\/wp-content\/uploads\/2017\/11\/download-article-300x78.jpg 300w, https:\/\/www.raijmr.com\/ijrhs\/wp-content\/uploads\/2017\/11\/download-article-475x130.jpg 475w, https:\/\/www.raijmr.com\/ijrhs\/wp-content\/uploads\/2017\/11\/download-article.jpg 500w\" sizes=\"auto, (max-width: 137px) 100vw, 137px\" \/><\/a><\/td>\n<\/tr>\n<tr style=\"height: 56px;\">\n<td style=\"width: 6.6%; text-align: center; height: 56px;\"><span style=\"font-family: 'book antiqua', palatino, serif; font-size: 12pt;\">10<\/span><\/td>\n<td style=\"width: 79%; height: 56px;\" width=\"358\"><a href=\"http:\/\/www.raijmr.com\/ijrhs\/wp-content\/uploads\/2026\/04\/10_Dr.-Jayshree-Patel-Pratham-Patel.pdf\"><span style=\"font-family: 'book antiqua', palatino, serif;\"><strong>Inorganic Material-Based Quantum-Safe True Random Number Generators for Cryptographic Encryption Systems<\/strong><\/span><\/a><\/p>\n<p><span style=\"font-family: 'book antiqua', palatino, serif;\">Dr. Jayshree Patel &amp; Pratham Patel<\/span><\/p>\n<p>DOI: <a href=\"https:\/\/doi.org\/10.5281\/zenodo.19401462\">https:\/\/doi.org\/10.5281\/zenodo.19401462<\/a><\/td>\n<td style=\"width: 13.6%; height: 56px;\"><a href=\"http:\/\/www.raijmr.com\/ijrhs\/wp-content\/uploads\/2026\/04\/10_Dr.-Jayshree-Patel-Pratham-Patel.pdf\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-2888\" src=\"http:\/\/www.raijmr.com\/ijrhs\/wp-content\/uploads\/2017\/11\/download-article-300x78.jpg\" alt=\"\" width=\"137\" height=\"36\" srcset=\"https:\/\/www.raijmr.com\/ijrhs\/wp-content\/uploads\/2017\/11\/download-article-300x78.jpg 300w, https:\/\/www.raijmr.com\/ijrhs\/wp-content\/uploads\/2017\/11\/download-article-475x130.jpg 475w, https:\/\/www.raijmr.com\/ijrhs\/wp-content\/uploads\/2017\/11\/download-article.jpg 500w\" sizes=\"auto, (max-width: 137px) 100vw, 137px\" \/><\/a><\/td>\n<\/tr>\n<tr style=\"height: 56px;\">\n<td style=\"width: 6.6%; text-align: center; height: 56px;\"><span style=\"font-family: 'book antiqua', palatino, serif; font-size: 12pt;\">11<\/span><\/td>\n<td style=\"width: 79%; height: 56px;\" width=\"358\"><a href=\"http:\/\/www.raijmr.com\/ijrhs\/wp-content\/uploads\/2026\/04\/11_Dr.-A.-Z.-Chaudhari.pdf\"><span style=\"font-family: 'book antiqua', palatino, serif;\"><strong>Sacred Groves and Indigenous Knowledge as Natural Models of Decentralised Data Security<\/strong><\/span><\/a><\/p>\n<p><span style=\"font-family: 'book antiqua', palatino, serif;\">Dr. A. Z. Chaudhari<\/span><\/p>\n<p>DOI: <a href=\"https:\/\/doi.org\/10.5281\/zenodo.19401495\">https:\/\/doi.org\/10.5281\/zenodo.19401495<\/a><\/td>\n<td style=\"width: 13.6%; height: 56px;\"><a href=\"http:\/\/www.raijmr.com\/ijrhs\/wp-content\/uploads\/2026\/04\/11_Dr.-A.-Z.-Chaudhari.pdf\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-2888\" src=\"http:\/\/www.raijmr.com\/ijrhs\/wp-content\/uploads\/2017\/11\/download-article-300x78.jpg\" alt=\"\" width=\"137\" height=\"36\" srcset=\"https:\/\/www.raijmr.com\/ijrhs\/wp-content\/uploads\/2017\/11\/download-article-300x78.jpg 300w, https:\/\/www.raijmr.com\/ijrhs\/wp-content\/uploads\/2017\/11\/download-article-475x130.jpg 475w, https:\/\/www.raijmr.com\/ijrhs\/wp-content\/uploads\/2017\/11\/download-article.jpg 500w\" sizes=\"auto, (max-width: 137px) 100vw, 137px\" \/><\/a><\/td>\n<\/tr>\n<tr style=\"height: 56px;\">\n<td style=\"width: 6.6%; text-align: center; height: 56px;\"><span style=\"font-family: 'book antiqua', palatino, serif; font-size: 12pt;\">12<\/span><\/td>\n<td style=\"width: 79%; height: 56px;\" width=\"358\"><span style=\"color: #0000ff;\"><a style=\"color: #0000ff;\" href=\"http:\/\/www.raijmr.com\/ijrhs\/wp-content\/uploads\/2026\/04\/12_Dhruv-Joshi.pdf\"><span style=\"font-family: 'book antiqua', palatino, serif;\"><strong>Encoded Matrix: Leveraging Genetically Regulated Bio cellulose Synthesis for Biological Steganography and Secure Information Storage<\/strong><\/span><\/a><\/span><\/p>\n<p><span style=\"font-family: 'book antiqua', palatino, serif;\">Dhruv Joshi<\/span><\/p>\n<p>DOI: <a href=\"https:\/\/doi.org\/10.5281\/zenodo.19401623\">https:\/\/doi.org\/10.5281\/zenodo.19401623<\/a><\/td>\n<td style=\"width: 13.6%; height: 56px;\"><a href=\"http:\/\/www.raijmr.com\/ijrhs\/wp-content\/uploads\/2026\/04\/12_Dhruv-Joshi.pdf\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-2888\" src=\"http:\/\/www.raijmr.com\/ijrhs\/wp-content\/uploads\/2017\/11\/download-article-300x78.jpg\" alt=\"\" width=\"137\" height=\"36\" srcset=\"https:\/\/www.raijmr.com\/ijrhs\/wp-content\/uploads\/2017\/11\/download-article-300x78.jpg 300w, https:\/\/www.raijmr.com\/ijrhs\/wp-content\/uploads\/2017\/11\/download-article-475x130.jpg 475w, https:\/\/www.raijmr.com\/ijrhs\/wp-content\/uploads\/2017\/11\/download-article.jpg 500w\" sizes=\"auto, (max-width: 137px) 100vw, 137px\" \/><\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Sr. Title of Research Paper\/Article Download 1 Blockchain Technology for Space Surveillance in Indian Airspace: A Comprehensive Academic Review Samrat Pravin Patel DOI: https:\/\/doi.org\/10.5281\/zenodo.19400018 2 A Review: India&#8217;s Leading Role in the Evolution of Financial Cryptography and Consequent Data Security in the Digital Era Dr. Girish Vekaria &amp; Dr. K. P. Patel DOI: https:\/\/doi.org\/10.5281\/zenodo.19400458 3 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,65],"tags":[],"class_list":{"0":"post-10950","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-ijrhs","7":"category-ijrhs-vol-14-2026"},"_links":{"self":[{"href":"https:\/\/www.raijmr.com\/ijrhs\/wp-json\/wp\/v2\/posts\/10950","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.raijmr.com\/ijrhs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.raijmr.com\/ijrhs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.raijmr.com\/ijrhs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.raijmr.com\/ijrhs\/wp-json\/wp\/v2\/comments?post=10950"}],"version-history":[{"count":5,"href":"https:\/\/www.raijmr.com\/ijrhs\/wp-json\/wp\/v2\/posts\/10950\/revisions"}],"predecessor-version":[{"id":10975,"href":"https:\/\/www.raijmr.com\/ijrhs\/wp-json\/wp\/v2\/posts\/10950\/revisions\/10975"}],"wp:attachment":[{"href":"https:\/\/www.raijmr.com\/ijrhs\/wp-json\/wp\/v2\/media?parent=10950"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.raijmr.com\/ijrhs\/wp-json\/wp\/v2\/categories?post=10950"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.raijmr.com\/ijrhs\/wp-json\/wp\/v2\/tags?post=10950"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}