Results for ' Data Center Optimization'

983 found
Order:
  1. ENHANCED SLA-DRIVEN LOAD BALANCING ALGORITHMS FOR DATA CENTER OPTIMIZATION USING ADVANCED OPTIMIZATION TECHNIQUES.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):369-376.
    In modern data centers, managing the distribution of workloads efficiently is crucial for ensuring optimal performance and meeting Service Level Agreements (SLAs). Load balancing algorithms play a vital role in this process by distributing workloads across computing resources to avoid overloading any single resource. However, the effectiveness of these algorithms can be significantly enhanced through the integration of advanced optimization techniques. This paper proposes an SLA-driven load balancing algorithm optimized using methods such as genetic algorithms, particle swarm (...), and simulated annealing. By focusing on both resource utilization and SLA compliance, the proposed approach aims to reduce latency, improve throughput, and maximize overall system efficiency. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  2. Efficient Data Center Management: Advanced SLA-Driven Load Balancing Solutions.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):368-376.
    In modern data centers, managing the distribution of workloads efficiently is crucial for ensuring optimal performance and meeting Service Level Agreements (SLAs). Load balancing algorithms play a vital role in this process by distributing workloads across computing resources to avoid overloading any single resource. However, the effectiveness of these algorithms can be significantly enhanced through the integration of advanced optimization techniques. This paper proposes an SLA-driven load balancing algorithm optimized using methods such as genetic algorithms, particle swarm (...), and simulated annealing. By focusing on both resource utilization and SLA compliance, the proposed approach aims to reduce latency, improve throughput, and maximize overall system efficiency. The research introduces a novel framework that incorporates real-time monitoring, dynamic resource allocation, and adaptive threshold settings to ensure consistent SLA adherence while optimizing computing performance. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  3.  99
    Optimizing Data Center Operations with Enhanced SLA-Driven Load Balancing".S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):368-376.
    The research introduces a novel framework that incorporates real-time monitoring, dynamic resource allocation, and adaptive threshold settings to ensure consistent SLA adherence while optimizing computing performance. Extensive simulations are conducted using synthetic and real-world datasets to evaluate the performance of the proposed algorithm. The results demonstrate that the optimized load balancing approach outperforms traditional algorithms in terms of SLA compliance, resource utilization, and energy efficiency. The findings suggest that the integration of optimization techniques into load balancing algorithms can significantly (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. Power Consumption and Heat Dissipation in AI Data Centers: A Comparative Analysis.Krishnaiah Narukulla Krishna Chaitanya Sunkara - 2025 - International Journal of Innovative Research in Science, Engineering and Technology 14 (3):1894-1899.
    The increasing computational demands of artificial intelligence (AI) workloads have significantly escalated energy consumption in data centers. AI-driven applications, including deep learning, natural language processing, and autonomous systems, require substantial computing power, primarily provided by Graphics Processing Units. These GPUs, while enhancing computational efficiency, contribute to significant power consumption and heat generation, necessitating advanced cooling strategies. This study provides a quantitative assessment of AI-specific hardware power usage, focusing on the NVIDIA H100 GPU. The analysis compares AI data (...) energy consumption to the average US household power usage, demonstrating that a single AI rack consumes approximately 39 times the energy of a typical household. Additionally, a scalability analysis estimates that approximately 87 new hyper-scale data centers consume the electricity as much as consumed by New York City. This emphasizes that with rapid growth of AI Data Centers, the large-scale deployment could lead to an unprecedented rise in global energy demand. Furthermore, the study evaluates the impact of heat dissipation on cooling requirements, highlighting the need for energy- efficient cooling solutions, including liquid and immersion cooling techniques. Future research directions include energy- efficient AI models, renewable energy integration, sustainable AI accelerator designs, and intelligent workload optimization to mitigate the environmental impact of large-scale AI adoption. This research provides critical insights for designing more sustainable AI-driven data centers while maintaining high-performance computing efficiency. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  5.  28
    Policy Center to the Cloud: An Analysis of AWS and Snowflake’s Role in Cloud-Based Policy Management Solutions.Adavelli Sateesh Reddy - 2021 - Esp Journal of Engineering and Technology Advancements 1 (1):253-261.
    Organizations are migrating their policy management systems from the ground to the cloud, changing how they manage, secure and scale their operations. This paper analyses how Amazon Web Services (AWS) and Snowflake support robust and efficient cloud-based policy management solutions. This marriage of sort of AWS, which has an almost panoply of cloud services, and Snowflake, which is very well known for its data warehousing and analytics capabilities, makes sense because it is an enterprise in which you will want (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. Multipath Routing Optimization for Enhanced Load Balancing in Data-Heavy Networks.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):377-382.
    In today's data-driven world, the efficient management of network resources is crucial for optimizing performance in data centers and large-scale networks. Load balancing is a critical process in ensuring the equitable distribution of data across multiple paths, thereby enhancing network throughput and minimizing latency. This paper presents a comprehensive approach to load balancing using advanced optimization techniques integrated with multipath routing protocols. The primary focus is on dynamically allocating network resources to manage the massive volume of (...)
    Download  
     
    Export citation  
     
    Bookmark   35 citations  
  7. Optimization Algorithms for Load Balancing in Data-Intensive Systems with Multipath Routing.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):377-382.
    : In today's data-driven world, the efficient management of network resources is crucial for optimizing performance in data centers and large-scale networks. Load balancing is a critical process in ensuring the equitable distribution of data across multiple paths, thereby enhancing network throughput and minimizing latency. This paper presents a comprehensive approach to load balancing using advanced optimization techniques integrated with multipath routing protocols. The primary focus is on dynamically allocating network resources to manage the massive volume (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. OPTIMIZATION TECHNIQUES FOR LOAD BALANCING IN DATA-INTENSIVE APPLICATIONS USING MULTIPATH ROUTING NETWORKS.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):377-382.
    In today's data-driven world, the efficient management of network resources is crucial for optimizing performance in data centers and large-scale networks. Load balancing is a critical process in ensuring the equitable distribution of data across multiple paths, thereby enhancing network throughput and minimizing latency. This paper presents a comprehensive approach to load balancing using advanced optimization techniques integrated with multipath routing protocols. The primary focus is on dynamically allocating network resources to manage the massive volume of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. Big Data Optimization in Machine Learning.Xiaocheng Tang - 2015 - Disertation 1.
    Download  
     
    Export citation  
     
    Bookmark  
  10. Enhancing Water Productivity of Alfalfa (Medicago Sativa) Under Centre Pivot Irrigation System.Amir Mustafa Abd Aldaim, Adam Bush Adam & Abdelmoneim Elamin Mohamed - 2018 - International Journal of Engineering and Information Systems (IJEAIS) 2 (12):24-30.
    Abstract: The objective of this study was to evaluate water productivity of alfalfa (Medicago sativa) under centre pivot irrigation system. The experimental works were conducted at three centre pivot irrigation projects (Indian, Arab Authority for Agricultural Investment and Development (AAAID) and Sedonix projects) located at Khartoum State during the period from April 2011 to April 2013. In each project, three irrigation systems were randomly selected for the study treatments. Crop water requirement was obtained using CROPWAT 8 computer model. The parameters (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. OPTIMIZING DATA SCIENCE WORKFLOWS IN CLOUD COMPUTING.Tummalachervu Chaitanya Kanth - 2024 - Journal of Science Technology and Research (JSTAR) 4 (1):71-76.
    This paper explores the challenges and innovations in optimizing data science workflows within cloud computing environments. It begins by highlighting the critical role of data science in modern industries and the pivotal contribution of cloud computing in enabling scalable and efficient data processing. The primary focus lies in identifying and analyzing the key challenges encountered in current data science workflows deployed in cloud infrastructures. These challenges include scalability issues related to handling large volumes of data, (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  12. Innovative Approaches in Cardiovascular Disease Prediction Through Machine Learning Optimization.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):350-359.
    Cardiovascular diseases (CVD) represent a significant cause of morbidity and mortality worldwide, necessitating early detection for effective intervention. This research explores the application of machine learning (ML) algorithms in predicting cardiovascular diseases with enhanced accuracy by integrating optimization techniques. By leveraging data-driven approaches, ML models can analyze vast datasets, identifying patterns and risk factors that traditional methods might overlook. This study focuses on implementing various ML algorithms, such as Decision Trees, Random Forest, Support Vector Machines, and Neural Networks, (...)
    Download  
     
    Export citation  
     
    Bookmark   125 citations  
  13. Attitude and Ethical Behaviors of Healthcare Providers as Antidotes of Health Service Consumer Satisfaction in Mgbuoshimini Primary Health Centre, Port Harcourt, Nigeria.Justina Ikpoko-Ore-Ebirien Dike Isaruk, Ikpoko-Ore-Ebirien Dike Isaruk & Deborah Thelma George - 2023 - Journal of Health, Applied Sciences and Management 6 (3):24-33.
    Health service consumers' satisfaction with the services they receive has been a challenge over the past decade, and this has been attributed to many factors that diverse scholars have investigated using different variables. In this study, the attitude and ethical behaviours of healthcare providers as antidotes to health service consumers' satisfaction in the Primary Health Centre at Mgbuoshimini, Port Harcourt, Nigeria, were investigated. A cross-sectional descriptive research design was used to select participants from pregnant women, nursing mothers, couples for family (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14.  32
    Conditional Entropy with Swarm Optimization Approach for Privacy Preservation of Datasets in Cloud.Sugumar R. - 2016 - Indian Journal of Science and Technology 9 (28):1-6.
    Background/Objective: The primary intension is to provide utility trade off and good privacy for intermediate datasets in cloud. Methods: An efficient conditional entropy and database difference ratio is employed for the process. Utility is taken care with the employment of conditional entropy with the help of Swarm Optimization (PSO). Privacy handled by database difference ratio. Findings: Conditional entropy is found out between the first column and the original database and this is taken as the fitness function in Particle Swarm (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  15. National Center for Biomedical Ontology: Advancing biomedicine through structured organization of scientific knowledge.Daniel L. Rubin, Suzanna E. Lewis, Chris J. Mungall, Misra Sima, Westerfield Monte, Ashburner Michael, Christopher G. Chute, Ida Sim, Harold Solbrig, M. A. Storey, Barry Smith, John D. Richter, Natasha Noy & Mark A. Musen - 2006 - Omics: A Journal of Integrative Biology 10 (2):185-198.
    The National Center for Biomedical Ontology is a consortium that comprises leading informaticians, biologists, clinicians, and ontologists, funded by the National Institutes of Health (NIH) Roadmap, to develop innovative technology and methods that allow scientists to record, manage, and disseminate biomedical information and knowledge in machine-processable form. The goals of the Center are (1) to help unify the divergent and isolated efforts in ontology development by promoting high quality open-source, standards-based tools to create, manage, and use ontologies, (2) (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  16. Efficient Aggregated Data Transmission Scheme for Energy-Constrained Wireless Sensor Networks.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):445-460.
    Optimization algorithms such as Genetic Algorithms (GA) and Particle Swarm Optimization (PSO) are employed to determine the optimal aggregation and transmission schedules, taking into account factors such as network topology, node energy levels, and data urgency. The proposed approach is validated through extensive simulations, demonstrating significant improvements in energy consumption, packet delivery ratio, and overall network performance. The results suggest that the optimized aggregated packet transmission method can effectively extend the lifespan of duty-cycled WSNs while ensuring reliable (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  17. Latency-Aware Packet Transmission Optimization in Duty-Cycled WSNs.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):444-459.
    Wireless Sensor Networks (WSNs) have become increasingly prevalent in various applications, ranging from environmental monitoring to smart cities. However, the limited energy resources of sensor nodes pose significant challenges in maintaining network longevity and data transmission efficiency. Duty-cycled WSNs, where sensor nodes alternate between active and sleep states to conserve energy, offer a solution to these challenges but introduce new complexities in data transmission. This paper presents an optimized approach to aggregated packet transmission in duty-cycled WSNs, utilizing advanced (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18.  76
    Machine Learning-Driven Optimization for Accurate Cardiovascular Disease Prediction.Yoheswari S. - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):350-359.
    The research methodology involves data preprocessing, feature engineering, model training, and performance evaluation. We employ optimization methods such as Genetic Algorithms and Grid Search to fine-tune model parameters, ensuring robust and generalizable models. The dataset used includes patient medical records, with features like age, blood pressure, cholesterol levels, and lifestyle habits serving as inputs for the ML models. Evaluation metrics, including accuracy, precision, recall, F1-score, and the area under the ROC curve (AUC-ROC), assess the model's predictive power.
    Download  
     
    Export citation  
     
    Bookmark  
  19.  45
    Weighted Particle Swarm Optimization Algorithms and Power Management Strategies for Grid Hybrid Energy Systems (4th edition).Rajendran Sugumar - 2023 - International Conference on Recent Advances on Science and Engineering 4 (5):1-11.
    In independent renewable energy systems (RESs), one of the primary concerns needing to be addressed is the maintaining of power balances between supplies and requirements that are cost-optimized in residences linked to these systems. The amount of power generated through RESs has substantially risen, with solar and wind being the two primary sources in RESs. In modern power systems, small-scale distributed networks are growing at a rapid pace and distributed generation (DG) plays an important role. Micro grids are very recent (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. A Sustainability Improvement Strategy of Interconnected Data Centers Based on Dispatching Potential of Electric Vehicle Charging Stations.Xihao Wang, Xiaojun Wang, Yuqing Liu, Chun Xiao, Rongsheng Zhao, Ye Yang & Zhao Liu - 2022 - Sustainability 14 (11):6814.
    With the rapid development of information technology, the electricity consumption of Internet Data Centers (IDCs) increases drastically, resulting in considerable carbon emissions that need to be reduced urgently. In addition to the introduction of Renewable Energy Sources (RES), the joint use of the spatial migration capacity of IDC workload and the temporal flexibility of the demand of Electric Vehicle Charging Stations (EVCSs) provides an important means to change the carbon footprint of the IDC. In this paper, a sustainability improvement (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  21. Attack Prevention in IoT through Hybrid Optimization Mechanism and Deep Learning Framework.Regonda Nagaraju, Jupeth Pentang, Shokhjakhon Abdufattokhov, Ricardo Fernando CosioBorda, N. Mageswari & G. Uganya - 2022 - Measurement: Sensors 24:100431.
    The Internet of Things (IoT) connects schemes, programs, data management, and operations, and as they continuously assist in the corporation, they may be a fresh entryway for cyber-attacks. Presently, illegal downloading and virus attacks pose significant threats to IoT security. These risks may acquire confidential material, causing reputational and financial harm. In this paper hybrid optimization mechanism and deep learning,a frame is used to detect the attack prevention in IoT. To develop a cybersecurity warning system in a huge (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  22.  46
    Building Scalable Data Warehouses for Financial Analytics in Large Enterprises.Vijayan Naveen Edapurath - 2024 - International Journal of Innovative Research and Creative Technology 10 (3):1-10.
    In today's digital era, large enterprises face the daunting task of managing and analyzing vast volumes of financial data to inform strategic decision-making and maintain a competitive edge. Traditional data warehousing solutions often fall short in addressing the scale, complexity, and performance demands of modern financial analytics. This paper explores the architectural principles, technological strategies, and best practices essential for building scalable data warehouses tailored to the needs of financial analytics in large organizations. It delves into (...) integration techniques, performance optimization methods, security measures, and compliance with regulatory standards. Through in-depth analysis and real-world case studies, the paper provides a comprehensive roadmap for practitioners aiming to design and implement robust, scalable, and secure data warehousing solutions. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  23.  98
    AI-Driven Healthcare Optimization in Smart Cities.Eric Garcia - manuscript
    Urbanization poses significant challenges to healthcare systems, including overcrowded hospitals, inequitable access to care, and rising costs. Artificial Intelligence (AI) and the Internet of Things (IoT) offer transformative solutions for optimizing healthcare delivery in smart cities. This paper explores how AI-driven predictive analytics, combined with IoT-enabled wearable devices and telemedicine platforms, can enhance patient outcomes, streamline resource allocation, and reduce urban health disparities. By analyzing real-time health data and predicting disease outbreaks, this study demonstrates the potential of AI to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. System availability optimization for production and embedding of bitumen bounded materials.Milan Mirkovic - 2016 - Dissertation, University of Belgrade
    Application of the reliability of repairable systems on solving problems from constructing production systems takes an important place in the process of finding the optimal solution among the suggested system choices. The basic hypothesis when using the reliability of the repairable systems is that every machine is representing a component, a fact that is debatable when talking about technical sciences. However, considering the second assumption of the stationary process, the function of the availability is introduced. It represents the measure between (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. Data, Privacy, and the Individual.Carissa Véliz - 2020 - Center for the Governance of Change.
    The first few years of the 21st century were characterised by a progressive loss of privacy. Two phenomena converged to give rise to the data economy: the realisation that data trails from users interacting with technology could be used to develop personalised advertising, and a concern for security that led authorities to use such personal data for the purposes of intelligence and policing. In contrast to the early days of the data economy and internet surveillance, the (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  26.  34
    Virtual Machine for Big _Data in Cloud Computing (13th edition).Banupriya I. Manivannan B., - 2024 - International Journal of Innovative Research in Science, Engineering and Technology 13 (11):18380-18386. Translated by Manivannan B.
    Cloud computing has revolutionized data management for businesses and individuals a like, ushering in an era of unprecedented accessibility and scalability. As demand for cloud services continues to surge, the imperative for efficient and secure systems becomes paramount. One approach to meeting this challenge is the consolidation of virtual machines onto fewer physical servers, optimizing resource utilization and yielding significant energy savings. Moreover, this consolidation strategy bolsters overall security by enabling more effective monitoring and control of virtual machine instances. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27.  24
    Harnessing Guidewire Claim Center for Optimized Claim Management: A Blueprint for Efficiency and Customer Satisfaction.Ravi Teja Madhala Sateesh Reddy Adavelli - 2019 - International Journal of Innovative Research in Science, Engineering and Technology 8 (11):11466-11479.
    In today’s fast moving insurance environment, efficient claim management is a vital business practice to improve operational effectiveness and provide an exceptional customer experience. Based on the first notice of loss (FNOL), Guidewire Claim Center, the leading claims management platform, gives insurers the thorough, scalable, and customizable option to accelerate the claims process from FNOL to final resolution. In this paper, we explore how insurers adapt Guidewire Claim Center to enable effective utilization of Guidewire Claim Center to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. A conceptual framework for data-driven sustainable finance in green energy transition.Omotayo Bukola Adeoye, Ani Emmanuel Chigozie, Ninduwesuor-Ehiobu Nwakamma, Jose Montero Danny, Favour Oluwadamilare Usman & Kehinde Andrew Olu-Lawal - 2024 - World Journal of Advanced Research and Reviews 21 (2):1791–1801.
    As the world grapples with the urgent need for sustainable development, the transition towards green energy stands as a critical imperative. Financing this transition poses significant challenges, requiring innovative approaches that align financial objectives with environmental sustainability goals. This review presents a conceptual framework for leveraging data-driven techniques in sustainable finance to facilitate the transition towards green energy. The proposed framework integrates principles of sustainable finance with advanced data analytics to enhance decision-making processes across the financial ecosystem. At (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. Advanced Phishing Content Identification Using Dynamic Weighting Integrated with Genetic Algorithm Optimization.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):500-520.
    The Genetic Ranking Optimization Algorithm (GROA) is used to rank phishing content based on multiple features by optimizing the ranking system through iterative selection and weighting. Dynamic weighting further enhances the process by adjusting the weights of features based on their importance in real-time. This hybrid approach enables the model to learn from the data, improving classification over time. The classification system was evaluated using benchmark phishing datasets, and the results demonstrated a significant improvement in detection accuracy and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. The National Center for Biomedical Ontology.Mark A. Musen, Natalya F. Noy, Nigam H. Shah, Patricia L. Whetzel, Christopher G. Chute, Margaret-Anne Story & Barry Smith - 2012 - Journal of the American Medical Informatics Association 19 (2):190-195.
    The National Center for Biomedical Ontology is now in its seventh year. The goals of this National Center for Biomedical Computing are to: create and maintain a repository of biomedical ontologies and terminologies; build tools and web services to enable the use of ontologies and terminologies in clinical and translational research; educate their trainees and the scientific community broadly about biomedical ontology and ontology-based technology and best practices; and collaborate with a variety of groups who develop and use (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  31.  96
    Real-Time Phishing Detection Using Genetic Algorithm-Based Ranking and Dynamic Weighting Optimization.A. Manoj Prabaharan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):491-500.
    The rapid evolution of phishing techniques necessitates more sophisticated detection and classification methods. In this paper, we propose a novel approach to phishing content classification using a Genetic Ranking Optimization Algorithm (GROA), combined with dynamic weighting, to improve the accuracy and ranking of phishing versus legitimate content. Our method leverages features such as URL structure, email content analysis, and user behavior patterns to enhance the detection system's decision-making process. The Genetic Ranking Optimization Algorithm (GROA) is used to rank (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. Synthetic Health Data: Real Ethical Promise and Peril.Daniel Susser, Daniel S. Schiff, Sara Gerke, Laura Y. Cabrera, I. Glenn Cohen, Megan Doerr, Jordan Harrod, Kristin Kostick-Quenet, Jasmine McNealy, Michelle N. Meyer, W. Nicholson Price & Jennifer K. Wagner - 2024 - Hastings Center Report 54 (5):8-13.
    Researchers and practitioners are increasingly using machine‐generated synthetic data as a tool for advancing health science and practice, by expanding access to health data while—potentially—mitigating privacy and related ethical concerns around data sharing. While using synthetic data in this way holds promise, we argue that it also raises significant ethical, legal, and policy concerns, including persistent privacy and security problems, accuracy and reliability issues, worries about fairness and bias, and new regulatory challenges. The virtue of synthetic (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. Cloud-Based IoT System for Outdoor Pollution Detection and Data Analysis.Prathap Jeyapandi - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):424-430.
    Air pollution is a significant environmental concern that affects human health, ecosystems, and climate change. Effective monitoring and management of outdoor air quality are crucial for mitigating its adverse effects. This paper presents an advanced approach to outdoor pollution measurement utilizing Internet of Things (IoT) technology, combined with optimization techniques to enhance system efficiency and data accuracy. The proposed framework integrates a network of IoT sensors that continuously monitor various air pollutants, such as particulate matter (PM), carbon monoxide (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. (1 other version)The Czech Republic: From the Center of Christendom to the Most Atheist Nation of the 21st Century. Part 1. The Persecuted Church: The Clandestine Catholic Church (Ecclesia Silentii) in Czechoslovakia During Communism 1948-1991.Scott Vitkovic - 2023 - Occasional Papers on Religion in Eastern Europe (Opree) 43 (1):18 - 59.
    This research examines the most important historical, political, economic, social, cultural, and religious factors before, during, and after the reign of Communism in Czechoslovakia from 1918 to 2021 and their effect on the extreme increase in atheism and decrease in Christianity, particularly Roman Catholicism, in the present-day Czech Republic. It devotes special attention to the role of the Clandestine Catholic Church (Ecclesia Silentii) and the changing policies of the Holy See vis-à-vis this Church, examining these policies' impact on the continuing (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  35. Data-Driven HR Strategies: AI Applications in Workforce Agility and Decision Support.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):520-530.
    By embracing AI-driven HR analytics, organizations can anticipate market shifts, prepare their workforce for future challenges, and stay ahead of the competition. This study outlines the essential components of AI-driven HR analytics, demonstrates its impact on workforce agility, and concludes with potential future enhancements to further optimize HR functions. Key words: Predictive Workforce Analytics, Talent Optimization, Machine Learning in.
    Download  
     
    Export citation  
     
    Bookmark  
  36. Machine Learning for Optimized Attribute-Based Data Management in Secure Cloud Storage.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):434-450.
    Cloud storage's scalability, accessibility, and affordability have made it essential in the digital age. Data security and privacy remain a major issue due to the large volume of sensitive data kept on cloud services. Traditional encryption is safe but slows data recovery, especially for keyword searches. Secure, fine-grained access control and quick keyword searches over encrypted data are possible using attribute-based keyword search (ABKS). This study examines how ABKS might optimize search efficiency and data security (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. Artificial Intelligence in HR: Driving Agility and Data-Informed Decision-Making.Madhavan Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):506-515.
    In today’s rapidly evolving business landscape, organizations must continuously adapt to stay competitive. AI-driven human resource (HR) analytics has emerged as a strategic tool to enhance workforce agility and inform decision-making processes. By leveraging advanced algorithms, machine learning models, and predictive analytics, HR departments can transform vast data sets into actionable insights, driving talent management, employee engagement, and overall organizational efficiency. AI’s ability to analyze patterns, forecast trends, and offer data-driven recommendations empowers HR professionals to make proactive decisions (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  38. Intelligent Encryption and Attribute-Based Data Retrieval for Secure Cloud Storage Using Machine Learning.A. Manoj Prabaharan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):415-425.
    Cloud storage's scalability, accessibility, and affordability have made it essential in the digital age. Data security and privacy remain a major issue due to the large volume of sensitive data kept on cloud services. Traditional encryption is safe but slows data recovery, especially for keyword searches. Secure, fine-grained access control and quick keyword searches over encrypted data are possible using attribute-based keyword search (ABKS). This study examines how ABKS might optimize search efficiency and data security (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Social Implications of Big Data and Fog Computing.Jeremy Horne - 2018 - International Journal of Fog Computing 1 (2):50.
    In the last half century we have gone from storing data on 5-1/4 inch floppy diskettes to cloud and now fog computing. But one should ask why so much data is being collected. Part of the answer is simple in light of scientific projects but why is there so much data on us? Then, we ask about its “interface” through fog computing. Such questions prompt this chapter on the philosophy of big data and fog computing. After (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Analysis of the amount of latent carbon in the reconstruction of residential buildings with a multi-objective optimization approach.Nima Amani, Abdulamir Rezasoroush & Ehsan Kiaee - 2024 - International Journal of Energy Sector Management (Ijesm) 18 (6):2408-2434.
    Purpose: Due to the increase in energy demand and the effects of global warming, energy-efficient buildings have gained significant importance in the modern construction industry. To create a suitable framework with the aim of reducing energy consumption in the building sector, the external walls of a residential building were considered with two criteria of global warming potential and energy consumption. -/- Design/methodology/approach: In the first stage, to achieve a nearly zero-energy building, energy analysis was performed for 37 different states of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. SAR-BSO meta-heuristic hybridization for feature selection and classification using DBNover stream data.Dharani Talapula, Kiran Ravulakollu, Manoj Kumar & Adarsh Kumar - forthcoming - Artificial Intelligence Review.
    Advancements in cloud technologies have increased the infrastructural needs of data centers due to storage needs and processing of extensive dimensional data. Many service providers envisage anomaly detection criteria to guarantee availability to avoid breakdowns and complexities caused due to large-scale operations. The streaming log data generated is associated with multi-dimensional complexity and thus poses a considerable challenge to detect the anomalies or unusual occurrences in the data. In this research, a hybrid model is proposed that (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42.  87
    Efficient Cryptographic Methods for Secure Searchable Data in IoT Frameworks.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):409-415.
    As the Internet of Things (IoT) continues to expand, ensuring secure and efficient data storage and retrieval becomes a critical challenge. IoT devices, often constrained by limited computational resources, require lightweight encryption protocols that balance security and performance. This paper presents an optimized encryption protocol designed specifically for lightweight, searchable data in IoT environments. The proposed protocol utilizes advanced optimization techniques to enhance the efficiency and security of searchable encryption, enabling rapid data retrieval without compromising the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43.  95
    Automated Phishing Classification Model Utilizing Genetic Optimization and Dynamic Weighting Algorithms.M. Sheik Dawood - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):520-530.
    The classification system was evaluated using benchmark phishing datasets, and the results demonstrated a significant improvement in detection accuracy and reduced false positives. The proposed model outperformed traditional machine learning algorithms, showing promise for real-world deployment in phishing detection systems. We conclude with suggestions for future improvements, such as incorporating more behavioral data and deploying the system in realtime monitoring applications.
    Download  
     
    Export citation  
     
    Bookmark  
  44. Conceptual Spaces for Space Event Characterization via Hard and Soft Data Fusion.Jeremy R. Chapman, David Kasmier, David Limbaugh, Stephen R. Gagnon, John Crassidis, James Llinas, Barry Smith & Alexander P. Cox - 2021 - AIAA (American Institute of Aeronautics and Astronautics) Scitech 2021 Forum.
    The overall goal of the approach developed in this paper is to estimate the likelihood of a given kinetic kill scenario between hostile spacebased adversaries using the mathematical framework of Complex Conceptual Spaces Single Observation. Conceptual spaces are a cognitive model that provide a method for systematically and automatically mimicking human decision making. For accurate decisions to be made, the fusion of both hard and soft data into a single decision framework is required. This presents several challenges to this (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45.  34
    The Dataverse: A Universe Where Data is Fundamental.Headly Noel - manuscript
    The nature of reality has long been debated through the lenses of physics, philosophy, and consciousness studies. The Dataverse Hypothesis proposes a radical yet unifying perspective: data, rather than matter or energy, is the fundamental substance of the universe. In this framework, physical phenomena emerge as structured data interactions, with quantum mechanics, space-time, and entropy reinterpreted as computational processes rather than intrinsic material properties. This article explores the implications of a data-based universe, where consciousness arises from recursive (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. Britchenko Igor. University as a core of e-learning ecosystem/Polishchuk Y., Kornyliuk A., Britchenko I.//14th conference reader, Prague: Center for Higher Education Studies Location: Microsoft, Prague, CZECH REPUBLIC Date: JUN 20-21, 2019. – P. 309-319.Igor Britchenko, Polishchuk Yevhenia & Kornyliuk Anna - 2019 - In Igor Britchenko, Polishchuk Yevhenia & Kornyliuk Anna, 14th conference reader, Prague: Center for Higher Education Studies. Praga, Czechy: pp. 309-319.
    The concept and the main stakeholders of E-learning ecosystem are investigated at the article. University is regarded as a center of such ecosystem due to skilled knowledge providers and technical equipment availability. Studying different cases authors prove that higher educational institution plays a driver role in different projects, especially social start-up projects. Different models of partnership between universities and other stakeholders are considered. In authors’ opinion, one of the most perspective collaborative projects are in frame of “students – schoolchildren” (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. REVISITING THE HUMAN RESOURCE AND MANAGEMENT PROGRAM OF THE EARLY YEARS LEARNING CENTER IN MANDALUYONG CITY.Fe Jocelyn G. Dioquino, Albert S. Billones, Ana Katrina S. Caldeira, Melanie Carl T. Espe & Alfredo G. Sy Jr - 2023 - Get International Research Journal 1 (2).
    This study sought to investigate the Human Resource and Management (HRM) Program of a preschool hereinafter referred to as the Early Years Learning Center (EYLC) in Mandaluyong City for purposes of this research study. This is a qualitative case study that delved particularly into the issue of employee retention, especially of seasoned teachers and staff of the subject learning center. It used the interview method to generate an in-depth analysis as it revisited its HRM Program. To triangulate the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. Cloud-Based Secure Storage: A Framework for Efficient Encryption, Decryption, and Data Dispersion.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):427-434.
    The exponential growth of cloud storage has necessitated advanced security measures to protect sensitive data from unauthorized access. Traditional encryption methods provide a layer of security, but they often lack the robustness needed to address emerging threats. This paper introduces an optimized framework for secure cloud storage that integrates data encryption, decryption, and dispersion using cutting-edge optimization techniques. The proposed model enhances data security by first encrypting the data, then dispersing it across multiple cloud servers, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49.  99
    Enhanced Secure Cloud Storage: An Integrated Framework for Data Encryption and Distribution.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):416-427.
    Traditional encryption methods provide a layer of security, but they often lack the robustness needed to address emerging threats. This paper introduces an optimized framework for secure cloud storage that integrates data encryption, decryption, and dispersion using cutting-edge optimization techniques. The proposed model enhances data security by first encrypting the data, then dispersing it across multiple cloud servers, ensuring that no single server holds the complete dataset. Decryption occurs only when the dispersed data fragments are (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. OPTIMIZED ENCRYPTION PROTOCOL FOR LIGHTWEIGHT AND SEARCHABLE DATA IN IOT ENVIRONMENTS.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):408-414.
    As the Internet of Things (IoT) continues to expand, ensuring secure and efficient data storage and retrieval becomes a critical challenge. IoT devices, often constrained by limited computational resources, require lightweight encryption protocols that balance security and performance. This paper presents an optimized encryption protocol designed specifically for lightweight, searchable data in IoT environments. The proposed protocol utilizes advanced optimization techniques to enhance the efficiency and security of searchable encryption, enabling rapid data retrieval without compromising the (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 983