Results for 'Chadalavada Jaswanth'

4 found
Order:
  1.  28
    Mitigating Zero Trust Implementation Challenges in Enterprise Network Security: A 2020 Perspective.Chadalavada Jaswanth - 2021 - International Journal of Advanced Research in Education and Technology 8 (1):453-456.
    With the rise of remote work and cloud-first strategies in 2020, the traditional perimeter-based security model became increasingly obsolete. Zero Trust Architecture (ZTA), which emphasizes “never trust, always verify,” emerged as a strategic framework to mitigate evolving cybersecurity threats, especially those exacerbated by the COVID-19 pandemic. Despite its theoretical robustness, implementing Zero Trust in enterprise environments revealed several technical and organizational roadblocks, including identity-centric access control, network segmentation, legacy system compatibility, and the scalability of real-time monitoring. This paper evaluates the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2.  46
    Ontology Driven Autonomous Machine Learning Framework.Kotharu Lalitha Lakshmi Sindhu Priyanka Chadalavada - 2025 - International Journal of Advanced Research in Education and Technology 12 (2):650-656.
    Artificial intelligence technology that recognizes, learns, infers, and responds to external stimuli has recently attracted a lot of research interest. Information in a variety of domains by fusing big data, machine learning algorithms, and computing technologies. Nowadays, practically every industry uses artificial intelligence technology, and a large number of machine learning specialists are attempting to standardize and integrate different machine learning tools so that non-experts can use them with ease in their field. In order to standardize the concepts of machine (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3.  37
    SmartCrypt: Enhancing Security for Storing and Sharing Time-Series Data in IIoT.Narra Pujitha Sindhu Priyanka Chadalavada - 2025 - International Journal of Advanced Research in Education and Technology 12 (2):678-686.
    To ensure widespread access, scalability, and sharing capabilities, applications of the Industrial Internet of Things (IIoT) leverage the cloud for storing the data streams they collect. However, the secure storage and sharing of the vast amounts of continuously generated data present significant privacy challenges, including the risk of data breaches. This paper introduces SmartCrypt, a system designed for secure data storage and sharing that facilitates analytics on encrypted time series data. SmartCrypt allows users to securely and selectively share their encrypted (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4.  22
    IoT Based Peatland Ground Level Water Management Using Machine Learning Model.P. V. Suneetha Vysyaraju Amruthakshaya, Vasamsetty Venkata Sai Kushank, Kommoju Jaswanth Kumar, Garuda Sai Padma, Valle Gopichand, Mantri Sai Mohan - 2025 - International Journal of Innovative Research in Science Engineering and Technology 14 (4).
    The potential for enormous carbon emissions after fires makes peatlands a serious environmental hazard. Effective management is hampered by the labour intensive and real-time data-poor nature of conventional ground water level (GWL) monitoring in peatlands. issue study addressed issue by proposing an IoT system for real-time monitoring that uses neural network-based GWL prediction. The neural network forecasts GWL based on meteorological factors, giving the responsible party more time to take the necessary steps to lower the danger of fire in peatlands. (...)
    Download  
     
    Export citation  
     
    Bookmark