Results for 'Chaithanya Reddy'

94 found
Order:
  1.  19
    Decentralized Voting System using Blockchain.Kranthi Kiran Reddy, Gutha Vijay Kumar, Sai Sirimulla, Chandan Singh & Chaithanya Reddy - 2024 - International Journal of Scientific Research in Science, Engineering and Technology 11 (2).
    This article explores the use and impact of voting using blockchain technology. As a result of mounting worries about the honesty and security of conventional voting methods, especially in the digital era, the study tackles the requirement for an open, impenetrable, and robust method of conducting elections. A decentralized application on a blockchain platform is designed and implemented using the technique, which makes use of smart contracts for voter registration, ballot generation, and vote counting. The viability of blockchain technology in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2.  97
    Revolutionizing Healthcare: Spatial Computing Meets Generative AI.Sankara Reddy Thamma Sankara Reddy Thamma - 2024 - International Journal of Scientific Research in Science, Engineering and Technology 11 (5):324-336.
    The health industry is experiencing change, the newest forerunner of which is being propelled by spatial computing and generative AI. Spatial computing simply refers to the ability to interface with physical space through computation and digital devices; on the other hand, generative AI means using advanced machine learning to generate new output. This paper examines the roles and the combined possibilities of these two technologies with the view of transforming health care and diagnostics in the field of patient care. Precision (...)
    Download  
     
    Export citation  
     
    Bookmark   34 citations  
  3. Transforming E-Commerce with Pragmatic Advertising Using Machine Learning Techniques.Sankara Reddy Thamma Sankara Reddy Thamma - 2025 - International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11 (1):394-404.
    Today e-commerce has had tremendous growth in the past years primarily due to changes in technology and customer’s buying behavior. One of the big shifts in the process has been the use of ML in advertising which has the capability to transform the marketing domain together with consumer interactions. This paper discusses the viability of using machine learning for designing realistic models of advertising to increase effectiveness of target and personalized advertising, as well as conversion rates in e-commerce. Several techniques (...)
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  4.  78
    Generative AI in Graph-Based Spatial Computing: Techniques and Use Cases.Sankara Reddy Thamma Sankara Reddy Thamma - 2024 - International Journal of Scientific Research in Science and Technology 11 (2):1012-1023.
    Generative AI has proven itself as an efficient innovation in many fields including writing and even analyzing data. For spatial computing, it provides a potential solution for solving such issues related to data manipulation and analysis within the spatial computing domain. This paper aims to discuss the probabilities of applying generative AI to graph-based spatial computing; to describe new approaches in detail; to shed light on their use cases; and to demonstrate the value that they add. This technique thus incorporates (...)
    Download  
     
    Export citation  
     
    Bookmark   33 citations  
  5. Widening Access to Applied Machine Learning With TinyML.Vijay Reddi, Brian Plancher, Susan Kennedy, Laurence Moroney, Pete Warden, Lara Suzuki, Anant Agarwal, Colby Banbury, Massimo Banzi, Matthew Bennett, Benjamin Brown, Sharad Chitlangia, Radhika Ghosal, Sarah Grafman, Rupert Jaeger, Srivatsan Krishnan, Maximilian Lam, Daniel Leiker, Cara Mann, Mark Mazumder, Dominic Pajak, Dhilan Ramaprasad, J. Evan Smith, Matthew Stewart & Dustin Tingley - 2022 - Harvard Data Science Review 4 (1).
    Broadening access to both computational and educational resources is crit- ical to diffusing machine learning (ML) innovation. However, today, most ML resources and experts are siloed in a few countries and organizations. In this article, we describe our pedagogical approach to increasing access to applied ML through a massive open online course (MOOC) on Tiny Machine Learning (TinyML). We suggest that TinyML, applied ML on resource-constrained embedded devices, is an attractive means to widen access because TinyML leverages low-cost and globally (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6.  38
    Serverless at Scale: Evaluating AWS Lambda Cost and Latency Under Varying Loads.Munisif Bharathvamsi Reddy - 2023 - International Journal of Innovative Research in Science, Engineering and Technology 12 (2):748-755.
    : Serverless computing has revolutionized the way modern cloud-native applications are developed and deployed, offering a paradigm in which developers can focus solely on writing code without the burden of managing infrastructure. Among the various Function-as-a-Service (FaaS) offerings, AWS Lambda stands out as a widely adopted platform due to its automatic scaling, event-driven execution, and pay-per-use pricing model—making it ideal for applications ranging from microservices to complex event-driven workflows. However, serverless architectures present challenges in cold start latency, performance tuning, and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. Subjective Science of the Absolute & Perceptual Realities.Jumpal Shashi Kiran Reddy & Contzen Pereira - manuscript
    How do we know what we know? • How do we perceive ourselves and the world around? • Is what we perceive the only reality that exists? (or) • Is there a different reality other than what we perceive? (Not referring to the source of C, but to the CoC, in the very limit of our physical structure).
    Download  
     
    Export citation  
     
    Bookmark  
  8. Optimization of Generative AI Costs in Multi-Agent and Multi-Cloud Systems.Sankara Reddy Thamma Sankara Reddy Thamma - 2024 - International Journal of Scientific Research in Science and Technology 11 (6):953-965.
    The generative AI system is being adopted across the several fields to provide novel solutions for text generation, image synthesis, and decision-making. But when they are used in multi-agent and multi-cloud systems, they are expensive in terms of computation and finance. Regarding the aforementioned factors, this paper aims to examine methods of reducing such costs while achieving system efficiency. Such measures as dynamic workload distribution, resource scaling, as well as cost-conscious model selection is described. Through the examples of case studies (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9.  98
    Cardiovascular image analysis: AI can analyze heart images to assess cardiovascular health and identify potential risks.Sankara Reddy Thamma - 2024 - International Journal of Science and Research Archive 12 (2):2969 - 2976.
    CVDs continue to be the number one cause of death, therefore early detection and treatment is crucial. Currently, the application of Artificial Intelligence (AI) in the cardiac image analysis has become popular due to increased accuracy, productivity, and modelling. In this paper, the use of the AI system to study the echocardiogram, CT, MRI, and other images of the heart and blood vessels to view the risk factors for cardiovascular diseases is discussed. We focus on the current methods of artificial (...)
    Download  
     
    Export citation  
     
    Bookmark   35 citations  
  10.  32
    Analysis of Time-Sensitive Networking (TSN) over 5G networks.Chaithanya B. Nirmaladevi A. C. - 2025 - International Journal of Innovative Research in Computer and Communication Engineering 13 (5):9954-9963.
    Many emerging applications require a higher level of flexibility, modularity, and efficiency but are dependent on advancements in communication infrastructure and distributed computing. Time-sensitive networking (TSN) standards aim at providing vendor agnostic, reliable, and deterministic communications over the Ethernet, but lack in flexibility and modularity provisions. In this context wireless communication systems are preferred given the obvious benefits in terms of increased flexibility, reduced deployment & maintenance costs, and inherent mobility support. However, the stochastic nature of the wireless medium poses (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11.  99
    Future Proofing Insurance Operations: A Guidewire-Centric Approach to Cloud, Cybersecurity, and Generative AI.Adavelli Sateesh Reddy - 2023 - International Journal of Computer Science and Information Technology Research 4 (2):29-52.
    By integration with cloud computing, cybersecurity and generative AI, the insurance industry is being transformed from high efficiency, low cost, and better customer service. However, these advanced technologies can also be used by insurers to automate and streamline processes like claims handling, underwriting, and policy generation, which are majorly time consuming and error prone. In predictive analytics, fraud detection, and personalized customer experience, generative AI makes it possible for insurers to mitigate risks and, at the same time, provide more personalized (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12.  87
    Zero-Day Threat Protection: Advanced Cybersecurity Measures for Cloud-Based Guidewire Implementations.Adavelli Sateesh Reddy - 2023 - International Journal of Science and Research (IJSR) 12 (9):2219-2231.
    The contribution of this paper is a comprehensive cybersecurity framework to secure cloud hosted Guidewire implementations by addressing critical security challenges such as threat detection, incident response, compliance, and system performance. Based on advanced technologies like machine learning, behavioral analytics and auto patching, the framework detects and mitigates known and unknown threats, incidentally zero-day exploit. The system does this through micro segmenting, behavioral anomaly detection, and automated patch orchestration in a way that does not render the system unperforming. Key performance (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13.  77
    Cybersecurity Frameworks in Guidewire Environments: Building Resilience in the Face of Evolving Threats.Ravi Teja Madhala Sateesh Reddy Adavelli - 2021 - International Journal of Innovative Research in Science, Engineering and Technology 10 (8):12040-12049.
    The digitization process has brought new opportunities in insurance industry operations and innovations but has also revealed major weaknesses. Since more and more actual insurers use Guidewire to handle claims, policies, and customer data, insurers become targets for cyber threats that target valuable information. The framework of Guidewire, along with cloud computing integrated API and third-party tools, is laden with numerous exposure points. These security gaps are utilized to execute phishing, spread malware and gain unauthorized access to customers and operational (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14.  65
    Harnessing Guidewire Claim Center for Optimized Claim Management: A Blueprint for Efficiency and Customer Satisfaction.Ravi Teja Madhala Sateesh Reddy Adavelli - 2019 - International Journal of Innovative Research in Science, Engineering and Technology 8 (11):11466-11479.
    In today’s fast moving insurance environment, efficient claim management is a vital business practice to improve operational effectiveness and provide an exceptional customer experience. Based on the first notice of loss (FNOL), Guidewire Claim Center, the leading claims management platform, gives insurers the thorough, scalable, and customizable option to accelerate the claims process from FNOL to final resolution. In this paper, we explore how insurers adapt Guidewire Claim Center to enable effective utilization of Guidewire Claim Center to optimize and transform (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. Origin of Life: A Consequence of Cosmic Energy, Redox Homeostasis and Quantum Phenomenon.Contzen Pereira & J. Shashi Kiran Reddy - unknown
    Origin of life on earth transpired once and from then on, it emerges as an endless eternal process. Matter and energy are constants of the cosmos and the hypothesis is that the origin of life is a moment when these constants intertwined or interacted. Energy from the cosmos interacted with inorganic matter to support matter with retention of this riveted energy, as energy to be circulated within the primitive channelized structures to conserve energy by the materialization of the proton homeostasis (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  16.  60
    The Art of Machine Learning: Understanding Generative AI.Seshu Kotha Vishwajeet Raut, Devangam Sai Chaithanya, Kallupalli Lakshmi Narayana - 2025 - International Journal of Multidisciplinary and Scientific Emerging Research 13 (2):854-857.
    Generative Artificial Intelligence (AI) is rapidly emerging as one of the most innovative and transformative technologies in the field of machine learning. Unlike traditional AI, which focuses on classification and prediction tasks, generative AI is designed to create new, original content, such as images, music, text, and even software code. This paper delves into the foundational concepts of generative AI, highlighting its core models, including Generative Adversarial Networks (GANs), Variational Autoencoders (VAEs), and Transformer models. We explore the applications of generative (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17.  76
    Home Depot Breach or The Rise of Ransomware.Vaka Pavan Reddy - 2014 - Neuroquantology 12 (4):485-491.
    The Home Depot data breach, which occurred in 2014, marked a significant turning point in the cybersecurity landscape, drawing attention to the increasing prevalence of ransomware and cyberattacks targeting large-scale retail organizations. This breach exposed the personal and financial information of over 56 million customers and highlighted the vulnerabilities in the systems used by major corporations. The attack was attributed to a sophisticated ransomware operation that gained access through a third-party vendor’s compromised credentials, ultimately enabling cybercriminals to infiltrate Home Depot’s (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  18. Multimodal Gen AI: Integrating Text, Image, and Video Analysis for Comprehensive Claims Assessment.Adavelli Sateesh Reddy - 2024 - Esp International Journal of Advancements in Computational Technology 2 (2):133-141.
    The increase in claim sophistication in both the insurance and legal domains is a result of an increase in stokes and heterogeneity of data needed to assess the claim validity. Originally, this task was performed by some sort of subjectivity assessments and graphical rule sets, which is very slow and may be inherently erroneous due to its purely manual nature. Hence, with progressivity in multimodal learning, specifically in AI, there is now a unique chance of solving these challenges through the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. Beyond the Claims: Emerging AI Models and Predictive Analytics in Property & Casualty Insurance Risk Assessment.Adavelli Sateesh Reddy - 2024 - International Journal of Science and Research 13 (7):1625-1631.
    P&C insurers have an important role in addressing financial risk management needs but now struggle to respond to the new forms of risk. Historical analysis and actuarial calculations, which form the backbone of classical approaches to risk measurement and management, are not well suited to such new kinds of risks as climate change, cyber risks, and business cycle risks. These conventional approaches are also a static method for selling, which has limited potential in changing quickly with new market and consumer (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20.  89
    Excel to Cloud: Migrating Legacy Trader Tools to Scalable Java & Python Applications.Munisif Bharathvamsi Reddy - 2025 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 8 (3):3876-3882.
    Many trading desks across the financial industry still rely heavily on Excel-based tools for pricing, risk assessment, and reporting workflows. While these spreadsheets offer flexibility and familiarity, they present challenges in scalability, collaboration, version control, and integration with modern trading infrastructure. This paper presents a cloud-native migration framework that transforms trader-centric Excel tools into robust, scalable applications using Java and Python. The framework incorporates modular microservices, RESTful APIs, AWS services, and real-time data processing. It also addresses migration challenges such as (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. Generative AI in Digital Insurance: Redefining Customer Experience, Fraud Detection, and Risk Management.Adavelli Sateesh Reddy - 2024 - International Journal of Computer Science and Information Technology Research 5 (2):41-60.
    This abstract summarizes, in essence, what generative AI means to the insurance industry. The kind of promise generated AI offers to insurance is huge: in risk assessment, customer experience, and operational efficiency. Natural disaster impact, financial market volatility, and cyber threat are augmented with techniques of real time scenario generation and modeling as well as predictive simulation based on synthetic data. One of the challenges that stand in the way of deploying these AI methods, however, is data privacy, model reliability (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22.  63
    Enhanced Steganography using Dynamic Compression and Encryption Algorithms.P. Shashank Reddy - 2025 - Ernational Journal of Engineering Innovations and Management Strategies 1 (3):1-13.
    Traditional steganography systems suffer from outdated compression and encryption methods, leading to large key sizes, high computational complexity, and increased vulnerability to steganalysis attacks. These limitations make conventional steganography inefficient and less secure. Additionally, advancements in AI-driven image analysis have made image steganography increasingly ineffective, as modern algorithms can easily detect hidden data within images. In contrast, audio steganography remains an underexplored field with significant potential, though existing solutions are often underdeveloped and lack robust security measures. To address these challenges, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23.  62
    Digital Platform for Advanced Parking Spot Booking and Management.K. Sathiyapriya Rohith Reddy, Viswanadh, Aravind, Abhiram - 2025 - International Journal of Innovative Research in Science Engineering and Technology 14 (4):9239-9244.
    The proposed project is a smart parking reservation system that offers clients an easy way to reserve a parking space online. It overcomes the problem of Finding a parking area in industrial or commercial areas that is useful consumes time. As a result, this challenge provides an internet-based reservation machine where customers can view numerous parking regions and select the space to view whether an area is to be had or not. If the reserved space is available, he can book (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. Autonomous Claims Processing: Building Self-Driving Workflows with Gen AI and ML in Guidewire.Adavelli Sateesh Reddy - 2024 - International Journal of Science and Research 13 (12):1348-1357.
    Generative artificial intelligence (Gen AI) and machine learning (ML) technologies are changing the way the insurance industry looks, particularly by integrating Gen AI & ML technologies. As a leading platform for property and casualty insurance, Guidewire provides a perfect platform for deploying intelligent claims processing workflows that can dramatically improve efficiency, accuracy and customer satisfaction. The seamless integration of Gen AI and ML capabilities into Guidewire to autonomously process claims is explored in this paper. Insurers can use advanced models to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25.  59
    Synthetic Data Pipelines for Training AI Models in Data-Scarce Domains.Agarampalli Danish Reddy - 2025 - International Journal of Innovative Research in Science, Engineering and Technology (Ijirset) 14 (4):5437-5443.
    The success of AI models largely depends on the availability of large and high-quality datasets. However, in many real-world scenarios—such as medical diagnostics, remote sensing, or low-resource languages— gathering such data is difficult or even impossible due to privacy, cost, or scarcity. Synthetic data offers a compelling alternative. This paper proposes a comprehensive synthetic data pipeline tailored for data-scarce domains. It includes domain understanding, synthetic data generation using simulation, generative models (e.g., GANs, diffusion models), data augmentation, validation, and integration with (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Zero-Day Vulnerabilities.Vaka Pavan Reddy - 2012 - International Journal of Innovative Research in Science, Engineering and Technology 1 (2):318-322.
    Zero-day vulnerabilities are critical security risks that exploit previously unknown flaws in software systems, making them difficult to detect and defend against. As such vulnerabilities are discovered by attackers before the software vendor is aware of them, they provide a significant advantage to malicious entities. The exploitation of zero-day vulnerabilities is a major concern for both individuals and organizations, as it can lead to unauthorized data access, loss of information, and compromised systems. This paper aims to explore the nature of (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  27. Overcoming the Legacy of Mistrust: African Americans’ Mistrust of Medical Profession.Marvin J. H. Lee, Kruthika Reddy, Junad Chowdhury, Nishant Kumar, Peter A. Clark, Papa Ndao, Stacey J. Suh & Sarah Song - 2018 - Journal of Healthcare Ethics and Administration 4 (1):16-40.
    Recent studies show that racism still exists in the American medical profession, the fact of which legitimizes the historically long-legacy of mistrust towards medical profession and health authorities among African Americans. Thus, it was suspected that the participation of black patients in end-of-life care has always been significantly low stemmed primarily from their mistrust of the medical profession. On the other hand, much research finds that there are other reasons than the mistrust which makes African Americans feel reluctant to the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  28.  91
    Optimized Semantic Abstraction for HighPrecision Text Summarization in NLP Systems.Prof Ranjitha U. N. P. Babu Reddy, Y. Veeranaganjineya Reddy, N. Yogesh Naidu - 2025 - International Journal of Innovative Research in Science Engineering and Technology 14 (4).
    The project offers a text summarization tool that can handle content from PDFs, DOCX, and plain text. It incorporates extractive and abstractive summarization methods for creating abridged summaries. The extractive method applies sentence tokenization in the selection of important sentences, whereas the abstractive method utilizes a pre-trained Hugging Face model. The tool also has a Streamlit-based user interface for handling multiple file uploads and direct input of text. Strong error handling and text cleansing improve dependability and summarization accuracy, so the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. The Boy Who Grew a New Brain: Understanding this Miracle from a Neuro-Quantum Perspective.Contzen Pereira & Jumpal Shashi Kiran Reddy - 2018 - Neuroquantology 16 (7):39-48.
    In this paper, we present a case of a boy – Noah Wall, who till today surprises the world of neuroscience with his will to grow his brain and survive. The case presented in this study sets a stepping stone in understanding the advent of the will to make a choice, from a neuro-quantum mechanics interpretation. We propose that besides our internal states of choices (neurogenesis, neuroplasticity, cell differentiation, etc.) we also relate with external states of choices (love, compassion, empathy, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30.  50
    Dynamic Intrusion Detection Systems Powered by Machine Learning Algorithms.Sandeep Belidhe Ashish Reddy Kumbham - 2024 - International Journal of Innovative Research in Science, Engineering and Technology (Ijirset) 13 (6):12405-12411.
    This remains the case because cyberattacks are becoming more frequent and sophisticated, and as a result, the IDS must also be innovative and evolving to protect sensitive networks. Traditional intrusion detection techniques are replaced by more advanced and dynamic Methodologies based on Machine Learning (ML) algorithms. These dynamic systems capture significant data flows, search for potentially pathological patterns, and forecast threats in real time. By simulating and analyzing real-time cases, this paper discusses the architecture for ML-based IDS, how this function (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31.  43
    Real-Time Trader Input Validation Systems Using Low-Latency Java APIs and AWS Kinesis.Munisif Bharathvamsi Reddy - 2024 - International Journal of Innovative Research in Science Engineering and Technology 13 (9):16906-16912.
    Accurate and timely validation of trade inputs is critical in high-frequency commodity and financial trading environments. Manual or delayed validation can result in erroneous trades, compliance risks, and operational inefficiencies. This paper presents a real-time input validation system for traders, implemented using low-latency Java APIs and AWS Kinesis. The system ensures that inputs are checked against business rules and market constraints in milliseconds before proceeding to execution workflows. Our architecture leverages AWS Kinesis for high-throughput data streaming, Java-based microservices for synchronous (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. Securing the Internet of Things: A Study on Machine Learning-Based Solutions for IoT Security and Privacy Challenges.Aziz Ullah Karimy & P. Chandrasekhar Reddy - 2023 - Zkg International 8 (2):30-65.
    The Internet of Things (IoT) is a rapidly growing technology that connects and integrates billions of smart devices, generating vast volumes of data and impacting various aspects of daily life and industrial systems. However, the inherent characteristics of IoT devices, including limited battery life, universal connectivity, resource-constrained design, and mobility, make them highly vulnerable to cybersecurity attacks, which are increasing at an alarming rate. As a result, IoT security and privacy have gained significant research attention, with a particular focus on (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33.  36
    PostgreSQL Performance in Serverless Event Driven Architectures: An AWS-Based Case Study.Munisif Bharathvamsi Reddy - 2024 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 7 (4):5107-5114.
    PostgreSQL has established itself as a powerful and feature-rich open-source relational database management system, increasingly adopted in modern cloud-native applications. As organizations transition to serverless computing for scalability and operational efficiency, integrating traditional stateful systems like PostgreSQL within stateless, event-driven workflows poses unique performance and architectural challenges. This research investigates the performance characteristics of PostgreSQL in such environments by leveraging key AWS services, including AWS Lambda and Amazon S3, to orchestrate serverless data pipelines. The study simulates a range of real-world (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Building Resilient Digital Insurance Ecosystems: Guidewire, Cloud, And Cybersecurity Strategies.Adavelli Sateesh Reddy - 2022 - Esp Journal of Engineering and Technology Advancements 2 (3):140-153.
    Through a combination of Guidewire platforms, cloud computing and cybersecurity frameworks, the insurance industry in miniature is being transformed into a digitally transformed, ever resilient ecosystem. This ecosystem enables insurers to modernize core operations of policy management, claims processing and billing while continuing to provide secure, scalable and efficient service delivery. Insurers using cloud infrastructure have elastic resources capable of scaling to meet dynamic workloads and can provide high availability and fast disaster recovery. They have liberated data analytics to run (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. Digital Transformation in Insurance: How Guidewire, AWS, and Snowflake Converge for Future-Ready Solutions.Adavelli Sateesh Reddy - 2022 - International Journal of Computer Science and Information Technology Research 3 (1):95-114.
    The digital transformation of the insurance industry is unprecedented, urged by the changing expectations of customers, the necessity to embrace regulatory requirements and the necessity to enhance operational efficiency. This paper examines the convergence of three leading-edge technologies, Guidewire, Amazon Web Services (AWS) and Snowflake, to enable scalable, resilient and data-driven solutions for insurers. AWS and Snowflake provide unmatched cloud infrastructure in terms of security and scalability. They also provide industry-specific applications and frameworks for modernizing core systems for Guidewire, such (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Multi-Cloud Data Resilience: Implementing Cross-Platform Data Strategies with Snowflake for P&C Insurance Operations.Adavelli Sateesh Reddy - 2023 - International Journal of Science and Research 12 (1):1387-1398.
    Property and Casualty (P&C) insurers are adopting multi-cloud environments as a strategic imperative because of their increasing data volumes and complexities in regulatory compliance, customer expectations and technological advancements. This paper discusses how Snowflake’s cloud-agnostic, unified platform enables insurers to create resilient, efficient, and compliant multi cloud data strategies. Using Snowflake’s elastic scalability, real-time analytics, secure data sharing and seamless cloud interoperability, insurers can optimize claims processing, augment fraud detection, and support customer engagement. The study offers core design principles for (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37.  93
    Digital Privacy in P&C Claims Processing: Balancing Innovation with Regulatory Requirements.Ravi Teja Madhala Sateesh Reddy Adavelli - 2021 - International Journal of Science and Research 10 (3):2042-2053.
    This paper examines the challenges and lessons learned for Property and Casualty (P&C) insurers as they look to balance technological innovation against regulatory compliance, specifically regarding privacy laws. These technologies have been adopted rapidly, from Artificial Intelligence (AI), blockchain, and the Internet of Things (IoT), to transform how claims are processed, resulting in efficiencies, improved fraud detection and increased customer-centeredness. While these advancements have brought much to the table, they hold great fear regarding the data privacy, security, and compliance involved. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38.  81
    Policy Center to the Cloud: An Analysis of AWS and Snowflake’s Role in Cloud-Based Policy Management Solutions.Adavelli Sateesh Reddy - 2021 - Esp Journal of Engineering and Technology Advancements 1 (1):253-261.
    Organizations are migrating their policy management systems from the ground to the cloud, changing how they manage, secure and scale their operations. This paper analyses how Amazon Web Services (AWS) and Snowflake support robust and efficient cloud-based policy management solutions. This marriage of sort of AWS, which has an almost panoply of cloud services, and Snowflake, which is very well known for its data warehousing and analytics capabilities, makes sense because it is an enterprise in which you will want to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39.  77
    AI and Cloud Synergy in Insurance: AWS, Snowflake, and Guidewire’s Role in Data- Driven Transformation.Adavelli Sateesh Reddy - 2023 - International Journal of Innovative Research in Science, Engineering and Technology 12 (6):9069-9080.
    As the integration of Artificial Intelligence (AI) and cloud computing transforms the insurance industry, it is undergoing a major breakthrough. With these technologies, insurers can modernize operations, improve the customer experience and make better decisions using real time data and predictive analytics. This paper aims to explore why AI and cloud play such critical roles in shifting insurance practice from legacy systems modernization, to data governance and regulatory compliance to workforce readiness. Today, world-class AI powered tools and cloud platforms such (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Adaptive Cybersecurity in the Digital Age: Emerging Threat Vectors and Next-Generation Defense Strategies.Harish Kumar Reddy Kommera - 2024 - International Journal for Research in Applied Science and Engineering Technology (Ijraset) 12 (9):558-564.
    This article examines the rapidly evolving landscape of cybersecurity, focusing on emerging threats and innovative defense mechanisms. We analyze four key threat vectors: Advanced Persistent Threats (APTs), ransomware, Internet of Things (IoT) vulnerabilities, and social engineering attacks. These threats pose significant risks to organizations, including data breaches, financial losses, and operational disruptions. In response, we explore cutting-edge defense mechanisms such as Artificial Intelligence and Machine Learning for threat detection, Zero Trust Architecture for access control, blockchain for data integrity, behavioral analytics (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  41.  32
    Machine Learning Approach for Detection of Financial Fraud Using Value at Risk.Kuppili Yasoda Krishna Bandaru Harika Hasini, Jayanthi Venkata Satya Sai Suresh Kumar, Yanagala Gowthami, Akkisetty Akash Chaithanya, Gantyada Prasanth - 2025 - International Journal of Innovative Research in Science Engineering and Technology 14 (4).
    As more people utilise online banking services, the large losses that banks and other financial institutions sustained because of new bank account (NBA) fraud are concerning. Machine learning (ML) models have faced significant challenges because to the intrinsic skewness and rarity of NBA fraud cases. This occurs when the number of non-fraud instances exceeds the number of fraud instances, causing the ML models to miss and mistakenly regard fraud as non-fraud instances. Customers' confidence and trust may be damaged by such (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Unpacking Bias in AI: Ethical Considerations for Responsible AI Development.Ravi Teja Reddy Suresh Babu, Madhusudhan Reddy - 2024 - International Journal of Multidisciplinary Research in Science, Engineering, Technology and Management 11 (2).
    As artificial intelligence (AI) systems become increasingly integrated into decision-making processes across critical domains—such as healthcare, finance, criminal justice, and employment—questions surrounding their trustworthiness, ethical implications, and potential for bias have taken center stage. While AI promises enhanced efficiency, accuracy, and scalability, it also poses significant risks if ethical considerations are overlooked or if systems are developed and deployed without sufficient transparency and accountability. This paper explores the complex landscape of ethics and bias in AI, examining how biases—both implicit and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43.  34
    Deep Learning in Oncology: CNN based Lung Cancer Detection using CT Images.Pathireddy Maheshwar Reddy MsB. N. Swarna Jyothi, - 2025 - International Journal of Innovative Research in Science Engineering and Technology 14 (4).
    The proposed system leverages Convolutional Neural Network (CNN) technologies to perform early lung cancer detection through the analysis of chest CT scan images. Designed as an AI-powered diagnostic aid, the system operates independently of human interpretation, enhancing speed and reliability in medical imaging evaluation. Built using Python-based technologies, the system utilizes TensorFlow and Keras frameworks for deep learning model development and training, supported by OpenCV for image pre-processing and visualization. The system processes CT scan slices to identify pulmonary nodules and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44.  32
    Enhanced Communication through Hand Gesture Recognition and Speech Recognition.Dongala Anusha Reddy P. Abirami, Bollepalli Triveni - 2025 - International Journal of Innovative Research in Science Engineering and Technology 14 (4):9273-9279.
    Hand gesture recognition and speech recognition system is an innovative solution that translates hand gestures and spoken language into readable text in real-time, facilitating seamless communication for individuals with speech or hearing impairments. By leveraging advanced computer vision techniques, including OpenCV and Media Pipe for hand landmark detection and tracking, and TensorFlow-based machine learning models for precise gesture classification, the system enables effortless communication. Additionally, its integrated speech-to-text functionality allows for the transcription of spoken words, catering to diverse user needs (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45.  49
    Streamlining HCM Processes with Cloud Architecture.Harish Kumar Reddy Kommera - 2020 - Turkish Journal of Computer and Mathematics Education (TURCOMAT) 11 (2):1323-1338.
    The integration of cloud architecture into Human Capital Management (HCM) systems has revolutionized the way organizations manage their workforce. Cloud-based HCM solutions offer enhanced scalability, flexibility, and accessibility, enabling organizations to streamline HR processes, improve data management, and foster greater employee engagement. This paper explores the impact of cloud architecture on HCM processes, highlighting key benefits such as cost-effectiveness, real-time data access, and seamless integration with other business systems. Through a comprehensive literature review and analysis of case studies from diverse (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  46.  90
    Natural Language Processing (NLP) and Understanding.Reddy Priya Sunita - 2025 - International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering (Ijareeie) 14 (2):484-490.
    Natural Language Processing (NLP) is a crucial area within artificial intelligence (AI) that focuses on the interaction between computers and human language. By enabling machines to process and understand human language, NLP bridges the gap between computers and human communication. The aim of this paper is to explore key concepts and methodologies in NLP, including text analysis, language modeling, and machine learning techniques. We also discuss challenges faced in NLP such as ambiguity, contextual understanding, and the evolution of language. This (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47.  87
    Novel Approach to Validate the Content Generated by LLM.S. Dhanush G. Rajeshwar Reddy, K. Jayanth Naidu, C. Harsha Vardhan Reddy - 2025 - International Journal of Innovative Research in Science Engineering and Technology 14 (4).
    The unprecedented growth of Large Language Models (LLMs) has transformed text generation, but maintaining the validity and dependability of their output is a still an unresolved problem. This article presents an overall framework for validating LLM output using a hybrid methodology that unites automated testing and human auditing. The approach uses fact-checking tools, semantic coherence tests, and source-based authentication to rigorously examine the accuracy, coherence, and factuality of generated output. Through the incorporation of these methods, the framework solves major shortcomings (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48.  80
    Spammer Detection and Fake user Identification on Social Networks.K. Samanth Kumar M. Saketh Reddy, K. Manoj Sagar, R. Saketh, S. Saketh, CHSakshitha - 2025 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 8 (4):6267-6271.
    With the exponential growth of online social networks, now boasting over 4 billion active users, maintaining data integrity and ensuring user security has become increasingly challenging. Social media platforms face numerous security threats, including the creation of fake profiles by malicious users seeking to steal sensitive information, spread misinformation, or engage in fraudulent activities. Due to the anonymity afforded by these platforms, detecting such deceptive accounts manually is both difficult and inefficient. This project focuses on the detection of fake profiles (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49.  70
    Zero Trust in Cloud Environments: Enhancing Security in the Modern Era.Saddikuti Ajay Kumar Reddy Jampana Manoj Kumar Reddy, Mallisetty Sharavan Santosh - 2025 - International Journal of Multidisciplinary and Scientific Emerging Research 13 (2):861-863.
    Zero Trust (ZT) is a security model that assumes no entity, whether inside or outside the network, is trusted by default. As organizations increasingly migrate their infrastructure to the cloud, traditional perimeter-based security models prove ineffective in protecting against advanced threats. This paper explores the implementation of Zero Trust in cloud environments and its impact on enhancing security in the modern era. By focusing on identity management, network segmentation, and continuous verification, the study highlights the key principles of Zero Trust (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50.  48
    A Mathematical Framework for the Emergence of Life: Revisiting Fundamental Constants and Numerical Harmony.Likhith Reddy Kaliki - manuscript
    The emergence of life is commonly approached from a probabilistic and biochemical perspective. However, this paper presents an alternative hypothesis: that the origin of life may be governed not solely by random chance, but by an underlying mathematical structure embedded within fundamental constants and natural proportions. This study explores the correlation between the golden ratio (φ ≈ 1.618), perfect numbers such as 6 and 28, and the gravitational acceleration constant on Earth (g ≈ 9.8 m/s²). Notably, 6 × φ yields (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 94