Results for 'Cloud Computing, Space Exploration, Remote Operations, Data Storage, Data Processing, Satellites, Space Stations, Space Missions, Latency, Interplanetary Missions.'

979 found
Order:
  1.  5
    Cloud Computing for Space Exploration: Enabling Data-Intensive Research and Remote Operations Beyond Earth.Hirulkar Sakshi R. - 2025 - International Journal of Multidisciplinary Research in Science, Engineering and Technology (Ijmrset) 8 (1):371-376.
    As space exploration advances, the need for innovative technologies to handle the ever-growing data and facilitate remote operations beyond Earth becomes critical. Cloud computing is emerging as a transformative force in space missions, enabling data-intensive research, remote collaboration, and the management of large datasets from space missions. This paper explores the role of cloud computing in space exploration, focusing on its potential to support the growing complexity of space missions, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2.  5
    Edge-Cloud Convergence: Architecting Hybrid Systems for Real-Time Data Processing and Latency Optimization.Dutta Shaunot - 2023 - International Journal of Advanced Research in Arts, Science, Engineering and Management (Ijarasem) 10 (1):1147-1151.
    With the rapid growth of Internet of Things (IoT) devices and the increasing demand for real-time processing of large data volumes, traditional cloud-based systems struggle to meet latency and bandwidth requirements. Edge-Cloud convergence has emerged as a solution, combining the computational power of cloud data centers with the low-latency and high-throughput capabilities of edge devices. This paper explores the architecture, design principles, and best practices for building hybrid systems that integrate edge computing and cloud (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. OPTIMIZING DATA SCIENCE WORKFLOWS IN CLOUD COMPUTING.Tummalachervu Chaitanya Kanth - 2024 - Journal of Science Technology and Research (JSTAR) 4 (1):71-76.
    This paper explores the challenges and innovations in optimizing data science workflows within cloud computing environments. It begins by highlighting the critical role of data science in modern industries and the pivotal contribution of cloud computing in enabling scalable and efficient data processing. The primary focus lies in identifying and analyzing the key challenges encountered in current data science workflows deployed in cloud infrastructures. These challenges include scalability issues related to handling large volumes (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  4. Transforming Edge Computing With Machine Learning: Real-Time Analytics for IoT In.Priya U. Hari - 2024 - International Journal of Multidisciplinary Research in Science, Engineering, Technology and Management 11 (6):9367-9372.
    Edge computing, combined with machine learning (ML), is emerging as a transformative paradigm for handling the data deluge generated by the Internet of Things (IoT) devices. Traditional cloud computing is often inadequate for the low-latency, high-throughput demands of IoT applications, especially in real-time analytics. By processing data locally at the edge of the network, edge computing reduces latency, enhances privacy, and alleviates the bandwidth burden on centralized cloud servers. The integration of ML algorithms into edge devices (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. The Space Domain Ontologies.Alexander P. Cox, C. K. Nebelecky, R. Rudnicki, W. A. Tagliaferri, J. L. Crassidis & B. Smith - 2021 - In Alexander P. Cox, C. K. Nebelecky, R. Rudnicki, W. A. Tagliaferri, J. L. Crassidis & B. Smith, National Symposium on Sensor & Data Fusion Committee.
    Achieving space situational awareness requires, at a minimum, the identification, characterization, and tracking of space objects. Leveraging the resultant space object data for purposes such as hostile threat assessment, object identification, and conjunction assessment presents major challenges. This is in part because in characterizing space objects we reference a variety of identifiers, components, subsystems, capabilities, vulnerabilities, origins, missions, orbital elements, patterns of life, operational processes, operational statuses, and so forth, which tend to be defined in (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  6. A Shift from Cloud Computing Model to Fog Computing.C. Sailesh & S. Svermani - 2016 - Journal of Applied Computing 1 (1).
    Cloud computing has provided many opportunities to businesses and individuals. It enables global and on demand network access to a shared pool of resources with minimal management effort. However, this bliss has become a problem for latency-sensitive applications. To improve efficiency of cloud and to reduce the amount of data that needs to be transported to the cloud for data processing, analysis and storage, a new network architect technology 'Fog Computing' has been introduced. In fog (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7.  31
    How Cloud Computing Revolutionizes Human Capital Management.Harish Kumar Reddy Kommera - 2019 - Turkish Journal of Computer and Mathematics Education (TURCOMAT) 10 (2):2018-2031.
    The advent of cloud computing has fundamentally transformed various business operations, with Human Capital Management (HCM) standing out as a significant beneficiary. Cloud-based HCM solutions offer unparalleled scalability, accessibility, and integration capabilities, enabling organizations to manage their workforce more efficiently and strategically. This paper explores the revolutionary impact of cloud computing on HCM, highlighting key advancements such as enhanced data analytics, improved employee engagement, cost-effectiveness, and support for remote and hybrid work models. Through a comprehensive (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  8. ADVANCE DATA SECURITY IN CLOUD NETWORK SYSTEMS.Tummalachervu Chaitanya Kanth - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):29-36.
    This research presents a novel and efficient public key cryptosystem known as the Enhanced Schmidt Samoa (ESS) cryptosystem, proposed to safeguard the data of a single owner in cloud computing environments. Data storage is a one-time process in the cloud, while data retrieval is a frequent operation. Experimental results demonstrate that the ESS cryptosystem offers robust data confidentiality in the cloud, surpassing the security provided by traditional cryptosystems. The research also introduces a secure (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  9. Data Storage, Security And Techniques In Cloud Computing.R. Dinesh Arpitha & Shobha R. Sai - 2018 - International Journal of Research and Analytical Reviews 5 (4).
    Cloud computing is the computing technology which provides resources like software, hardware, services over the internet. Cloud computing provides computation, software, data access, and storage services that do not require end- user knowledge of the physical location and configuration of the system that delivers the services. Cloud computing enables the user and organizations to store their data remotely and enjoy good quality applications on the demand without having any burden associated with local hardware resources and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. Advanced Attribute-Based Keyword Search for Secure Cloud Data Storage Solutions.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):350-360.
    This paper delves into the integration of optimization techniques within ABKS to enhance search efficiency and data security in cloud storage environments. We explore various optimization strategies, such as index compression, query processing enhancement, and encryption optimization, which aim to reduce computational overhead while maintaining robust security measures. Through a comprehensive analysis, the paper illustrates how these techniques can significantly improve the performance of cloud storage systems, ensuring both security and usability. Experimental results demonstrate that optimized ABKS (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. OPTIMIZED CLOUD SECURE STORAGE: A FRAMEWORK FOR DATA ENCRYPTION, DECRYPTION, AND DISPERSION.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):415-426.
    The exponential growth of cloud storage has necessitated advanced security measures to protect sensitive data from unauthorized access. Traditional encryption methods provide a layer of security, but they often lack the robustness needed to address emerging threats. This paper introduces an optimized framework for secure cloud storage that integrates data encryption, decryption, and dispersion using cutting-edge optimization techniques. The proposed model enhances data security by first encrypting the data, then dispersing it across multiple (...) servers, ensuring that no single server holds the complete dataset. Decryption occurs only when the dispersed data fragments are reassembled, which adds an additional layer of security. We also explore various optimization algorithms to improve the efficiency of encryption and dispersion processes, thereby reducing computational overhead while maintaining high security. The implementation of this framework is evaluated on multiple cloud platforms, demonstrating its effectiveness in safeguarding data with minimal performance impact. Future enhancements may include integrating machine learning algorithms to predict and adapt to new security threats in real time, further solidifying the reliability of cloud storage solutions. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Cloud-Based Secure Storage: A Framework for Efficient Encryption, Decryption, and Data Dispersion.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):427-434.
    The exponential growth of cloud storage has necessitated advanced security measures to protect sensitive data from unauthorized access. Traditional encryption methods provide a layer of security, but they often lack the robustness needed to address emerging threats. This paper introduces an optimized framework for secure cloud storage that integrates data encryption, decryption, and dispersion using cutting-edge optimization techniques. The proposed model enhances data security by first encrypting the data, then dispersing it across multiple (...) servers, ensuring that no single server holds the complete dataset. Decryption occurs only when the dispersed data fragments are reassembled, which adds an additional layer of security. We also explore various optimization algorithms to improve the efficiency of encryption and dispersion processes, thereby reducing computational overhead while maintaining high security. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  13.  5
    The Role of Cloud in Advancing Personalized Healthcare: Leveraging Big Data and AI for Precision Medicine.Deshmukh A. S. - 2025 - International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering (Ijareeie) 14 (3):663-668.
    :The emergence of personalized healthcare, or precision medicine, represents a paradigm shift in the medical field, focusing on tailoring medical treatments and interventions based on individual patient data. Cloud computing, when combined with Big Data analytics and Artificial Intelligence (AI), has the potential to revolutionize personalized healthcare by enabling the storage, processing, and analysis of vast amounts of patient data from multiple sources. This paper explores the role of cloud computing in advancing personalized healthcare, with (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. Intelligent Encryption and Attribute-Based Data Retrieval for Secure Cloud Storage Using Machine Learning.A. Manoj Prabaharan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):415-425.
    Cloud storage's scalability, accessibility, and affordability have made it essential in the digital age. Data security and privacy remain a major issue due to the large volume of sensitive data kept on cloud services. Traditional encryption is safe but slows data recovery, especially for keyword searches. Secure, fine-grained access control and quick keyword searches over encrypted data are possible using attribute-based keyword search (ABKS). This study examines how ABKS might optimize search efficiency and (...) security in cloud storage systems. We examine index compression, query processing improvement, and encryption optimization to decrease computational cost and preserve security. After a thorough investigation, the article shows how these methods may boost cloud storage system performance, security, and usability. Tests show that improved ABKS speeds up search searches and lowers storage costs, making it a viable cloud storage alternative. Exploring sophisticated machine learning algorithms for predictive search improvements and strengthening ABKS against emerging security vulnerabilities are future research priorities. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  15.  34
    Multi-Cloud Data Resilience: Implementing Cross-Platform Data Strategies with Snowflake for P&C Insurance Operations.Adavelli Sateesh Reddy - 2023 - International Journal of Science and Research 12 (1):1387-1398.
    Property and Casualty (P&C) insurers are adopting multi-cloud environments as a strategic imperative because of their increasing data volumes and complexities in regulatory compliance, customer expectations and technological advancements. This paper discusses how Snowflake’s cloud-agnostic, unified platform enables insurers to create resilient, efficient, and compliant multi cloud data strategies. Using Snowflake’s elastic scalability, real-time analytics, secure data sharing and seamless cloud interoperability, insurers can optimize claims processing, augment fraud detection, and support customer engagement. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Enhanced Secure Cloud Storage: An Integrated Framework for Data Encryption and Distribution.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):416-427.
    Traditional encryption methods provide a layer of security, but they often lack the robustness needed to address emerging threats. This paper introduces an optimized framework for secure cloud storage that integrates data encryption, decryption, and dispersion using cutting-edge optimization techniques. The proposed model enhances data security by first encrypting the data, then dispersing it across multiple cloud servers, ensuring that no single server holds the complete dataset. Decryption occurs only when the dispersed data fragments (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. EFFICIENT STRATEGIES FOR SEAMLESS CLOUD MIGRATIONS USING ADVANCED DEPLOYMENT AUTOMATIONS.Tummalachervu Chaitanya Kanth - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):61-70.
    The increasing complexity and scale of modern computing needs have led to the development and adoption of cloud computing as a ubiquitous paradigm for data storage and processing. The hybrid cloud model, which combines both public and private cloud infrastructures, has been particularly appealing to organizations that require both the scalability offered by public clouds and the security features of private clouds. Various strategies for configuring and managing resources have been developed to optimize the hybrid (...) environment. These strategies aim to balance conflicting objectives such as cost-efficiency, performance optimization, security, and compliance with regulatory standards. This exploratory research focused on evaluating the efficiency and limitations of different configuration strategies in hybrid cloud environments. Findings indicate that each approach presents distinct advantages. Improving resource utilization and automating governance processes are significant advantages of Policy-based Resource Management, which leads to costeffectiveness. Intelligent routing of traffic is a feature of Cross-cloud Load Balancing, resulting in optimized performance and higher service availability. By centralizing control, the Hybrid Cloud Service Mesh allows for secure and streamlined cross-service communication. A notable feature of Cross-cloud Container Orchestration is its ability to simplify the migration of applications across diverse cloud environments. For immediate threat detection and regulatory compliance, real-time monitoring is facilitated by Log Management and Analytics. However, Policy-based Resource Management can be complex and inflexible. Extra costs for data transfer between different cloud providers are a drawback of Crosscloud Load Balancing. Additional network hops create latency issues in Hybrid Cloud Service Mesh configurations. If configured incorrectly, Cross-cloud Container Orchestration could expose the system to security risks. Finally, Log Management and Analytics require both ample storage and advanced analytical capabilities. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  18.  38
    Microsoft Fabric Review: Exploring Microsoft's New Data Analytics Platform.Borra Praveen - 2024 - International Journal of Computer Science and Information Technology Research 12 (2):34-39.
    Microsoft Fabric represents a significant leap forward in analytics services, combining data management, analytics, and machine learning into a unified platform. This paper offers a detailed examination of Microsoft Fabric, covering its architecture, prominent features, advantages, and potential applications. Engineered to streamline data processes and foster collaboration among data experts, Microsoft Fabric supports real-time analytics, scalable data storage, advanced machine learning capabilities, and robust security protocols. Future developments for the platform include deeper AI integration, expanded (...) connectivity, enhanced user experience, fortified security measures, sustainability initiatives, and collaborative tools. By harnessing Microsoft Fabric, organizations can gain comprehensive data insights and drive innovation effectively. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  19. The Space Object Ontology.Alexander P. Cox, Christopher Nebelecky, Ronald Rudnicki, William Tagliaferri, John L. Crassidis & Barry Smith - 2016 - In Alexander P. Cox, Christopher Nebelecky, Ronald Rudnicki, William Tagliaferri, John L. Crassidis & Barry Smith, 19th International Conference on Information Fusion (FUSION 2016). IEEE.
    Achieving space domain awareness requires the identification, characterization, and tracking of space objects. Storing and leveraging associated space object data for purposes such as hostile threat assessment, object identification, and collision prediction and avoidance present further challenges. Space objects are characterized according to a variety of parameters including their identifiers, design specifications, components, subsystems, capabilities, vulnerabilities, origins, missions, orbital elements, patterns of life, processes, operational statuses, and associated persons, organizations, or nations. The Space Object (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  20.  9
    Future-Proofing Cloud Infrastructures:Analysing the Impact of Azure's Quantum Computing on Enterprise Solutions.Ramteke Rashmi - 2025 - International Journal of Advanced Research in Education and Technology(Ijarety) 12 (1):234-238.
    The rapid advancements in cloud computing are transforming enterprise solutions across industries. Among the most promising innovations is quantum computing, which holds the potential to revolutionize how businesses process data, optimize systems, and solve complex problems. Microsoft Azure, a leader in cloud infrastructure, has integrated quantum computing through Azure Quantum to offer scalable quantum solutions. This paper explores the impact of Azure's quantum computing capabilities on enterprise solutions, focusing on scalability, problem-solving efficiency, and future-proofing business operations. By (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. Secure Cloud Storage with Machine Learning-Optimized Attribute-Based Access Control Protocols.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):420-435.
    This study examines how ABKS might optimize search efficiency and data security in cloud storage systems. We examine index compression, query processing improvement, and encryption optimization to decrease computational cost and preserve security. After a thorough investigation, the article shows how these methods may boost cloud storage system performance, security, and usability. Tests show that improved ABKS speeds up search searches and lowers storage costs, making it a viable cloud storage alternative. Exploring sophisticated machine learning algorithms (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22.  3
    AI-Powered Cloud Migration: Automating the Transition from On-Premises to Cloud Environments with Zero Downtime.M. Vaidhegi G. Glory - 2025 - International Journal of Innovative Research in Science Engineering and Technology (Ijirset) 14 (1):747-752.
    : As organizations continue to embrace cloud computing, the migration of workloads, applications, and data from on-premises environments to the cloud remains one of the most critical tasks. However, migrating to the cloud is often seen as a daunting task due to the complexity, the risk of downtime, and the potential for service disruptions. Artificial Intelligence (AI) and automation have emerged as transformative technologies for cloud migration, providing solutions that enable a seamless, efficient, and zero-downtime (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Deep Learning - Driven Data Leakage Detection for Secure Cloud Computing.Yoheswari S. - 2025 - International Journal of Engineering Innovations and Management Strategies 1 (1):1-4.
    Cloud computing has revolutionized the storage and management of data by offering scalable, cost-effective, and flexible solutions. However, it also introduces significant security concerns, particularly related to data leakage, where sensitive information is exposed to unauthorized entities. Data leakage can result in substantial financial losses, reputational damage, and legal complications. This paper proposes a deep learning-based framework for detecting data leakage in cloud environments. By leveraging advanced neural network architectures, such as Long Short-Term Memory (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. A Multi-wavelength Data Analysis with Multi-mission Space Telescopes.Yang I. Pachankis - 2022 - International Journal of Innovative Science and Research Technology 7 (1):701-708.
    The article summarizes the software tool on astrophysical analysis with multi-wavelength space telescope data. It recaps the evidence analysis conducted on the Kerr-Newman black hole (KNBH). It was written prior to the article Research on the Kerr-Newman Black Hole in M82 Confirms Black Hole and White Hole Juxtapose not soon after the experiment. The conducted analysis suggested Hawking radiation is caused by the movement of ergosurfaces of the BH and serves as the primal evidence for black hole and (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  25.  65
    Deep Learning - Driven Data Leakage Detection for Secure Cloud Computing.Yoheswari S. - 2024 - International Journal of Engineering Innovations and Management Strategies 5 (1):1-4.
    Cloud computing has revolutionized the storage and management of data by offering scalable, cost-effective, and flexible solutions. However, it also introduces significant security concerns, particularly related to data leakage, where sensitive information is exposed to unauthorized entities. Data leakage can result in substantial financial losses, reputational damage, and legal complications. This paper proposes a deep learning-based framework for detecting data leakage in cloud environments. By leveraging advanced neural network architectures, such as Long Short- Term (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. OPTIMIZED SECURE CLOUD STORAGE USING ATTRIBUTE-BASED KEYWORD SEARCH.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):338-349.
    In the modern digital era, cloud storage has become an indispensable service due to its scalability, accessibility, and cost-effectiveness. However, with the vast amount of sensitive information stored on cloud platforms, ensuring data security and privacy remains a critical challenge. Traditional encryption techniques, while secure, often hinder efficient data retrieval, especially when using keyword searches. To address this, attribute-based keyword search (ABKS) offers a promising solution by allowing secure, fine-grained access control and efficient keyword searches over (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. The Ethics of Cloud Computing.Boudewijn De Bruin & Luciano Floridi - 2017 - Science and Engineering Ethics 23 (1):21-39.
    Cloud computing is rapidly gaining traction in business. It offers businesses online services on demand (such as Gmail, iCloud and Salesforce) and allows them to cut costs on hardware and IT support. This is the first paper in business ethics dealing with this new technology. It analyzes the informational duties of hosting companies that own and operate cloud computing datacenters (e.g., Amazon). It considers the cloud services providers leasing ‘space in the cloud’ from hosting companies (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  28.  35
    Virtual Machine for Big _Data in Cloud Computing (13th edition).Banupriya I. Manivannan B., - 2024 - International Journal of Innovative Research in Science, Engineering and Technology 13 (11):18380-18386. Translated by Manivannan B.
    Cloud computing has revolutionized data management for businesses and individuals a like, ushering in an era of unprecedented accessibility and scalability. As demand for cloud services continues to surge, the imperative for efficient and secure systems becomes paramount. One approach to meeting this challenge is the consolidation of virtual machines onto fewer physical servers, optimizing resource utilization and yielding significant energy savings. Moreover, this consolidation strategy bolsters overall security by enabling more effective monitoring and control of virtual (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. The Role of Network Engineers in Securing Cloud-based Applications and Data Storage.Bellamkonda Srikanth - 2020 - International Journal of Innovative Research in Computerand Communication Engineering 8 (7):2894-2902.
    As organizations increasingly adopt cloud computing to enhance scalability, efficiency, and costeffectiveness, securing cloud-based applications and data storage has become a paramount concern. This shift has redefined the role of network engineers, who are now at the forefront of implementing and managing secure cloud infrastructures. This research paper examines the critical responsibilities of network engineers in safeguarding cloud environments, focusing on the challenges, strategies, and tools they employ to mitigate risks and ensure data integrity. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. Consensus-Based Data Management within Fog Computing For the Internet of Things.Al-Doghman Firas Qais Mohammed Saleh - 2019 - Dissertation, University of Technology Sydney
    The Internet of Things (IoT) infrastructure forms a gigantic network of interconnected and interacting devices. This infrastructure involves a new generation of service delivery models, more advanced data management and policy schemes, sophisticated data analytics tools, and effective decision making applications. IoT technology brings automation to a new level wherein nodes can communicate and make autonomous decisions in the absence of human interventions. IoT enabled solutions generate and process enormous volumes of heterogeneous data exchanged among billions of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Implementation of Data Mining on a Secure Cloud Computing over a Web API using Supervised Machine Learning Algorithm.Tosin Ige - 2022 - International Journal of Advanced Computer Science and Applications 13 (5):1 - 4.
    Ever since the era of internet had ushered in cloud computing, there had been increase in the demand for the unlimited data available through cloud computing for data analysis, pattern recognition and technology advancement. With this also bring the problem of scalability, efficiency and security threat. This research paper focuses on how data can be dynamically mine in real time for pattern detection in a secure cloud computing environment using combination of decision tree algorithm (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  32.  16
    Cybersecurity Risk Management in the Era of Remote Work and Cloud Computing.Dhivya K. - 2025 - International Journal of Innovative Research in Science, Engineering and Technology 14 (2):1637-1641.
    The rise of remote work and the widespread adoption of cloud computing have transformed the digital landscape, providing organizations with flexibility and scalability. However, these advancements have also introduced new cybersecurity challenges. Traditional security frameworks, which focus on perimeter defenses, are increasingly inadequate in securing cloud-based environments and remote workforces. This paper explores the evolving landscape of cybersecurity risk management in the context of remote work and cloud computing. It investigates the unique risks associated (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33.  43
    The Role of Network Engineers in Securing Cloud-based Applications and Data Storage.Bellamkonda Srikanth - 2020 - International Journal of Innovative Research in Computer and Communication Engineering 8 (7):2894-2901.
    As organizations increasingly adopt cloud computing to enhance scalability, efficiency, and costeffectiveness, securing cloud-based applications and data storage has become a paramount concern. This shift has redefined the role of network engineers, who are now at the forefront of implementing and managing secure cloud infrastructures. This research paper examines the critical responsibilities of network engineers in safeguarding cloud environments, focusing on the challenges, strategies, and tools they employ to mitigate risks and ensure data integrity. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34.  6
    Optimizing AI Models for Biomedical Signal Processing Using Reinforcement Learning in Edge Computing.A. Manoj Prabaharan - 2024 - Journal of Artificial Intelligence and Cyber Security (Jaics) 8 (1):1-7.
    . In the evolving landscape of healthcare, the efficient processing of biomedical signals is critical for real-time diagnosis and personalized treatment. Conventional cloud-based AI systems for biomedical signal processing face challenges such as high latency, bandwidth consumption, and data privacy concerns. Edge computing, which brings data processing closer to the source, has emerged as a potential solution to these limitations. However, optimizing AI models for edge devices, which often have limited computational resources, remains a challenge. This paper (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35.  41
    The Role of Homomorphic Encryption in Secure Cloud Data Processing.Sharma Sidharth - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):260-265.
    Homomorphic encryption is a transformative cryptographic technique that enables secure cloud data processing by allowing computations on encrypted data without requiring decryption. Unlike traditional encryption methods, which protect data only at rest and in transit, homomorphic encryption ensures end-to-end security, even during computation. This capability is particularly vital for industries that rely on cloud computing while handling sensitive information, such as finance, healthcare, and government sectors. However, despite its strong security guarantees, the widespread adoption of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36.  29
    Subscriber Classification Using Telecom Data by Applying Machine Learning.K. Akhileswara - 2025 - International Journal of Engineering Innovations and Management Strategies 1 (9):1-10.
    This paper explores the implementation of a batch processing pipeline for SIM log data in the telecommunication industry using Azure cloud services. The project leverages Azure Data Lake for data storage, Azure Data Factory for automated data ingestion, and Azure Databricks for processing large volumes of data. By applying machine learning algorithms, the system identifies patterns in network usage, detects anomalies, and provides insights into customer behaviour. The results, visualized using Power BI, enable (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37.  3
    Data Reconciliation (Recon) Transformation Strategies for Finance Compliance Reports.Tripathi Praveen - 2025 - International Journal of Innovative Research in Science Engineering and Technology (Ijirset) 14 (3):1959-1961.
    : Financial institutions are required to ensure data accuracy, integrity, and compliance when reporting to regulatory authorities. Reports such as FR 2052a (Liquidity Monitoring), Y-14Q (Stress Testing) necessitate robust data reconciliation (Recon) strategies to maintain regulatory compliance and mitigate risks. This paper explores technical and functional aspects of data reconciliation, highlighting key automation techniques, AI-driven solutions, and statistical methodologies for optimizing financial compliance processes. We analyze data integration challenges, anomaly detection models, and best practices in recon (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38.  50
    Building Scalable Data Warehouses for Financial Analytics in Large Enterprises.Vijayan Naveen Edapurath - 2024 - International Journal of Innovative Research and Creative Technology 10 (3):1-10.
    In today's digital era, large enterprises face the daunting task of managing and analyzing vast volumes of financial data to inform strategic decision-making and maintain a competitive edge. Traditional data warehousing solutions often fall short in addressing the scale, complexity, and performance demands of modern financial analytics. This paper explores the architectural principles, technological strategies, and best practices essential for building scalable data warehouses tailored to the needs of financial analytics in large organizations. It delves into (...) integration techniques, performance optimization methods, security measures, and compliance with regulatory standards. Through in-depth analysis and real-world case studies, the paper provides a comprehensive roadmap for practitioners aiming to design and implement robust, scalable, and secure data warehousing solutions. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  39.  39
    The Evolution of Cloud Computing: From Virtualization to Edge Computing.Ingale Amruta - 2025 - International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering 14 (2):453-458.
    Cloud computing has evolved from a nascent technology to a foundational pillar of modern IT infrastructure, driving innovations across industries by providing scalable, on-demand resources and services. Its evolution, from the early stages of virtualization to the emergence of edge computing, has reshaped how data is stored, processed, and accessed. This paper explores the key milestones in the evolution of cloud computing, beginning with the advent of virtualization and moving through the development of various cloud models, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Machine Learning for Optimized Attribute-Based Data Management in Secure Cloud Storage.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):434-450.
    Cloud storage's scalability, accessibility, and affordability have made it essential in the digital age. Data security and privacy remain a major issue due to the large volume of sensitive data kept on cloud services. Traditional encryption is safe but slows data recovery, especially for keyword searches. Secure, fine-grained access control and quick keyword searches over encrypted data are possible using attribute-based keyword search (ABKS). This study examines how ABKS might optimize search efficiency and (...) security in cloud storage systems. We examine index compression, query processing improvement, and encryption optimization to decrease computational cost and preserve security. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  41.  6
    Autonomous Cloud Operations: Self-Optimizing Cloud Systems Powered By AI and Machine Learning.G. Geethanjali - 2013 - International Journal of Innovative Research in Computer and Communication Engineering 13 (3):2138-2143.
    The exponential growth of cloud computing has revolutionized the IT industry by providing scalable, flexible, and cost-efficient infrastructure solutions. However, as cloud systems become more complex, managing and optimizing these environments becomes increasingly challenging. Traditional cloud management methods often require manual intervention and significant resources to maintain performance, cost-efficiency, and security. Autonomous cloud operations, powered by artificial intelligence (AI) and machine learning (ML), represent the next frontier in cloud management. By leveraging advanced algorithms and real-time (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. AI-POWERED THREAT INTELLIGENCE FOR PROACTIVE SECURITY MONITORING IN CLOUD INFRASTRUCTURES.Tummalachervu Chaitanya Kanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):76-83.
    Cloud computing has become an essential component of enterprises and organizations globally in the current era of digital technology. The cloud has a multitude of advantages, including scalability, flexibility, and cost-effectiveness, rendering it an appealing choice for data storage and processing. The increasing storage of sensitive information in cloud environments has raised significant concerns over the security of such systems. The frequency of cyber threats and attacks specifically aimed at cloud infrastructure has been increasing, presenting (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  43.  66
    The Possibility of Non-Physical Evolution of Intelligence in a Type III Civilization.Angelito Malicse - manuscript
    The Possibility of Non-Physical Evolution of Intelligence in a Type III Civilization -/- The concept of intelligence evolving beyond physical constraints is an intriguing possibility, especially in the context of a Type III civilization on the Kardashev Scale. A Type III civilization, capable of harnessing the energy of an entire galaxy, would likely have transcended biological limitations and developed intelligence that is no longer dependent on physical substrates. This essay explores the theoretical foundations of non-physical intelligence, the technological advancements that (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44.  31
    Cybersecurity Frameworks in Guidewire Environments: Building Resilience in the Face of Evolving Threats.Ravi Teja Madhala Sateesh Reddy Adavelli - 2021 - International Journal of Innovative Research in Science, Engineering and Technology 10 (8):12040-12049.
    The digitization process has brought new opportunities in insurance industry operations and innovations but has also revealed major weaknesses. Since more and more actual insurers use Guidewire to handle claims, policies, and customer data, insurers become targets for cyber threats that target valuable information. The framework of Guidewire, along with cloud computing integrated API and third-party tools, is laden with numerous exposure points. These security gaps are utilized to execute phishing, spread malware and gain unauthorized access to customers (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45.  54
    Gesture-Based Control System Injamuri.Sri Sanjana - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (11):1-14.
    t. This paper presents a sensor-based approach to developing a gesture-controlled robotic vehicle, designed to enhance human-machine interaction in a more intuitive and accessible manner. The system translates hand movements, detected through accelerometers and gyroscopes within a wearable device, into commands that control the vehicle. Traditional methods for operating robotic systems, such as joysticks or remote controls, often require physical interaction, limiting their effectiveness, especially for individuals with disabilities or in environments where hands-free control is essential. This approach offers (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46.  38
    Future Proofing Insurance Operations: A Guidewire-Centric Approach to Cloud, Cybersecurity, and Generative AI.Adavelli Sateesh Reddy - 2023 - International Journal of Computer Science and Information Technology Research 4 (2):29-52.
    By integration with cloud computing, cybersecurity and generative AI, the insurance industry is being transformed from high efficiency, low cost, and better customer service. However, these advanced technologies can also be used by insurers to automate and streamline processes like claims handling, underwriting, and policy generation, which are majorly time consuming and error prone. In predictive analytics, fraud detection, and personalized customer experience, generative AI makes it possible for insurers to mitigate risks and, at the same time, provide more (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47.  31
    QUANTUM-ENHANCED ENCRYPTION TECHNIQUES FOR CLOUD DATA PROTECTION.Sharma Sidharth - 2019 - Journal of Theoretical and Computationsl Advances in Scientific Research (Jtcasr) 3 (1):15-20.
    The convergence of cloud computing, blockchain technology, and the emerging era of quantum computing presents significant challenges for data security. This research tackles these growing vulnerabilities by introducing a comprehensive security framework that integrates Quantum Key Distribution (QKD), CRYSTALS-Kyber, and Zero-Knowledge Proofs (ZKPs) to protect data in cloud-based blockchain systems. The primary goal is to safeguard information against quantum threats through QKD, a quantum-secure cryptographic protocol. To enhance resilience against quantum attacks, the framework employs CRYSTALSKyber, a (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  48. An Architecture of Thin Client in Internet of Things and Efficient Resource Allocation in Cloud for Data Distribution.Aymen Abdullah, Phamhung Phuoc & Eui Namhuh - 2017 - International Arab Journal of Information Technology 14 (6).
    These days, Thin-client devices are continuously accessing the Internet to perform/receive diversity of services in the cloud. However these devices might either has lack in their capacity (e.g., processing, CPU, memory, storage, battery, resource allocation, etc) or in their network resources which is not sufficient to meet users satisfaction in using Thin-client services. Furthermore, transferring big size of Big Data over the network to centralized server might burden the network, cause poor quality of services, cause long respond delay, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. Network Security Challenges in Remote Work Environments: Solutions for Protecting Data and Applications.Bellamkonda Srikanth - 2021 - International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering 10 (10):7330-7337.
    The rise of remote work has redefined the modern workplace, driven by advancements in technology and the global need for flexible work environments. While remote work offers increased productivity and employee satisfaction, it has also introduced a host of network security challenges. Organizations must contend with securing sensitive data and critical applications across distributed networks, many of which extend beyond traditional corporate perimeters. This research paper explores the multifaceted security threats associated with remote work environments, including (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. Cloud Computing and Big Data for Oil and Gas Industry Application in China.Yang Zhifeng, Feng Xuehui, Han Fei, Yuan Qi, Cao Zhen & Zhang Yidan - 2019 - Journal of Computers 1.
    The oil and gas industry is a complex data-driven industry with compute-intensive, data-intensive and business-intensive features. Cloud computing and big data have a broad application prospect in the oil and gas industry. This research aims to highlight the cloud computing and big data issues and challenges from the informatization in oil and gas industry. In this paper, the distributed cloud storage architecture and its applications for seismic data of oil and gas industry (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 979