Results for 'Network Automation'

979 found
Order:
  1.  32
    Automating Network Security with Ansible: A Guide to Secure Network Automation.Bellamkonda Srikanth - 2023 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 6 (9):2722-2730.
    The increasing complexity of modern networks has amplified the challenges associated with ensuring robust and scalable security. With the rapid evolution of cyber threats, traditional methods of network security management are often inadequate, leading to inefficiencies and vulnerabilities. Automation has emerged as a transformative approach to streamline network operations, enhance security postures, and reduce the margin of human error. This study explores the integration of Ansible, a powerful open-source automation tool, into network security workflows to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2.  79
    Automated Plant Disease Detection through Deep Learning for Enhanced Agricultural Productivity.M. Sheik Dawood - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):640-650.
    he health of plants plays a crucial role in ensuring agricultural productivity and food security. Early detection of plant diseases can significantly reduce crop losses, leading to improved yields. This paper presents a novel approach for plant disease recognition using deep learning techniques. The proposed system automates the process of disease detection by analyzing leaf images, which are widely recognized as reliable indicators of plant health. By leveraging convolutional neural networks (CNNs), the model identifies various plant diseases with high accuracy. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3.  20
    Enhanced Campus Automation System and the emerging need for IoT integration: an automation perspective. [eCAS-IoT].J. Rajeshwar Rao & Siby Samuel - 2019 - In Cecilia Titiek Murniati & Heny Hartono, E-Proceedings International Conference on Innovation in Education: Opportunities and Challenges in Southeast Asia. Semarang: Universitas Katolik Soegijapranata. pp. 179-190.
    Technology has the power to break the limitations of traditional passive learning and innovate almost all aspects of everyday life with the power of connecting things of the world to the Internet, “Internet of Things (IoT).” IoT is no longer a phenomenon, but it has become a prevalent system in which people, processes, data, and things connect to the Internet and each other. This paper ‘Enhanced Campus Automation System and the emerging need of IoT integration: an automation perspective’ (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  4.  62
    AUTOMATED PNEUMONIA DETECTION USING DEEP LEARNING AND CHEST X-RAY IMAGES.K. Mahesh - 2024 - International Journal of Engineering Innovations and Management Strategies, 1 (5):1-14.
    Pneumonia is a serious respiratory infection that poses significant health risks, particularly if not diagnosed and treated promptly. Traditional methods of pneumonia diagnosis rely on the manual interpretation of chest X-ray images by radiologists, a process that can be time-consuming, subjective, and error-prone, especially in regions with limited access to experienced medical professionals. To address these challenges, this study explores the development of an automated deep learning-based system for pneumonia detection using chest X-ray images. The results demonstrate that the deep (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. Artificial intelligent smart home automation with secured camera management-based GSM, cloud computing and arduino.Musaddak Abdul Zahra & Laith A. Abdul-Rahaim Musaddak M. Abdul Zahra, Marwa Jaleel Mohsin - 2020 - Periodicals of Engineering and Natural Sciences 8 (4):2160-2168.
    Home management and controlling have seen a great introduction to network that enabled digital technology, especially in recent decades. For the purpose of home automation, this technique offers an exciting capability to enhance the connectivity of equipment within the home. Also, with the rapid expansion of the Internet, there are potentials that added to the remote control and monitoring of such network-enabled devices. In this paper, we had been designed and implemented a fully manageable and secure smart (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6.  73
    Agricultural Innovation: Automated Detection of Plant Diseases through Deep Learning.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):630-640.
    The health of plants plays a crucial role in ensuring agricultural productivity and food security. Early detection of plant diseases can significantly reduce crop losses, leading to improved yields. This paper presents a novel approach for plant disease recognition using deep learning techniques. The proposed system automates the process of disease detection by analyzing leaf images, which are widely recognized as reliable indicators of plant health. By leveraging convolutional neural networks (CNNs), the model identifies various plant diseases with high accuracy. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7.  60
    Modernizing Workflows with Convolutional Neural Networks: Revolutionizing AI Applications.Govindaraj Vasanthi - 2024 - World Journal of Advanced Research and Reviews 23 (03):3127–3136.
    Modernizing workflows is imperative to address labor-intensive tasks that hinder productivity and efficiency. Convolutional Neural Networks (CNNs), a prominent technique in Artificial Intelligence, offer transformative potential for automating complex processes and streamlining operations. This study explores the application of CNNs in building accurate classification models for diverse datasets, demonstrating their ability to significantly enhance decision-making processes and operational efficiency. By leveraging a dataset of images, an optimized CNN model has been developed, showcasing high accuracy and reliability in classification tasks. The (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  8.  64
    Network Segmentation and MicroSegmentation: Reducing Attack Surfaces in Modern Enterprise Security.Bellamkonda Srikanth - 2020 - International Journal of Innovative Research in Computer and Communication Engineering 8 (6):2499-2507.
    In the modern enterprise environment, where cybersecurity threats continue to evolve in complexity and sophistication, network segmentation and micro-segmentation have emerged as critical strategies for mitigating risks and reducing attack surfaces. This research paper explores the principles, implementation, and benefits of network segmentation and micro-segmentation as essential components of a comprehensive cybersecurity framework. By dividing networks into smaller, isolated segments, these methodologies aim to limit unauthorized access, minimize lateral movement, and contain potential breaches, ensuring a more secure (...) infrastructure. Network segmentation focuses on dividing large networks into smaller, more manageable subnetworks. This process enforces boundaries between different areas of a network, reducing exposure and protecting sensitive data. Meanwhile, microsegmentation extends this concept to the individual workload level, offering granular security controls that adapt to dynamic and cloud-based environments. These approaches are particularly relevant in today's context, where hybrid infrastructures and multi-cloud deployments are becoming the norm, posing significant security challenges. The paper examines the technical underpinnings of segmentation techniques, highlighting tools and frameworks that facilitate their deployment. It also addresses key challenges, such as the complexity of configuration, potential performance bottlenecks, and the necessity for alignment with broader organizational policies. Case studies from industries such as healthcare, finance, and government are analyzed to demonstrate the effectiveness of segmentation in reducing the scope and impact of cyberattacks. Additionally, this study delves into the evolving landscape of cyber threats, emphasizing the role of segmentation in countering advanced persistent threats (APTs), ransomware attacks, and insider threats. By adopting a zero-trust architecture that integrates micro-segmentation, organizations can ensure that every access request is verified and confined to the least privileged level necessary. This proactive approach to network defense aligns with industry best practices and regulatory standards, enhancing an organization's security posture. Furthermore, the research highlights the importance of continuous monitoring and automation in maintaining segmented networks. Emerging technologies such as artificial intelligence (AI) and machine learning (ML) are explored for their potential to optimize and simplify segmentation processes. These advancements enable organizations to dynamically adapt to evolving threats while maintaining operational efficiency. The findings emphasize that while network segmentation and micro-segmentation are not silver bullets, they represent indispensable layers of defense within a multi-faceted cybersecurity strategy. Organizations that successfully implement these strategies can significantly reduce the likelihood and impact of breaches, protect critical assets, and build resilience against future threats. This paper aims to provide a comprehensive guide for cybersecurity professionals, IT administrators, and policymakers to understand and adopt network segmentation and micro-segmentation. By integrating these strategies into their security frameworks, enterprises can fortify their defenses in the face of a constantly shifting threat landscape, safeguarding their infrastructure, data, and operations. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  9.  36
    Analysis on GenAI for Source Code Scanning and Automated Software Testing.Girish Wali Praveen Sivathapandi - 2025 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 8 (2):631-638.
    The fundamental purpose of software testing is to develop new test case sets that demonstrate the software product's deficiencies. Upon preparation of the test cases, the Test Oracle delineates the expected program behavior for each scenario. The application's correct functioning and its properties will be assessed by prioritizing test cases and running its components, which delineate inputs, actions, and outputs. The prioritization methods include initial ordering, random ordering, and reverse ranking based on fault detection capabilities. software application development often used (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10.  15
    Network Segmentation and MicroSegmentation: Reducing Attack Surfaces in Modern Enterprise Security.Bellamkonda Srikanth - 2020 - International Journal of Innovative Research in Computer and Communication Engineering 8 (6):2499-2507.
    In the modern enterprise environment, where cybersecurity threats continue to evolve in complexity and sophistication, network segmentation and micro-segmentation have emerged as critical strategies for mitigating risks and reducing attack surfaces. This research paper explores the principles, implementation, and benefits of network segmentation and micro-segmentation as essential components of a comprehensive cybersecurity framework. By dividing networks into smaller, isolated segments, these methodologies aim to limit unauthorized access, minimize lateral movement, and contain potential breaches, ensuring a more secure (...) infrastructure. Network segmentation focuses on dividing large networks into smaller, more manageable subnetworks. This process enforces boundaries between different areas of a network, reducing exposure and protecting sensitive data. Meanwhile, microsegmentation extends this concept to the individual workload level, offering granular security controls that adapt to dynamic and cloud-based environments. These approaches are particularly relevant in today's context, where hybrid infrastructures and multi-cloud deployments are becoming the norm, posing significant security challenges. The paper examines the technical underpinnings of segmentation techniques, highlighting tools and frameworks that facilitate their deployment. It also addresses key challenges, such as the complexity of configuration, potential performance bottlenecks, and the necessity for alignment with broader organizational policies. Case studies from industries such as healthcare, finance, and government are analyzed to demonstrate the effectiveness of segmentation in reducing the scope and impact of cyberattacks. Additionally, this study delves into the evolving landscape of cyber threats, emphasizing the role of segmentation in countering advanced persistent threats (APTs), ransomware attacks, and insider threats. By adopting a zero-trust architecture that integrates micro-segmentation, organizations can ensure that every access request is verified and confined to the least privileged level necessary. This proactive approach to network defense aligns with industry best practices and regulatory standards, enhancing an organization's security posture. Furthermore, the research highlights the importance of continuous monitoring and automation in maintaining segmented networks. Emerging technologies such as artificial intelligence (AI) and machine learning (ML) are explored for their potential to optimize and simplify segmentation processes. These advancements enable organizations to dynamically adapt to evolving threats while maintaining operational efficiency. The findings emphasize that while network segmentation and micro-segmentation are not silver bullets, they represent indispensable layers of defense within a multi-faceted cybersecurity strategy. Organizations that successfully implement these strategies can significantly reduce the likelihood and impact of breaches, protect critical assets, and build resilience against future threats. This paper aims to provide a comprehensive guide for cybersecurity professionals, IT administrators, and policymakers to understand and adopt network segmentation and micro-segmentation. By integrating these strategies into their security frameworks, enterprises can fortify their defenses in the face of a constantly shifting threat landscape, safeguarding their infrastructure, data, and operations. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  11.  70
    Advanced AI Algorithms for Automating Data Preprocessing in Healthcare: Optimizing Data Quality and Reducing Processing Time.Muthukrishnan Muthusubramanian Praveen Sivathapandi, Prabhu Krishnaswamy - 2022 - Journal of Science and Technology (Jst) 3 (4):126-167.
    This research paper presents an in-depth analysis of advanced artificial intelligence (AI) algorithms designed to automate data preprocessing in the healthcare sector. The automation of data preprocessing is crucial due to the overwhelming volume, diversity, and complexity of healthcare data, which includes medical records, diagnostic imaging, sensor data from medical devices, genomic data, and other heterogeneous sources. These datasets often exhibit various inconsistencies such as missing values, noise, outliers, and redundant or irrelevant information that necessitate extensive preprocessing before being (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12.  77
    Deep Neural Networks for Real-Time Plant Disease Diagnosis and Productivity Optimization.K. Usharani - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):645-652.
    The health of plants plays a crucial role in ensuring agricultural productivity and food security. Early detection of plant diseases can significantly reduce crop losses, leading to improved yields. This paper presents a novel approach for plant disease recognition using deep learning techniques. The proposed system automates the process of disease detection by analyzing leaf images, which are widely recognized as reliable indicators of plant health. By leveraging convolutional neural networks (CNNs), the model identifies various plant diseases with high accuracy. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. EFFICIENT STRATEGIES FOR SEAMLESS CLOUD MIGRATIONS USING ADVANCED DEPLOYMENT AUTOMATIONS.Tummalachervu Chaitanya Kanth - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):61-70.
    The increasing complexity and scale of modern computing needs have led to the development and adoption of cloud computing as a ubiquitous paradigm for data storage and processing. The hybrid cloud model, which combines both public and private cloud infrastructures, has been particularly appealing to organizations that require both the scalability offered by public clouds and the security features of private clouds. Various strategies for configuring and managing resources have been developed to optimize the hybrid cloud environment. These strategies aim (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  14.  47
    Enhancing COVID-19 Diagnosis with Automated Reporting Using Preprocessed Chest X-Ray Image Analysis based on CNN (2nd edition).R. Sugumar - 2023 - International Conference on Applied Artificial Intelligence and Computing 2 (2):35-40.
    The ongoing COVID-19 pandemic has caused a global health crisis, and accurate diagnosis and early detection are essential for successful management of the outbreak. Convolutional neural networks and pre-processed chest X-ray pictures are the two main components of the unique proposed method for the identification of COVID-19, which is presented in this paper (CNNs). Image enhancement and segmentation are performed during the pre-processing stage. These operations increase the overall quality and contrast of the pictures, which in turn makes it simpler (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. How to Do Things with Information Online. A Conceptual Framework for Evaluating Social Networking Platforms as Epistemic Environments.Lavinia Marin - 2022 - Philsophy and Technology 35 (77).
    This paper proposes a conceptual framework for evaluating how social networking platforms fare as epistemic environments for human users. I begin by proposing a situated concept of epistemic agency as fundamental for evaluating epistemic environments. Next, I show that algorithmic personalisation of information makes social networking platforms problematic for users’ epistemic agency because these platforms do not allow users to adapt their behaviour sufficiently. Using the tracing principle inspired by the ethics of self-driving cars, I operationalise it here and identify (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  16. Bill Gates is not a parking meter: Philosophical quality control in automated ontology building.Catherine Legg & Samuel Sarjant - 2012 - Proceedings of the Symposium on Computational Philosophy, AISB/IACAP World Congress 2012 (Birmingham, England, July 2-6).
    The somewhat old-fashioned concept of philosophical categories is revived and put to work in automated ontology building. We describe a project harvesting knowledge from Wikipedia’s category network in which the principled ontological structure of Cyc was leveraged to furnish an extra layer of accuracy-checking over and above more usual corrections which draw on automated measures of semantic relatedness.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  17.  52
    The Role of Network Engineers in Securing Cloud-based Applications and Data Storage.Bellamkonda Srikanth - 2020 - International Journal of Innovative Research in Computer and Communication Engineering 8 (7):2894-2901.
    As organizations increasingly adopt cloud computing to enhance scalability, efficiency, and costeffectiveness, securing cloud-based applications and data storage has become a paramount concern. This shift has redefined the role of network engineers, who are now at the forefront of implementing and managing secure cloud infrastructures. This research paper examines the critical responsibilities of network engineers in safeguarding cloud environments, focusing on the challenges, strategies, and tools they employ to mitigate risks and ensure data integrity. The paper identifies key (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. Using the Existing CCTV Network for Crowd Management, Crime Prevention, and Work Monitoring using AIML.N. M. S. Desai - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (1):1-12.
    Closed-Circuit Television (CCTV) systems are essential in modern security setups because they provide continuous surveillance, acting as both a deterrent and a critical tool for monitoring and evidence collection. Unlike human guards who can be limited by fatigue and blind spots, CCTV cameras offer consistent, 24/7 coverage of key areas. They fill gaps in the current security system by enabling real-time monitoring and recording incidents for later review, ensuring that potential security breaches are detected and addressed more effectively. This enhances (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19.  29
    5G-Enabled Cloud Services: Unlocking New Frontiers for Low-Latency Applications and Network Slicing.Eneeyasri D. S. - 2025 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 8 (2):1105-1110.
    The introduction of 5G networks has brought forth a revolutionary shift in the capabilities of cloud services, especially with regard to low-latency applications and advanced network management techniques. 5G’s highspeed, low-latency, and massive connectivity features are particularly valuable for real-time applications, such as autonomous vehicles, industrial automation, augmented reality (AR), virtual reality (VR), and Internet of Things (IoT) ecosystems. Moreover, 5G enables network slicing, a technique that allows operators to create multiple virtual networks with customized performance characteristics (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20.  17
    Machine Learning Meets Network Management and Orchestration in Edge-Based Networking Paradigms": The Integration of Machine Learning for Managing and Orchestrating Networks at the Edge, where Real-Time Decision-Making is C.Odubade Kehinde Santhosh Katragadda - 2022 - International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering 11 (4):1635-1645.
    Integrating machine learning (ML) into network management and orchestration has revolutionized edgebased networking paradigms, where real-time decision-making is critical. Traditional network management approaches often struggle with edge environments' dynamic and resource-constrained nature. By leveraging ML algorithms, networks at the edge can achieve enhanced efficiency, automation, and adaptability in areas such as traffic prediction, resource allocation, and anomaly detection (Wang et al., 2021). Supervised and unsupervised learning techniques facilitate proactive network optimization, reducing latency and improving quality of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21.  22
    The Role of Network Engineers in Securing Cloud-based Applications and Data Storage.Bellamkonda Srikanth - 2020 - International Journal of Innovative Research in Computerand Communication Engineering 8 (7):2894-2902.
    As organizations increasingly adopt cloud computing to enhance scalability, efficiency, and costeffectiveness, securing cloud-based applications and data storage has become a paramount concern. This shift has redefined the role of network engineers, who are now at the forefront of implementing and managing secure cloud infrastructures. This research paper examines the critical responsibilities of network engineers in safeguarding cloud environments, focusing on the challenges, strategies, and tools they employ to mitigate risks and ensure data integrity. The paper identifies key (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22.  14
    Ethical Hacking in Network Security: Assessing Vulnerabilities to Improve Defenses.Bellamkonda Srikanth - 2022 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 5 (5):611-619.
    In an era of increasing cyber threats, ethical hacking has emerged as a pivotal practice in strengthening network security. Ethical hacking, also known as penetration testing, involves authorized attempts to breach a network or system to uncover vulnerabilities before malicious actors can exploit them. This research paper delves into the role of ethical hacking in assessing and mitigating network vulnerabilities to fortify defenses against cyberattacks. It emphasizes the strategic importance of ethical hacking in the context of evolving (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Theorem proving in artificial neural networks: new frontiers in mathematical AI.Markus Pantsar - 2024 - European Journal for Philosophy of Science 14 (1):1-22.
    Computer assisted theorem proving is an increasingly important part of mathematical methodology, as well as a long-standing topic in artificial intelligence (AI) research. However, the current generation of theorem proving software have limited functioning in terms of providing new proofs. Importantly, they are not able to discriminate interesting theorems and proofs from trivial ones. In order for computers to develop further in theorem proving, there would need to be a radical change in how the software functions. Recently, machine learning results (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  24. Integration of Internet Protocol and Embedded System On IoT Device Automation.Yousef MethkalAbd Algani, S. Balaji, A. AlbertRaj, G. Elangovan, P. J. Sathish Kumar, George Kofi Agordzo, Jupeth Pentang & B. Kiran Bala - manuscript
    The integration of Internet Protocol and Embedded Systems can enhance the communication platform. This paper describes the emerging smart technologies based on Internet of Things (IOT) and internet protocols along with embedded systems for monitoring and controlling smart devices with the help of WiFi technology and web applications. The internet protocol (IP) address has been assigned to the things to control and operate the devices via remote network that facilitates the interoperability and end-to-end communication among various devices c,onnected over (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  25.  74
    Text-To-Video Conversion Of PIB Press Releases Using Generative Adversarial Networks.Niteesh Chelimela - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (6):1-16.
    The growing demand for multimedia content has spurred the need to automate the conversion of textual information into video formats. This paper proposes a novel approach for converting Press Information Bureau (PIB) press releases into videos using Generative Adversarial Networks (GANs). By leveraging GANs, a state-of-the-art deep learning model, we aim to generate video content from textual data, facilitating the dynamic presentation of information from government press releases. This process could significantly enhance the accessibility and engagement of press releases, making (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Fake Profile Detection on Social Networking Websites using Machine Learning.R. T. Subhalakshmi - 2025 - Journal of Science Technology and Research (JSTAR) 6 (1):1-18.
    With the increasing popularity of social networking websites, the problem of fake profiles has become a significant concern. Fake profiles, often created by malicious actors for fraudulent purposes, pose threats to user privacy, security, and trustworthiness of online platforms. This project proposes a machine learning-based approach to detect fake profiles on social networking websites. By analyzing various features such as user activity patterns, profile attributes, and network connections, the model identifies potential fake profiles with high accuracy. The system employs (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27.  33
    The Role of AI in Automated Threat Hunting.Sharma Sidharth - 2016 - International Journal of Engineering Innovations and Management Strategies 1 (1):1-10.
    An increasing number of enterprises are using artificial intelligence (AI) to improve their cyber security and threat intelligence. AI is a type of AI that generates new data independently of preexisting data or expert knowledge. One emerging cyberthreat to systems that has been increasing is adversarial attacks. By generating fictitious accounts and transactions, adversarial attacks can interfere with and take advantage of decentralized apps that operate on the Ethereum network. Because fraudulent materials (such as accounts and transactions) used as (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28.  14
    The Role of Artificial Intelligence in Enhancing Automated Threat Hunting 1Mr.Sidharth Sharma.Sharma Sidharth - 2016 - International Journal of Engineering Innovations and Management Strategies 1 (1):1-6.
    An increasing number of enterprises are using artificial intelligence (AI) to improve their cyber security and threat intelligence. AI is a type of AI that generates new data independently of preexisting data or expert knowledge. One emerging cyberthreat to systems that has been increasing is adversarial attacks. By generating fictitious accounts and transactions, adversarial attacks can interfere with and take advantage of decentralized apps that operate on the Ethereum network. Because fraudulent materials (such as accounts and transactions) used as (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29.  48
    Golden Eagle Detection: Integrating Neural Networks and Particle Swarm Optimization.P. Meenalochini - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):1-12.
    rd species identification plays a vital role in biodiversity conservation and ecological studies, offering insights into habitat health and species distribution. Traditional methods for identifying bird species are time-intensive and prone to human error, necessitating automated solutions. This project, Bird Species Identification Using Deep Learning, proposes an advanced system leveraging the power of deep learning to accurately identify bird species from images. The system utilizes a convolutional neural network (CNN), renowned for its proficiency in image classification tasks. A dataset (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30.  38
    arnessing Neural Networks for Precise Eagle-Fish Recognition in Natural Habitats.A. Manoj Prabharan - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):1-12.
    This project, titled Bird Species Identification Using Deep Learning, aims to develop a robust system that can identify bird species from images with high precision. The core of this project involves training a CNN model on a diverse dataset of bird images. This dataset includes species from various geographical locations and environments, capturing a wide range of appearances, postures, and behaviors. By preprocessing and augmenting the dataset, the model is designed to handle challenges such as variations in lighting, background noise, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31.  39
    From Pixels to Patterns: Neural Networks for Eagle-Fish Detection.R. Senthilkumar - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):1-12.
    Bird species identification plays a vital role in biodiversity conservation and ecological studies, offering insights into habitat health and species distribution. Traditional methods for identifying bird species are time-intensive and prone to human error, necessitating automated solutions. This project, Bird Species Identification Using Deep Learning, proposes an advanced system leveraging the power of deep learning to accurately identify bird species from images. The system utilizes a convolutional neural network (CNN), renowned for its proficiency in image classification tasks.
    Download  
     
    Export citation  
     
    Bookmark  
  32.  21
    The Structured Design Framework for Developing Discharging Strategy for Cloud Based Automation Through ML Technique.K. Krishna Kumar Muntather Almusawi, Harpreet S. Bhatia, Ranjith Reddy K., Aashna Sinha, Dr R. Udayakumar - 2024 - International Conference on Advance Computing and Innovative Technologies in Engineering 4 (1):1341-1345.
    With the growth of wireless networks and Internet resources, cloud robotics is becoming more and more popular. A prominent innovation that has gained traction is computation offloading, which gives robots more computational power by using cloud resources and parallel processing power. Nevertheless, because there are so many variables affecting performance, research on how effective computing offloading is in cloud robotics is still underway. Our research proposes a distributed cloud robotic architecture that uses Kafka middleware as a message broker to offload (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33.  50
    Enhancing Eagle-Fish Studies Through AI-Driven Neural Networks.M. Sheik Dawood - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):1-15.
    Birds are an integral part of our ecosystem, playing diverse roles in pollination, seed dispersal, pest control, and ecological balance. Monitoring bird populations and identifying species are crucial for understanding biodiversity, assessing ecosystem health, and implementing conservation strategies. Traditionally, bird species identification has relied on manual observation, which requires significant expertise and time. However, this process is often prone to human error and inefficiency, especially when distinguishing between visually similar species. As global biodiversity faces increasing threats, there is a pressing (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34.  97
    Revolutionizing Agriculture with Deep Learning-Based Plant Health Monitoring.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):655-666.
    By leveraging convolutional neural networks (CNNs), the model identifies various plant diseases with high accuracy. The experimental setup includes a dataset consisting of healthy and diseased leaf images of different plant species. The dataset is preprocessed to remove noise and augmented to address the issue of class imbalance. The CNN model is then trained, validated, and tested on this dataset. The results indicate that the deep learning model achieves a classification accuracy of over 95% for most plant diseases. Additionally, the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35.  46
    A Deep Learning Framework for COVID-19 Detection in X-Ray Images with Global Thresholding.R. Sugumar - 2023 - IEEE 1 (2):1-6.
    The COVID-19 outbreak has had a significant influence on the health of people all across the world, and preventing its further spread requires an early and correct diagnosis. Imaging using X-rays is often used to identify respiratory disorders like COVID-19, and approaches based on machine learning may be used to automate the diagnostic process. In this research, we present a deep learning approach for COVID-19 identification in X-ray pictures utilizing global thresholding. Our framework consists of two main components: (1) global (...)
    Download  
     
    Export citation  
     
    Bookmark   57 citations  
  36. Automatic Control for Home Applications using IoT.R. Veeramani - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):101-110.
    Smart home has become more and more popular in recent years. Due to the rapid development in the field of the Automation industry, human life is becoming more advanced and better in all aspects. In the present scenario, Automated systems are being preferred over the non-automated system. With the rapid growth in the number of consumers using the internet over the past years, the Internet has become an important part of life, and IoT is the newest and emerging internet (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37.  40
    Deep Learning for Wildlife: Eagle-Fish Recognition at Scale.Akram Muhammad - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):2023.
    Advancements in technology, particularly in the field of artificial intelligence (AI), have opened new avenues for solving complex biological and ecological challenges. Among these, deep learning has emerged as a powerful tool for image-based classification tasks. Convolutional Neural Networks (CNNs), a subset of deep learning algorithms, are especially effective in recognizing patterns and extracting features from images. This capability makes CNNs highly suitable for applications in bird species identification. By leveraging deep learning techniques, researchers and conservationists can automate the identification (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. Bird Species Identification Using Deep Learning.R. Senthilkumar - 2025 - Journal of Science Technology and Research (JSTAR) 6 (1):1-14.
    Bird species identification plays a vital role in biodiversity conservation and ecological studies, offering insights into habitat health and species distribution. Traditional methods for identifying bird species are time-intensive and prone to human error, necessitating automated solutions. This project, Bird Species Identification Using Deep Learning, proposes an advanced system leveraging the power of deep learning to accurately identify bird species from images. The system utilizes a convolutional neural network (CNN), renowned for its proficiency in image classification tasks. A dataset (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39.  46
    Leveraging the Power of Deep Learning to Overcome the Challenges of Marine Engineering and Improve Vessel Operations.A. Akshith Reddy - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (5):1-14.
    Maritime transport plays a pivotal role in global trade, yet it faces challenges due to corrosion, which deteriorates metallic surfaces of vessels, leading to potential safety hazards and financial burdens. Traditional corrosion detection methods such as visual inspections are inefficient, time-consuming, and often subjective. This paper proposes a deep learning-based solution utilizing Convolutional Neural Networks (CNNs) to detect and assess corrosion on marine vessel surfaces. Our proposed solution not only automates the detection process but also enhances accuracy, ensuring early identification (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Assyrian Merchants meet Nuclear Physicists: History of the Early Contributions from Social Sciences to Computer Science. The Case of Automatic Pattern Detection in Graphs (1950s-1970s).Sébastien Plutniak - 2021 - Interdisciplinary Science Reviews 46 (4):547-568.
    Community detection is a major issue in network analysis. This paper combines a socio-historical approach with an experimental reconstruction of programs to investigate the early automation of clique detection algorithms, which remains one of the unsolved NP-complete problems today. The research led by the archaeologist Jean-Claude Gardin from the 1950s on non-numerical information and graph analysis is retraced to demonstrate the early contributions of social sciences and humanities. The limited recognition and reception of Gardin's innovative computer application to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41.  50
    Reliability Engineering in Cloud Computing: Strategies, Metrics, and Performance Assessment.Anand Karanveer - 2023 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 6 (12):3451-3464.
    Cloud computing has transformed the nature of computation, sharing of information resources, and storage capabilities, including the flexibility to scale these resources for corporate use. Nevertheless, maintaining high reliability in cloud environments is still an issue that has not been solved because of factors such as Hardware failures, network interruptions/slowdowns and software vulnerabilities. This paper discusses several methods that can be employed in the reliability engineering of cloud computing, including fault tolerance, redundancy, monitoring and predictive maintenance. It also further (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Lemon Classification Using Deep Learning.Jawad Yousif AlZamily & Samy Salim Abu Naser - 2020 - International Journal of Academic Pedagogical Research (IJAPR) 3 (12):16-20.
    Abstract : Background: Vegetable agriculture is very important to human continued existence and remains a key driver of many economies worldwide, especially in underdeveloped and developing economies. Objectives: There is an increasing demand for food and cash crops, due to the increasing in world population and the challenges enforced by climate modifications, there is an urgent need to increase plant production while reducing costs. Methods: In this paper, Lemon classification approach is presented with a dataset that contains approximately 2,000 images (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  43.  2
    Detection of Skin Cancer Using Deep Learning and Image Processing.Yashwanth Boudh G. Ms Shilpa Sannamani, Mushkan Mozaffar, Nithin Raj Aras, Nithyashree K. G. - 2024 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 7 (1):4007-4013.
    This study explores the application of deep learning and image processing techniques for the detection of skin cancer. Leveraging convolutional neural networks (CNNs) and advanced image processing algorithms, the proposed system aims to accurately identify and classify skin lesions. The model is trained on a diverse dataset, encompassing various skin conditions, to enhance its diagnostic capabilities. Results demonstrate the potential for automated and reliable skin cancer detection, offering a promising approach for early diagnosis and improved patient outcomes. The deep learning (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. Complex Adaptation and Permissionless Innovation: An Evolutionary Approach to Universal Basic Income.Otto Lehto - 2022 - Dissertation, King's College London
    Universal Basic Income (UBI) has been proposed as a potential way in which welfare states could be made more responsive to the ever-shifting evolutionary challenges of institutional adaptation in a dynamic environment. It has been proposed as a tool of “real freedom” (Van Parijs) and as a tool of making the welfare state more efficient. (Friedman) From the point of view of complexity theory and evolutionary economics, I argue that only a welfare state model that is “polycentrically” (Polanyi, Hayek) organized (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  45. CONTEMPORARY DEVOPS STRATEGIES FOR AUGMENTING SCALABLE AND RESILIENT APPLICATION DEPLOYMENT ACROSS MULTI-CLOUD ENVIRONMENTS.Tummalachervu Chaitanya Kanth - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):54-60.
    Containerization in a multi-cloud environment facilitates workload portability and optimized resource uti-lization. Containerization in multi-cloud environments has received significant attention in recent years both from academic research and industrial development perspectives. However, there exists no effort to systematically investigate the state of research on this topic. The aim of this research is to systematically identify and categorize the multiple aspects of containerization in multi-cloud environment. We conducted the Systematic Mapping Study (SMS) on the literature published between January 2013 and March (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  46. An open database of productivity in Vietnam's social sciences and humanities for public use.Quan-Hoang Vuong, Viet-Phuong La, Thu-Trang Vuong, Manh-Toan Ho, Hong K. T. Nguyen, Viet-Ha T. Nguyen, Hiep-Hung Pham & Manh-Tung Ho - 2018 - Scientific Data (Nature) 5 (180188):1-15.
    This study presents a description of an open database on scientific output of Vietnamese researchers in social sciences and humanities, one that corrects for the shortcomings in current research publication databases such as data duplication, slow update, and a substantial cost of doing science. Here, using scientists’ self-reports, open online sources and cross-checking with Scopus database, we introduce a manual system and its semi-automated version of the database on the profiles of 657 Vietnamese researchers in social sciences and humanities who (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  47. (1 other version)The obsolescence of politics: Rereading Günther Anders’s critique of cybernetic governance and integral power in the digital age.Anna-Verena Nosthoff & Felix Maschewski - 2019 - Thesis Eleven 153 (1):75-93.
    Following media-theoretical studies that have characterized digitization as a process of all-encompassing cybernetization, this paper will examine the timely and critical potential of Günther Anders’s oeuvre vis-à-vis the ever-increasing power of cybernetic devices and networks. Anders has witnessed and negotiated the process of cybernetization from its very beginning, having criticized its tendency to automate and expand, as well as its circular logic and ‘integral power’, including disruptive consequences for the constitution of the political and the social. In this vein, Anders’s (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  48. Cantaloupe Classifications using Deep Learning.Basel El-Habil & Samy S. Abu-Naser - 2021 - International Journal of Academic Engineering Research (IJAER) 5 (12):7-17.
    Abstract cantaloupe and honeydew melons are part of the muskmelon family, which originated in the Middle East. When picking either cantaloupe or honeydew melons to eat, you should choose a firm fruit that is heavy for its size, with no obvious signs of bruising. They can be stored at room temperature until you cut them, after which they should be kept in the refrigerator in an airtight container for up to five days. You should always wash and scrub the rind (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  49. Handbook of Computational Economics, Volume 2: Agent-Based Computational Economics.Leigh Tesfatsion & Kenneth L. Judd (eds.) - 2006 - Amsterdam, The Netherlands: Elsevier.
    The explosive growth in computational power over the past several decades offers new tools and opportunities for economists. This handbook volume surveys recent research on Agent-based Computational Economics (ACE), the computational study of economic processes modeled as open-ended dynamic systems of interacting agents. Empirical referents for “agents” in ACE models can range from individuals or social groups with learning capabilities to physical world features with no cognitive function. Topics covered include: learning; empirical validation; network economics; social dynamics; financial markets; (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  50. Psychopower and Ordinary Madness: Reticulated Dividuals in Cognitive Capitalism.Ekin Erkan - 2019 - Cosmos and History 15 (1):214-241.
    Despite the seemingly neutral vantage of using nature for widely-distributed computational purposes, neither post-biological nor post-humanist teleology simply concludes with the real "end of nature" as entailed in the loss of the specific ontological status embedded in the identifier "natural." As evinced by the ecological crises of the Anthropocene—of which the 2019 Brazil Amazon rainforest fires are only the most recent—our epoch has transfixed the “natural order" and imposed entropic artificial integration, producing living species that become “anoetic,” made to serve (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
1 — 50 / 979