Results for 'Optimized'

130 found
Order:
  1. Optimized Energy Numbers.Parker Emmerson - 2024 - Journal of Liberated Mathematics 1 (1):36.
    We recall, "a priori," numeric energy expression: -/- Energy Numbers -/- $\begin{gathered}\mathcal{V}=\left\{f \mid \exists\left\{e_1, e_2, \ldots, e_n\right\} \in E \cup R\right\} \\ \mathcal{V}=\left\{f \mid \exists\left\{e_1, e_2, \ldots, e_n\right\} \in E, \text { and }: E \mapsto r \in R\right\} \\ \mathcal{V}=\left\{E \mid \exists\left\{a_1, \ldots, a_n\right\} \in E, E \not \neg r \in R\right\}\end{gathered}$ -/- We now introduce the set of optimized energy numbers: -/- ($H_a \in \mathcal{H}$ or $P^n = NP$ or $(P,\mathcal{L},F) = NP$). -/- Based on our formulation (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2.  78
    Optimized Depth-Based Routing for Energy-Efficient Data Transmission in Underwater Wireless Sensor Networks.K. Usharani - 2024 - Journal of Science Technology and Research (JSTAR) 5 ( 1):623-628.
    Underwater Wireless Sensor Networks (UWSNs) are pivotal for various applications, including oceanographic data collection, environmental monitoring, and naval operations. However, the harsh underwater environment poses challenges in designing efficient routing protocols, especially concerning energy consumption and data transmission reliability. This paper proposes an optimized depth-based routing protocol for energy-aware data transmission in UWSNs, focusing on minimizing energy usage while ensuring robust data delivery. The protocol dynamically adjusts transmission power based on node depth and residual energy, reducing communication overhead and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Optimized Energy Numbers Continued.Parker Emmerson - 2024 - Journal of Liberated Mathematics 1:12.
    In this paper, we explore the properties and optimization techniques related to polyhedral cones and energy numbers with a focus on the cone of positive semidefinite matrices and efficient computation strategies for kernels. In Part (a), we examine the polyhedral nature of the cone of positive semidefinite matrices, , establishing that it does not form a polyhedral cone for due to its infinite dimensional characteristics. In Part (b), we present an algorithm for efficiently computing the kernel function on-the-fly, leveraging a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. OPTIMIZED INTRUSION DETECTION MODEL FOR IDENTIFYING KNOWN AND INNOVATIVE CYBER ATTACKS USING SUPPORT VECTOR MACHINE (SVM) ALGORITHMS.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):398-404.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational overhead. By (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5.  13
    ARMING OPTIMIZED AGRICULTURAL WATER USAGE AND PRODUCTION.J. Johny Sebastine - 2025 - Journal of Artificial Intelligence and Cyber Security (Jaics) 9 (1):1-15.
    he Sensor-Integrated IoT Solution for Precision Farming is designed to optimize agricultural water usage and enhance crop productivity through real-time monitoring and automated control. The system uses an Arduino and NodeMCU to collect and process data from various sensors, including a pH sensor for water quality, a DHT11 sensor for temperature and humidity, and a soil moisture sensor to assess soil conditions. Sensor data is displayed on an LCD and uploaded to the ThingSpeak platform for remote monitoring. When the pH (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. OPTIMIZED DRIVER DROWSINESS DETECTION USING MACHINE LEARNING TECHNIQUES.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):395-400.
    Driver drowsiness is a significant factor contributing to road accidents, resulting in severe injuries and fatalities. This study presents an optimized approach for detecting driver drowsiness using machine learning techniques. The proposed system utilizes real-time data to analyze driver behavior and physiological signals to identify signs of fatigue. Various machine learning algorithms, including Support Vector Machines (SVM), Convolutional Neural Networks (CNN), and Random Forest, are explored for their efficacy in detecting drowsiness. The system incorporates an optimization technique—such as Genetic (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. OPTIMIZED CARDIOVASCULAR DISEASE PREDICTION USING MACHINE LEARNING ALGORITHMS.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):350-359.
    Cardiovascular diseases (CVD) represent a significant cause of morbidity and mortality worldwide, necessitating early detection for effective intervention. This research explores the application of machine learning (ML) algorithms in predicting cardiovascular diseases with enhanced accuracy by integrating optimization techniques. By leveraging data-driven approaches, ML models can analyze vast datasets, identifying patterns and risk factors that traditional methods might overlook. This study focuses on implementing various ML algorithms, such as Decision Trees, Random Forest, Support Vector Machines, and Neural Networks, optimized (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. OPTIMIZED SECURE CLOUD STORAGE USING ATTRIBUTE-BASED KEYWORD SEARCH.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):338-349.
    In the modern digital era, cloud storage has become an indispensable service due to its scalability, accessibility, and cost-effectiveness. However, with the vast amount of sensitive information stored on cloud platforms, ensuring data security and privacy remains a critical challenge. Traditional encryption techniques, while secure, often hinder efficient data retrieval, especially when using keyword searches. To address this, attribute-based keyword search (ABKS) offers a promising solution by allowing secure, fine-grained access control and efficient keyword searches over encrypted data. This paper (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. OPTIMIZED CLOUD SECURE STORAGE: A FRAMEWORK FOR DATA ENCRYPTION, DECRYPTION, AND DISPERSION.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):415-426.
    The exponential growth of cloud storage has necessitated advanced security measures to protect sensitive data from unauthorized access. Traditional encryption methods provide a layer of security, but they often lack the robustness needed to address emerging threats. This paper introduces an optimized framework for secure cloud storage that integrates data encryption, decryption, and dispersion using cutting-edge optimization techniques. The proposed model enhances data security by first encrypting the data, then dispersing it across multiple cloud servers, ensuring that no single (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. AI-Optimized Urban Green Spaces: Enhancing Biodiversity and Sustainability in Smart Cities.Eric Garcia - manuscript
    Urban green spaces are vital for mitigating climate change, enhancing biodiversity, and improving citizen well-being. However, traditional methods of designing and managing these spaces often lack the precision and scalability needed to address modern urban challenges. This paper explores how Artificial Intelligence (AI) and IoT technologies can optimize urban green spaces in smart cities. By integrating satellite imagery, soil sensors, and machine learning models, cities can dynamically monitor plant health, predict ecological impacts, and design green zones that maximize biodiversity and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. OPTIMIZED ENCRYPTION PROTOCOL FOR LIGHTWEIGHT AND SEARCHABLE DATA IN IOT ENVIRONMENTS.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):408-414.
    As the Internet of Things (IoT) continues to expand, ensuring secure and efficient data storage and retrieval becomes a critical challenge. IoT devices, often constrained by limited computational resources, require lightweight encryption protocols that balance security and performance. This paper presents an optimized encryption protocol designed specifically for lightweight, searchable data in IoT environments. The proposed protocol utilizes advanced optimization techniques to enhance the efficiency and security of searchable encryption, enabling rapid data retrieval without compromising the integrity and confidentiality (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12.  9
    Optimized Semantic Abstraction for HighPrecision Text Summarization in NLP Systems.Prof Ranjitha U. N. P. Babu Reddy, Y. Veeranaganjineya Reddy, N. Yogesh Naidu - 2025 - International Journal of Innovative Research in Science Engineering and Technology 14 (4).
    The project offers a text summarization tool that can handle content from PDFs, DOCX, and plain text. It incorporates extractive and abstractive summarization methods for creating abridged summaries. The extractive method applies sentence tokenization in the selection of important sentences, whereas the abstractive method utilizes a pre-trained Hugging Face model. The tool also has a Streamlit-based user interface for handling multiple file uploads and direct input of text. Strong error handling and text cleansing improve dependability and summarization accuracy, so the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13.  50
    Optimized Machine Learning Algorithms for Real-Time ECG Signal Analysis in IoT Networks.P. Selvaprasanth - 2024 - Journal of Theoretical and Computationsl Advances in Scientific Research (Jtcasr) 8 (1):1-7.
    Electrocardiogram (ECG) signal analysis is a critical task in healthcare for diagnosing cardiovascular conditions such as arrhythmias, heart attacks, and other heart-related diseases. With the growth of Internet of Things (IoT) networks, real-time ECG monitoring has become possible through wearable devices and sensors, providing continuous patient health monitoring. However, real-time ECG signal analysis in IoT environments poses several challenges, including data latency, limited computational power of IoT devices, and energy constraints. This paper proposes a framework for Optimized Machine Learning (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14.  84
    Optimized Modular Liquid Cooling System for Hybrid Electric Vehicle Motors and Batteries Using Particle Swarm Optimization.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):709-718.
    Hybrid Electric Vehicles (HEVs) are rapidly gaining popularity due to their potential to reduce greenhouse gas emissions and fuel consumption. However, the high-power density of HEV motors and batteries generates substantial heat during operation, which, if not effectively managed, can reduce system efficiency and shorten component lifespans. Efficient thermal management is critical for ensuring the optimal performance of HEV powertrains, specifically motors and batteries. Liquid cooling systems, with their superior heat transfer capabilities, have emerged as an effective solution for managing (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15.  61
    Optimized Blockchain-Enabled Secure Data Integration in Healthcare: A Machine Learning and Genetic Algorithm Approach.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):700-709.
    The integration and security of healthcare data are crucial challenges in the modern healthcare system, driven by the increasing digitization of medical records, diagnostic data, and patient health information. The need for secure, interoperable, and efficient data management systems has become essential, especially as healthcare providers strive to offer better care and reduce operational inefficiencies. Traditional systems often suffer from issues like data breaches, lack of interoperability, and inefficient data handling processes, resulting in compromised data integrity and patient privacy.
    Download  
     
    Export citation  
     
    Bookmark  
  16. Optimized Workload Distribution Frameworks for Accelerated Computing Systems.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):550-560.
    Our findings reveal that implementing accelerated computing can achieve substantial improvements, often reducing computation times by more than 60% compared to traditional sequential methods. This paper details the experimental setup, including algorithm selection and parallelization techniques, and discusses the role of memory bandwidth and latency in achieving optimal performance. Based on the analysis, we propose a streamlined methodology to guide the deployment of accelerated computing frameworks in various industries. Concluding with a discussion on future directions, we highlight potential advancements in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. Optimized Face Reconstruction Using 3D Convolutional Neural Networks.A. Manoj Prabaharan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):509-520.
    The accuracy levels of VGG19 and 3D CNN are compared using the performance metrics. This comparison helps in identifying which model performs better in the task of facial reconstruction from distorted images. Visualizing the results in the form of a graph provides a clear and concise way to understand the comparative performance of the algorithms. The ultimate goal of this project is to develop a system that can accurately reconstruct distorted faces, which can be invaluable in identifying accident victims or (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18.  39
    Optimized Cooling Solutions for Hybrid Electric Vehicle Powertrains.Sharma Sidharth - 2018 - International Journal of Science, Management and Innovative Research (Ijsmir) 2 (1):1-5.
    Hybrid Electric Vehicles (HEVs) have gained significant popularity due to their reduced environmental impact and fuel efficiency. However, the complex integration of electrical and mechanical systems in HEVs presents significant cooling challenges. A robust cooling system is essential to maintain optimal performance and extend the lifespan of powertrains and battery systems. This paper explores the development of an advanced cooling system designed specifically for HEV powertrains, leveraging modern technologies such as heat exchangers, liquid cooling, and smart thermal management systems. The (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  19.  53
    OPTIMIZED VLSI ARCHITECTURE FOR HIGH SPEED THREE-OPERAND BINARY ADDER.M. Manjulathevi - 2025 - Journal of Science Technology and Research (JSTAR) 6 (1):1-17.
    Binary addition forms the backbone of computational arithmetic, serving as a core operation in Digital Signal Processing, arithmetic and logic units, microprocessors, and microcontrollers. As adders are integral to these applications, ongoing research aims to optimize their performance. The propagation of the carry bit significantly affects an adder's delay, making its design critical. In this paper, we propose and evaluate an efficient design for a 64-bit parallel prefix adder (PPA), a high-speed adder that balances performance with resource utilization. Unlike ripple (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. OPTIMIZED CYBERBULLYING DETECTION IN SOCIAL MEDIA USING SUPERVISED MACHINE LEARNING AND NLP TECHNIQUES.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):421-435.
    The rise of social media has created a new platform for communication and interaction, but it has also facilitated the spread of harmful behaviors such as cyberbullying. Detecting and mitigating cyberbullying on social media platforms is a critical challenge that requires advanced technological solutions. This paper presents a novel approach to cyberbullying detection using a combination of supervised machine learning (ML) and natural language processing (NLP) techniques, enhanced by optimization algorithms. The proposed system is designed to identify and classify cyberbullying (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. Optimized Fog Computing and IoT Integrated Environment for Healthcare Monitoring and Diagnosis using Extended Li Zeroing Neural Network.S. M. Padmavathi - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):501-516.
    The EdTech revolution in India has emerged as a transformative force, particularly during and after the COVID-19 pandemic, when traditional education systems faced unprecedented disruptions. While digital technologies have unlocked new opportunities for teaching and learning, they have also exposed systemic inequities and deepened the existing digital divide. This paper examines how EdTech is reshaping India's education landscape by addressing these challenges, with a focus on both the opportunities it presents and the barriers it creates.
    Download  
     
    Export citation  
     
    Bookmark  
  22. Optimized Cloud Computing Solutions for Cardiovascular Disease Prediction Using Advanced Machine Learning.Kannan K. S. - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):465-480.
    The world's leading cause of morbidity and death is cardiovascular diseases (CVD), which makes early detection essential for successful treatments. This study investigates how optimization techniques can be used with machine learning (ML) algorithms to forecast cardiovascular illnesses more accurately. ML models can evaluate enormous datasets by utilizing data-driven techniques, finding trends and risk factors that conventional methods can miss. In order to increase prediction accuracy, this study focuses on adopting different machine learning algorithms, including Decision Trees, Random Forest, Support (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Optimized Attribute-Based Search and Secure Storage for Cloud Computing Environments.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):361-370.
    In the modern digital era, cloud storage has become an indispensable service due to its scalability, accessibility, and cost-effectiveness. However, with the vast amount of sensitive information stored on cloud platforms, ensuring data security and privacy remains a critical challenge. Traditional encryption techniques, while secure, often hinder efficient data retrieval, especially when using keyword searches. To address this, attribute-based keyword search (ABKS) offers a promising solution by allowing secure, fine-grained access control and efficient keyword searches over encrypted data.
    Download  
     
    Export citation  
     
    Bookmark  
  24. OPTIMIZED AGGREGATED PACKET TRANSMISSION IN DUTY-CYCLED WIRELESS SENSOR NETWORKS.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):444-458.
    t: Wireless Sensor Networks (WSNs) have become increasingly prevalent in various applications, ranging from environmental monitoring to smart cities. However, the limited energy resources of sensor nodes pose significant challenges in maintaining network longevity and data transmission efficiency. Duty-cycled WSNs, where sensor nodes alternate between active and sleep states to conserve energy, offer a solution to these challenges but introduce new complexities in data transmission.
    Download  
     
    Export citation  
     
    Bookmark  
  25. Adaptive SVM Techniques for Optimized Detection of Known and Novel Cyber Intrusions.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):398-405.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational overhead.
    Download  
     
    Export citation  
     
    Bookmark  
  26.  69
    User Activity Analysis Via Network Traffic Using DNN and Optimized Federated Learning based Privacy Preserving Method in Mobile Wireless Networks (14th edition).Sugumar R. - 2024 - Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications 14 (2):66-81.
    Mobile and wireless networking infrastructures are facing unprecedented loads due to increasing apps and services on mobiles. Hence, 5G systems have been developed to maximise mobile user experiences as they can accommodate large volumes of traffics with extractions of fine-grained data while offering flexible network resource controls. Potential solutions for managing networks and their security using network traffic are based on UAA (User Activity Analysis). DLTs (Deep Learning Techniques) have been recently used in network traffic analysis for better performances. These (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27.  88
    Streamlined Inventory Handling Using Optimized Robotic Pick and Place Systems.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):660-680.
    We propose a systematic workflow for automating the storage and retrieval process, starting from the identification of the stock to its precise placement and retrieval within the storage facility. The design also addresses potential challenges such as robot mobility, collision avoidance, and space optimization. Performance metrics, including accuracy, time efficiency, and system scalability, are measured using simulation-based experiments in a controlled environment. The results show significant improvements in operational efficiency compared to traditional stock management approaches. This integration paves the way (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28.  85
    Smart Deduplication Framework for Optimized Data Management in Hybrid Cloud.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):587-597.
    The framework leverages a hybrid cloud architecture, combining the scalability of public clouds with the security of private clouds. By employing a combination of client-side hashing, metadata indexing, and machine learning-based duplicate detection, the framework achieves significant storage savings without compromising data integrity. Real-time testing on a hybrid cloud setup demonstrated a 65% reduction in storage needs and a 40% improvement in data retrieval times. Additionally, the system employs blockchain for immutable logging of deduplication activities, enhancing transparency and traceability. This (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29.  81
    Comprehensive IOT Solution for Optimized Digital Farming.V. Jyothi - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (3):1-14.
    Monitoring soil pH levels forms the backbone of precision agriculture with regard to maximizing crop health and yield. The paper discusses an IoT-based solution, specifically designed for continuous soil pH testing in digital farming. It has pH sensors placed strategically around the agricultural fields such that the information regarding the acidity or alkalinity of the soil is available in real-time. The pH information will be transmitted to the central IoT gateway. Here, the information is processed, and via communication of cloud-based (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. Machine Learning for Optimized Attribute-Based Data Management in Secure Cloud Storage.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):434-450.
    Cloud storage's scalability, accessibility, and affordability have made it essential in the digital age. Data security and privacy remain a major issue due to the large volume of sensitive data kept on cloud services. Traditional encryption is safe but slows data recovery, especially for keyword searches. Secure, fine-grained access control and quick keyword searches over encrypted data are possible using attribute-based keyword search (ABKS). This study examines how ABKS might optimize search efficiency and data security in cloud storage systems. We (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31.  89
    Enhanced convolutional neural network enabled optimized diagnostic model for COVID-19 detection (13th edition).Rajendran Sugumar - 2024 - Bulletin of Electrical Engineering and Informatics 13 (3):1935-1942.
    Computed tomography (CT) films are used to construct cross-sectional pictures of a particular region of the body by using many x-ray readings that were obtained at various angles. There is a general agreement in the medical community at this time that chest CT is the most accurate approach for identifying COVID-19 disease. It was demonstrated that chest CT had a higher sensitivity than reverse transcription polymerase chain reaction (RT-PCR) for the detection of COVID-19 illness. This article presents gray-level co-occurrence matrix (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. Advanced Driver Drowsiness Detection Model Using Optimized Machine Learning Algorithms.S. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):396-402.
    Driver drowsiness is a significant factor contributing to road accidents, resulting in severe injuries and fatalities. This study presents an optimized approach for detecting driver drowsiness using machine learning techniques. The proposed system utilizes real-time data to analyze driver behavior and physiological signals to identify signs of fatigue. Various machine learning algorithms, including Support Vector Machines (SVM), Convolutional Neural Networks (CNN), and Random Forest, are explored for their efficacy in detecting drowsiness. The system incorporates an optimization technique—such as Genetic (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. Intelligent Driver Drowsiness Detection System Using Optimized Machine Learning Models.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):397-405.
    : Driver drowsiness is a significant factor contributing to road accidents, resulting in severe injuries and fatalities. This study presents an optimized approach for detecting driver drowsiness using machine learning techniques. The proposed system utilizes real-time data to analyze driver behavior and physiological signals to identify signs of fatigue. Various machine learning algorithms, including Support Vector Machines (SVM), Convolutional Neural Networks (CNN), and Random Forest, are explored for their efficacy in detecting drowsiness. The system incorporates an optimization technique—such as (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34.  43
    Arista's Etherlink AI Platform: AI-based Network Architecture Designed for High-Performance AI Workloads, Focusing on Congestion Avoidance and Optimized Ethernet Utilization.Jonathan Goh Santhosh Katragadda, Odubade Kehinde - 2021 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 4 (6):977-986.
    The rapid expansion of artificial intelligence (AI) and machine learning (ML) workloads has created an urgent demand for high-performance, low-latency network architectures capable of handling massive data transfers with minimal congestion. Traditional Ethernet solutions often struggle with inefficiencies, packet loss, and network congestion, limiting AI scalability and performance. Arista’s Etherlink AI platform introduces an advanced AIoptimized Ethernet architecture designed to enhance congestion avoidance, maximize bandwidth utilization, and provide lossless data transmission for high-performance computing environments. By integrating real-time telemetry, intelligent packet (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35.  71
    ntelligent Hybrid Cloud Data Deduplication for Optimized Storage Utilization.A. Manoj Prabaharan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):625-633.
    The framework leverages a hybrid cloud architecture, combining the scalability of public clouds with the security of private clouds. By employing a combination of client-side hashing, metadata indexing, and machine learning-based duplicate detection, the framework achieves significant storage savings without compromising data integrity. Real-time testing on a hybrid cloud setup demonstrated a 65% reduction in storage needs and a 40% improvement in data retrieval times. Additionally, the system employs blockchain for immutable logging of deduplication activities, enhancing transparency and traceability. This (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36.  82
    User Activity Analysis Via Network Traffic Using DNN and Optimized Federated Learning based Privacy Preserving Method in Mobile Wireless Networks.DrV. R. Vimal and DrR. Sugumar DrR. Udayakumar, Dr Suvarna Yogesh Pansambal, Dr Yogesh Manohar Gajmal - 2023 - INDIA: ESS- ESS PUBLICATION.
    Mobile and wireless networking infrastructures are facing unprecedented loads due to increasing apps and services on mobiles. Hence, 5G systems have been developed to maximise mobile user experiences as they can accommodate large volumes of traffics with extractions of fine-grained data while offering flexible network resource controls. Potential solutions for managing networks and their security using network traffic are based on UAA (User Activity Analysis). DLTs (Deep Learning Techniques) have been recently used in network traffic analysis for better performances. These (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. Efficient Cloud-Enabled Cardiovascular Disease Risk Prediction and Management through Optimized Machine Learning.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):454-475.
    The world's leading cause of morbidity and death is cardiovascular diseases (CVD), which makes early detection essential for successful treatments. This study investigates how optimization techniques can be used with machine learning (ML) algorithms to forecast cardiovascular illnesses more accurately. ML models can evaluate enormous datasets by utilizing data-driven techniques, finding trends and risk factors that conventional methods can miss. In order to increase prediction accuracy, this study focuses on adopting different machine learning algorithms, including Decision Trees, Random Forest, Support (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. Secure Cloud Storage with Machine Learning-Optimized Attribute-Based Access Control Protocols.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):420-435.
    This study examines how ABKS might optimize search efficiency and data security in cloud storage systems. We examine index compression, query processing improvement, and encryption optimization to decrease computational cost and preserve security. After a thorough investigation, the article shows how these methods may boost cloud storage system performance, security, and usability. Tests show that improved ABKS speeds up search searches and lowers storage costs, making it a viable cloud storage alternative. Exploring sophisticated machine learning algorithms for predictive search improvements (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Cloud-Enabled Risk Management of Cardiovascular Diseases Using Optimized Predictive Machine Learning Models.Kannan K. S. - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):460-475.
    Data preparation, feature engineering, model training, and performance evaluation are all part of the study methodology. To ensure reliable and broadly applicable models, we utilize optimization techniques like Grid Search and Genetic Algorithms to precisely adjust model parameters. Features including age, blood pressure, cholesterol levels, and lifestyle choices are employed as inputs for the machine learning models in the dataset, which consists of patient medical information. The predictive capacity of the model is evaluated using evaluation measures, such as accuracy, precision, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Scalable Cloud Solutions for Cardiovascular Disease Risk Management with Optimized Machine Learning Techniques.A. Manoj Prabaharan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):454-470.
    The predictive capacity of the model is evaluated using evaluation measures, such as accuracy, precision, recall, F1-score, and the area under the ROC curve (AUC-ROC). Our findings show that improved machine learning models perform better than conventional methods, offering trustworthy forecasts that can help medical practitioners with early diagnosis and individualized treatment planning. In order to achieve even higher predicted accuracy, the study's conclusion discusses the significance of its findings for clinical practice as well as future improvements that might be (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41.  35
    A just social-ecological transformation is no longer a distant goal, but the power of AI must be optimized in the right way.Thi-Huong Pham & Hong-Kong T. Nguyen - 2025 - Kung Fu Lab (31/3/2025).
    AI can be leveraged to shape and promote community commitments to interdisciplinary responsibility and ethics across three domains: humans, the environment, and technology.
    Download  
     
    Export citation  
     
    Bookmark  
  42.  51
    Harnessing Guidewire Claim Center for Optimized Claim Management: A Blueprint for Efficiency and Customer Satisfaction.Ravi Teja Madhala Sateesh Reddy Adavelli - 2019 - International Journal of Innovative Research in Science, Engineering and Technology 8 (11):11466-11479.
    In today’s fast moving insurance environment, efficient claim management is a vital business practice to improve operational effectiveness and provide an exceptional customer experience. Based on the first notice of loss (FNOL), Guidewire Claim Center, the leading claims management platform, gives insurers the thorough, scalable, and customizable option to accelerate the claims process from FNOL to final resolution. In this paper, we explore how insurers adapt Guidewire Claim Center to enable effective utilization of Guidewire Claim Center to optimize and transform (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43.  28
    Intelligent Sales Pipelines: Leveraging Machine Learning Algorithms for Optimized Deal Closure in Salesforce Ecosystems.Vasanta Kumar Tarra Arun Kumar Mittapelly - 2022 - International Journal of Innovative Research in Computer and Communication Engineering 10 (1):16-26.
    The concept of a sales pipeline has gone through major changes due to the use of machine learning (ML) in managing sales pipelines. Analyzing intelligent sales pipelines that utilize ML algorithms for maximizing the deal closure in Salesforce environments constitutes the focus of this paper. The following discussion extends our prior work by specifically considering how the present approach of predictive modeling, NLP, and clustering contribute to more accurate predictions, better customer understanding, and enhanced targeting. To assess the performance of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44.  70
    Privacy preserving data mining using hiding maximum utility item first algorithm by means of grey wolf optimisation algorithm.Sugumar Rajendran - 2023 - Int. J. Business Intell. Data Mining 10 (2):1-20.
    In the privacy preserving data mining, the utility mining casts a very vital part. The objective of the suggested technique is performed by concealing the high sensitive item sets with the help of the hiding maximum utility item first (HMUIF) algorithm, which effectively evaluates the sensitive item sets by effectively exploiting the user defined utility threshold value. It successfully attempts to estimate the sensitive item sets by utilising optimal threshold value, by means of the grey wolf optimisation (GWO) algorithm. The (...)
    Download  
     
    Export citation  
     
    Bookmark   60 citations  
  45. Optimisation of mixed proportion for cement brick containing plastic waste using response surface methodology (RSM).Chuck Chuan Ng - 2022 - Innovative Infrastructure Solutions 7.
    Plastic waste is a significant environmental problem for almost all countries; therefore, protecting the environment from the problem is crucial. The most sensible solution to these problems is substituting the natural aggregates with substantial plastic waste in various building materials. This study aimed to optimise the mixed design ratio of cement brick containing plastic waste as aggregate replacement. Plastic cement brick mixtures were prepared by the incorporation of four different types of plastic waste such as polyethylene terephthalate (PET), high-density polyethylene, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. The Future of Human-Artificial Intelligence Nexus and its Environmental Costs.Petr Spelda & Vit Stritecky - 2020 - Futures 117.
    The environmental costs and energy constraints have become emerging issues for the future development of Machine Learning (ML) and Artificial Intelligence (AI). So far, the discussion on environmental impacts of ML/AI lacks a perspective reaching beyond quantitative measurements of the energy-related research costs. Building on the foundations laid down by Schwartz et al., 2019 in the GreenAI initiative, our argument considers two interlinked phenomena, the gratuitous generalisation capability and the future where ML/AI performs the majority of quantifiable inductive inferences. The (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  47. The evolution of skilled imitative learning: a social attention hypothesis.Antonella Tramacere & Richard Moore - 2020 - In Ellen Fridland & Carlotta Pavese, The Routledge Handbook of Philosophy of Skill and Expertise. New York, NY: Routledge. pp. 394-408.
    Humans are uncontroversially better than other species at learning from their peers. A key example of this is imitation, the ability to reproduce both the means and ends of others’ behaviours. Imitation is critical to the acquisition of a number of uniquely human cultural and cognitive traits. However, while authors largely agree on the importance of imitation, they disagree about the origins of imitation in humans. Some argue that imitation is an adaptation, connected to the ‘Mirror Neuron System’ that evolved (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  48. A Monetary Case for Value-added Negative Tax.Michael Kowalik - 2015 - Real-World Economics Review 2015 (70):80-91.
    We address the most fundamental yet routinely ignored issue in economics today: that of distributive impact of the monetary system on the real economy. By re-examining the logical implications of token re-presentation of value and Irving Fisher’s theory of exchange, we argue that producers of value incur incidental expropriation of wealth associated with the deflationary effect that new value supply has on the purchasing power of money. In order to remedy the alleged inequity we propose a value-added negative tax (VANT) (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. Technologically scaffolded atypical cognition: the case of YouTube’s recommender system.Mark Alfano, Amir Ebrahimi Fard, J. Adam Carter, Peter Clutton & Colin Klein - 2020 - Synthese 199 (1):835-858.
    YouTube has been implicated in the transformation of users into extremists and conspiracy theorists. The alleged mechanism for this radicalizing process is YouTube’s recommender system, which is optimized to amplify and promote clips that users are likely to watch through to the end. YouTube optimizes for watch-through for economic reasons: people who watch a video through to the end are likely to then watch the next recommended video as well, which means that more advertisements can be served to them. (...)
    Download  
     
    Export citation  
     
    Bookmark   20 citations  
  50. Models and Explanation.Alisa Bokulich - 2017 - In Magnani Lorenzo & Bertolotti Tommaso Wayne, Springer Handbook of Model-Based Science. Springer. pp. 103-118.
    Detailed examinations of scientific practice have revealed that the use of idealized models in the sciences is pervasive. These models play a central role in not only the investigation and prediction of phenomena, but in their received scientific explanations as well. This has led philosophers of science to begin revising the traditional philosophical accounts of scientific explanation in order to make sense of this practice. These new model-based accounts of scientific explanation, however, raise a number of key questions: Can the (...)
    Download  
     
    Export citation  
     
    Bookmark   18 citations  
1 — 50 / 130