Results for 'Python Scripting, Storage Automation, System Architecture, Data Preprocessing, Model Deployment'

986 found
Order:
  1.  45
    Advanced Python Scripting for Storage Automation.Talluri Durvasulu Mohan Babu - 2018 - Turkish Journal of Computer and Mathematics Education 9 (1):643-652.
    Storage automation is critical for managing the vast amounts of data generated in modern computing environments. Advanced Python scripting offers robust solutions for automating storage tasks, enhancing efficiency, scalability, and reliability. This research explores the utilization of Python's versatile libraries and frameworks to develop automated storage systems. We present a comprehensive methodology encompassing system architecture design, data collection and preprocessing, feature engineering, algorithm selection, and model deployment. The study emphasizes the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2.  48
    UNDERSTANDING VMAX AND POWERMAX: A STORAGE EXPERT's GUIDE.T. D. Mohan Babu - 2014 - International Journal of Information Technology and Management Information Systems 5 (1):72-81.
    In the rapidly evolving landscape of data storage solutions, Dell EMC’s VMAX and PowerMax series have emerged as pivotal technologies for enterprise-level storage management. This research article delves into the architectural intricacies, performance benchmarks, and operational efficiencies of VMAX and PowerMax, providing a comprehensive guide for storage experts. By analyzing core components, integration points, and data processing methodologies, the study elucidates the advancements that PowerMax introduces over its predecessor, VMAX. Through empirical data collection, preprocessing, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3.  32
    AWS CLOUD OPERATIONS FOR STORAGE PROFESSIONALS.Talluri Durvasulu Mohan Babu - 2022 - International Journal of Computer Engineering and Technology 13 (1):76-86.
    As organizations increasingly migrate their data infrastructures to the cloud, efficient cloud operations become paramount for storage professionals. Amazon Web Services (AWS) offers a comprehensive suite of tools and services tailored to meet diverse storage needs. This research article explores the operational strategies and best practices for storage professionals leveraging AWS Cloud. It delves into system architecture, data management, security protocols, and performance optimization within the AWS ecosystem. The study employs a mixed-methods approach, combining (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4.  33
    Exploring the Power of Cloud Storage with Azure and AWS.Talluri Durvasulu Mohan Babu - 2022 - International Journal on Recent and Innovation Trends in Computing and Communication 10 (2).
    The proliferation of cloud computing has revolutionized data storage paradigms, offering scalable, flexible, and cost-effective solutions for diverse organizational needs. This research article delves into the comparative analysis of two leading cloud service providers: Microsoft Azure and Amazon Web Services (AWS). By examining their storage offerings, system architectures, integration capabilities, and security protocols, the study aims to provide storage professionals with insights into optimizing cloud storage strategies. The methodology encompasses a comprehensive evaluation of core (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5.  56
    Review of Gen AI Models for Financial Risk Management: Architectural Frameworks and Implementation Strategies.Satyadhar Joshi - 2025 - International Journal of Innovations in Science Engineering and Management 4 (2):222.
    The rapid advancement of generative artificial intelligence (Gen AI) has revolutionized various domains, including financial analytics. This paper provides a comprehensive review of the applications, challenges, and future directions of Gen Al in financial analytics. We explore its role in risk management, credit scoring, feature engineering, and macroeconomic simulations, while addressing limitations such as data quality, interpretability, and ethical concerns. By synthesizing insights from recent literature, we highlight the transformative potential of Gen AI and propose frameworks for its effective (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6.  65
    End - to - End Deep Learning for Detecting Web Attacks.ChRam Reddy DrK. Upendra Babu, C. Gnanendra, ChHruthik, C. Vivek Vardhan - 2025 - International Journal of Innovative Research in Science Engineering and Technology 14 (4):9380-9387.
    Web attacks, such as SQL injection, cross-site scripting (XSS), and distributed denial-ofservice (DDoS), pose significant threats to the security and integrity of online systems. Traditional detection methods, relying on rulebased systems or shallow machine learning, often struggle to keep pace with the evolving sophistication of these attacks. This paper proposes an end-to-end deep learning framework for detecting web attacks, leveraging the power of neural networks to automatically learn complex patterns and features from raw web traffic data. Unlike conventional approaches (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7.  71
    Generative AI-Driven Automated Financial Advisory Systems: Integrating NLP and Reinforcement Learning for Personalized Investment Strategies in FinTech Applications.Sachin Dixit - 2026 - Acta Scientific Computer Sciences 7 (1).
    The advent of generative artificial intelligence (AI) in the financial technology (FinTech) sector has created unprecedented opportunities for automating and enhancing financial advisory systems. This research focuses on the application of generative AI to develop automated financial advisory platforms, integrating natural language processing (NLP) and reinforcement learning (RL) for the formulation of personalized investment strategies. Traditional financial advisory models, often characterized by manual processes, human bias, and limited scalability, are increasingly unable to meet the demands of a fast-paced and diverse (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. Advanced AI Algorithms for Automating Data Preprocessing in Healthcare: Optimizing Data Quality and Reducing Processing Time.Muthukrishnan Muthusubramanian Praveen Sivathapandi, Prabhu Krishnaswamy - 2022 - Journal of Science and Technology (Jst) 3 (4):126-167.
    This research paper presents an in-depth analysis of advanced artificial intelligence (AI) algorithms designed to automate data preprocessing in the healthcare sector. The automation of data preprocessing is crucial due to the overwhelming volume, diversity, and complexity of healthcare data, which includes medical records, diagnostic imaging, sensor data from medical devices, genomic data, and other heterogeneous sources. These datasets often exhibit various inconsistencies such as missing values, noise, outliers, and redundant or irrelevant information that necessitate (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. Smoke Detectors Using ANN.Marwan R. M. Al-Rayes & Samy S. Abu-Naser - 2023 - International Journal of Academic Engineering Research (IJAER) 7 (10):1-9.
    Abstract: Smoke detectors are critical devices for early fire detection and life-saving interventions. This research paper explores the application of Artificial Neural Networks (ANNs) in smoke detection systems. The study aims to develop a robust and accurate smoke detection model using ANNs. Surprisingly, the results indicate a 100% accuracy rate, suggesting promising potential for ANNs in enhancing smoke detection technology. However, this paper acknowledges the need for a comprehensive evaluation beyond accuracy. It discusses potential challenges, such as overfitting, dataset (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  10.  33
    Navigating the World of Cloud Storage: AWS, Azure, and More.Talluri Durvasulu Mohan Babu - 2019 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 2 (8):1667-1673.
    The rapid evolution of cloud computing has revolutionized data storage solutions, offering scalable, flexible, and cost-effective alternatives to traditional on-premises systems. This research provides an in-depth analysis of leading cloud storage providers, including Amazon Web Services (AWS), Microsoft Azure, Google Cloud Platform (GCP), and others. By evaluating their system architectures, core components, integration capabilities, and security measures, this study aims to guide organizations in selecting the most suitable cloud storage solutions tailored to their specific needs. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11.  51
    A Practical Guide to Machine Learning Pipelines in Python.Carter Ingrid Catherine - 2024 - International Journal of Computer Technology and Electronics Communication 7 (2).
    Machine learning (ML) pipelines are essential for automating the workflow involved in model development, from data preprocessing to model evaluation and deployment. A well-structured ML pipeline ensures reproducibility, scalability, and efficiency. This paper offers a comprehensive guide to constructing and optimizing machine learning pipelines in Python, highlighting essential tools, best practices, and common challenges. We discuss the role of various Python libraries like Scikit-learn, TensorFlow, and Apache Airflow in facilitating the automation and deployment (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12.  76
    Automated Plant Disease Detection with Machine Learning.T. Poovizhi S. Tarun Kumar, L. Uday Sai, T. Manoj Gupth, , P. Ganesh - 2025 - International Journal of Innovative Research in Science Engineering and Technology 14 (4):9261-9266.
    The early and accurate detection of plant diseases plays a vital role in minimizing crop damage and enhancing agricultural productivity. Traditional methods for identifying plant diseases—such as manual observation and expert consultations—are often time-consuming, costly, and reliant on the availability of skilled personnel. To overcome these limitations, this study presents an automated system for plant disease detection using advanced machine learning techniques. The proposed framework utilizes convolutional neural networks (CNNs), specifically pretrained models like ResNet and SqueezeNet, to analyze images (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13.  58
    Machine Learning in the Cloud: Best Practices and Use Cases.Padma Kumari Ravichandran Ojaswi Kumari Anand - 2024 - International Journal of Computer Technology and Electronics Communication 7 (1).
    The advent of cloud computing has revolutionized how machine learning (ML) models are developed, trained, and deployed. By providing scalable, on-demand infrastructure, cloud platforms empower researchers, startups, and enterprises to leverage advanced ML capabilities without the burden of maintaining expensive hardware. This paper explores best practices and diverse use cases for implementing machine learning in the cloud, focusing on resource optimization, workflow automation, and model lifecycle management. Cloud-based machine learning offers several strategic benefits including cost-efficiency, ease of access to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14.  34
    Resource-Conscious Secure Storage Model for Ethereum-Based Decentralized Clouds.Dr Chetana Prakash Aashish Kumar Jha, Mohammed Nihar N. R., Sankalpa J. - 2025 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 8 (4):6549-6553.
    As statistics is the backbone of the digital financial system dependence on centralized cloud storage structures makes users prone to troubles concerning statistics breaches operational price and lack of control this paper examines the deployment of a decentralized cloud storage DCS framework with the use of interplanetary file system IPFS and Ethereum blockchain clever contracts to triumph over those drawbacks the gadget proposed here improves protection and information availability by incorporating aes-256 encryption sharding of records (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. AI-Augmented Data Lineage: A Cognitive GraphBased Framework for Autonomous Data Traceability in Large Ecosystems.Pulicharla Dr Mohan Raja - 2025 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 8 (1):377-387.
    In the era of big data and distributed ecosystems, understanding the origin, flow, and transformation of data across complex infrastructures is critical for ensuring transparency, accountability, and informed decision-making. As data-driven enterprises increasingly rely on hybrid cloud architectures, data lakes, and real-time pipelines, the complexity of tracking data movement and transformations grows exponentially. Traditional data lineage solutions, often based on static metadata extraction or rule-based approaches, are insufficient in dynamically evolving environments and fail to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16.  68
    From Automation to Intelligence: Revolutionizing Microservices and API Testing with AI.Pareek Chandra Shekhar - 2024 - International Journal for Research in Applied Science and Engineering Technology 12 (11):716-723.
    The shift to Microservices architecture and Application Programming Interface (API) - first development has transformed the landscape of software engineering, empowering development teams to create highly scalable, modular systems with agile, independent service deployment. However, the complexities of distributed architectures present unique challenges that traditional testing methodologies are often ill-equipped to address. These include managing inter-service dependencies, handling asynchronous communications, and ensuring data consistency across distributed nodes, all of which necessitate advanced testing strategies. This paper explores AI-enhanced testing (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17.  57
    The Role of Network Engineers in Securing Cloud-based Applications and Data Storage.Bellamkonda Srikanth - 2020 - International Journal of Innovative Research in Computerand Communication Engineering 8 (7):2894-2902.
    As organizations increasingly adopt cloud computing to enhance scalability, efficiency, and costeffectiveness, securing cloud-based applications and data storage has become a paramount concern. This shift has redefined the role of network engineers, who are now at the forefront of implementing and managing secure cloud infrastructures. This research paper examines the critical responsibilities of network engineers in safeguarding cloud environments, focusing on the challenges, strategies, and tools they employ to mitigate risks and ensure data integrity. The paper identifies (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18.  51
    Crop Yield Predication using Random Forest Regression Algorithm.Bogireddy Balakrishna Reddy DrR. C. Dyana Priyatharsini, Budha Venkata Raman, Chandu M. N. V. L. Saipraneeth - 2025 - International Journal of Innovative Research in Science Engineering and Technology 14 (4):8985-8990.
    This research presents an automated system for predicting crop yield using the Random Forest Regression algorithm. The model leverages agricultural parameters such as soil composition, rainfall, temperature, and fertilizer usage to provide real-time and accurate yield predictions. A user-friendly web application developed with Python Flask allows for easy interaction, enabling farmers and agricultural professionals to input data and receive yield estimates. The results demonstrate the model’s reliability, achieving over 99% accuracy on test data. The (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. Understanding Emotions through NLP.Gopi Bleesy G. S. Uday Kumar, A. A. Armanulla Khan, B. R. Latha, K. A. Umar Khaleefa - 2025 - International Journal of Innovative Research in Science Engineering and Technology 14 (4):9527-9536.
    : Natural Language Processing (NLP), a subset of Artificial Intelligence (AI), has emerged as a powerful tool in analyzing human language to detect underlying mental health issues such as depression and suicidal tendencies. By leveraging techniques in machine learning and deep learning, NLP systems can process and interpret textual data from diverse sources like social media, forums, and online journals to identify patterns and linguistic markers associated with mental health conditions. These markers include the use of emotionally charged words, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. Automating Data Quality Monitoring In Machine Learning Pipelines.Vijayan Naveen Edapurath - 2023 - Esp International Journal of Advancements in Computational Technology 1 (2):104-111.
    This paper addresses the critical role of automated data quality monitoring in Machine Learning Operations (MLOps) pipelines. As organizations increasingly rely on machine learning models for decision-making, ensuring the quality and reliability of input data becomes paramount. The paper explores various types of data quality issues, including missing values, outliers, data drift, and integrity violations, and their potential impact on model performance. It then examines automated detection methods, such as statistical analysis, machine learning-based anomaly detection, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21.  53
    EVIOT-Futuristic Automation System for Electric Vehicle CS Charging Point Prediction and Booking System.K. Murugan - 2025 - Journal of Artificial Intelligence and Cyber Security (Jaics) 9 (1):1-16.
    The escalating levels of environmental pollution and the depletion of global fossil fuel reserves have accelerated the transition toward sustainable transportation alternatives. Electric Vehicles (EVs) are emerging as a promising solution to mitigate carbon emissions and reduce national oil import dependencies. However, the growing adoption of EVs presents new challenges, particularly in terms of establishing a scalable and efficient charging infrastructure. This paper presents the framework and architecture of a next-generation communication system designed for real-time EV charging slot prediction (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22.  98
    Using Foundation Models to Automate ETL Pipeline Creation, Management.Hima Priya Reddyvari Naveen Edapurath Vijayan - 2025 - International Journal of Innovative Research in Science, Engineering and Technology (Ijirset) 14 (4):5427-5436.
    Foundation models, particularly large language models (LLMs), are transforming how data engineering tasks are automated across domains. This paper explores the use of LLMs to automate the creation, management, and optimization of Extract-Transform-Load (ETL) pipelines in a domain-agnostic manner. We provide conceptual frameworks and practical strategies for integrating foundation models into the ETL lifecycle, and we highlight use cases where such models (via platforms like Amazon Bedrock) generate pipeline code, enhance data transformation quality, and adapt pipeline execution. Through (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23.  38
    Real-Time Cyber Threat Detection and Response System.P. Abirami V. Phanikumar, V. Venkata Nani, V. Premkumar, Y. Nithish Naidu - 2025 - International Journal of Innovative Research in Science Engineering and Technology 14 (4).
    The Real-Time Cyber Threat Detection and Response System is an intelligent security framework designed to proactively identify, analyze, and respond to cyber threats in real time. With the growing sophistication of cyberattacks targeting critical infrastructure, traditional static defense mechanisms are no longer sufficient. This system addresses that gap by leveraging machine learning algorithms and dimensionality reduction techniques such as Principal Component Analysis (PCA) to enable accurate and efficient threat detection. The system captures input data, such as (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. REAL-TIME DATA STREAM PROCESSING WITH KAFKA- DRIVEN AI MODELS.Tambi Varun Kumar - 2023 - International Journal of Current Engineering and Scientific Research (IJCESR) 10 (10):1-9.
    In today’s data-intensive world, real-time insights have become essential for businesses and systems that demand timely and intelligent decision-making. Traditional batch processing techniques are increasingly inadequate for handling high-velocity data streams generated from IoT devices, social media platforms, financial transactions, and industrial systems. This paper presents an architectural approach to real-time data stream processing using Apache Kafka integrated with AI models to enable dynamic analytics and automated responses. The system leverages Kafka's distributed messaging capabilities for reliable (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  25.  63
    From Entropic Encoding to Resonant Memory_ A CODES-Based Architecture for DNA Data Systems.Devin Bostick - manuscript
    Abstract -/- This paper introduces a structured resonance-based alternative to traditional entropy-driven DNA data storage. By replacing probabilistic base encoding with CODES-guided coherence architecture, we demonstrate how the Resonance Intelligence Core (RIC) drastically improves information density, fidelity, and long-term retrieval. Our system maps prime-phase logic directly into base-pair harmonics using PAS (Phase Alignment Score), enabling coherent memory encoding in DNA with error rates and costs significantly lower than stochastic methods. We present side-by-side simulations, coherence-anchored Verilog/Python code, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Layered App Security Architecture for Protecting Sensitive Data.Tambi Varun Kumar - 2016 - International Journal of Research in Electronics and Computer Engineering 4 (3):1-15.
    As applications increasingly handle sensitive and personal information, ensuring the security of this data has become a critical concern across industries such as finance, healthcare, and e-commerce. Traditional security mechanisms that rely on single-point protection models are no longer sufficient to mitigate the growing complexity and frequency of cyber threats. This paper presents a comprehensive Layered App Security Architecture aimed at safeguarding sensitive data through a multi-tiered defense approach. The proposed framework incorporates security controls at every architectural layer, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27.  69
    Agentic AI for Secure Financial Data Processing: Real-Time Analytics, Cloud Migration, and Risk Mitigation in AWS-Based Architectures.Kumar Rohit - 2025 - International Journal of Innovative Research in Science Engineering and Technology 14 (4):5488-5498.
    Using Agentic AI in concert with AWS Full Stack Development, this study offers a technically solid and scalable method to securely process financial data. AWS Lambda for serverless computation, Amazon S3 for scalable storage, AWS Glue for data classification and transformation, Athena for SQL-like querying, and QuickSight for interactive visualisation comprise the fundamental elements of the system. While Agentic AI modules enable autonomous decision-making abilities to regulate data integrity, recognise abnormalities, and adaptably react to compliance (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28.  40
    DataBuddy: No-Code Data Science Tool.Yadav Kunal - 2025 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 8 (4).
    Data analysis and machine learning are increasingly essential in various industries; however, the complexity of existing tools creates barriers for non-technical users. This paper presents DataBuddy, a no-code tool designed to automate data analysis and machine learning processes through an intuitive graphical interface. DataBuddy integrates Python libraries like Pandas, Matplotlib, Seaborn, and Scikit-Learn, providing features such as automated exploratory data analysis (EDA), dynamic visualizations, and machine learning model training — all without requiring programming knowledge. The (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29.  36
    Edge Computing in IoT Networks: Reducing Latency and Enhancing Scalability.Pednekar Saurabh Chandresh - 2025 - International Journal of Computer Technology and Electronics Communication 8 (1).
    The Internet of Things (IoT) has revolutionized the way we interact with the world by enabling devices to collect, process, and exchange data in real time. However, IoT networks often face challenges related to latency and scalability when large amounts of data are processed centrally in cloud-based infrastructures. Edge computing, which brings computation and data storage closer to the source of data generation, is emerging as a solution to address these challenges. By performing computation at (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. The Qualitative Role of Big data and Internet of Things for Future Generation-A Review.M. Arun Kumar & A. Manoj Prabaharan - 2021 - Turkish Online Journal of Qualitative Inquiry (TOJQI) 12 (3):4185-4199.
    The Internet of Things (IoT) wireless LAN in healthcare has moved away from traditional methods that include hospital visits and continuous monitoring. The Internet of Things allows the use of certain means, including the detection, processing and transmission of physical and biomedical parameters. With powerful algorithms and intelligent systems, it will be available to provide unprecedented levels of critical data for real-time life that are collected and analyzed to guide people in research, management and emergency care. This chapter provides (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Multi-Layer Intrusion Detection Framework for IoT Systems Using Ensemble Machine Learning.Janet Yan - manuscript
    The proliferation of Internet of Things (IoT) devices has introduced a range of opportunities for enhanced connectivity, automation, and efficiency. However, the vast array of interconnected devices has also raised concerns regarding cybersecurity, particularly due to the limited resources and diverse nature of IoT devices. Intrusion detection systems (IDS) have emerged as critical tools for identifying and mitigating security threats. This paper proposes a Multi-Layer Intrusion Detection Framework for IoT systems, leveraging Ensemble Machine Learning (EML) techniques to improve the accuracy (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32.  37
    Heart Disease Prediction using Machine Learning.DrL. Godlin Atlas D. Chakradhar, D. Sagar, Ch Murali Krishna, D. Venugopal - 2025 - International Journal of Innovative Research in Science Engineering and Technology 14 (4):9639-9646.
    The Web Article Summarizer is an advanced NLP-based application that leverages state-of-the-art transformer models, including BART for abstractive summarization and BERT for contextual understanding, combined in a dual-encoder architecture to generate accurate and coherent summaries from lengthy articles. Built using the Flask framework, the system features a scalable RESTful API that enables seamless integration with web and mobile platforms, while its multi-stage preprocessing pipeline ensures optimal text normalization and feature extraction. Evaluated using ROUGE metrics, the solution demonstrates superior performance (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33.  31
    Zero Trust Security Architecture: A Paradigm Shift in Data Protection and Access Control.Baladari Venkata - 2023 - European Journal of Advances in Engineering and Technology 10 (6):87-94.
    A contemporary cybersecurity strategy known as the Zero Trust Security Model aims to eradicate implicit trust and ensure uninterrupted authentication for every user, device, and application. Zero Trust security models diverge from conventional perimeter-based security by anticipating threats within and beyond the network, necessitating rigorous authentication and limitations on user access privileges. Components like Multi-Factor Authentication (MFA), Zero Trust Network Access (ZTNA), micro-segmentation, and AI-driven threat detection strengthen security by reducing vulnerabilities and stopping unauthorized access. The integration of Artificial (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34.  78
    Automated Document Classification using YOLOv3 and Tkinter for Real-Time Segmentation.Jampa Jyothi Swroop V. Kanchana, Kagitha Sarath Chandra, - 2025 - International Journal of Innovative Research in Science Engineering and Technology 14 (4):8999-9004.
    The project Automated Document Classification using YOLOv3 and Tkinter for Real-Time Segmentation presents an innovative solution for automating the extraction of visual content from PDF documents using advanced computer vision techniques. Leveraging the power of the YOLOv3 object detection model, combined with pdf2image, OpenCV, and Tkinter, the system efficiently converts PDF pages into high-resolution images, detects and labels objects within them, and presents the results through a user-friendly graphical interface. This approach significantly reduces manual labor and error in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. Decentralized AI: The role of edge intelligence in next-gen computing.V. Talati Dhruvitkumar - 2021 - International Journal of Science and Research Archive 2 (1):216-232.
    With the rapid development of communication technology, the explosive growth of mobile and IoT devices, and growing requirements for real-time data processing, a new paradigm of computing, Edge Computing, has appeared. It moves computing power in the direction of data sources to mitigate latency, bandwidth usage, and dependence on cloud computing. In parallel, Artificial Intelligence (AI) has progressed notably with deep learning technology, highly optimized hardware, and distributed computing paradigms to yield smart applications of high computational loads. Nonetheless, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36.  53
    Automated Intelligence: Machine Learning in Metadata Processing.Sharma Aarav Rajesh - 2024 - International Journal of Multidisciplinary Research in Science, Engineering, Technology and Managemen 11 (2).
    The rapid expansion of digital data has made metadata crucial in organizing, managing, and retrieving information effectively. Machine learning (ML) offers powerful tools to automate and enhance metadata processing, leading to improved accuracy, scalability, and efficiency. This paper explores how ML algorithms are applied to metadata extraction, classification, annotation, and enrichment. We review current research, examine the methodologies employed, and present a comparative analysis of techniques. Our findings suggest that supervised learning models, especially deep learning architectures, outperform traditional rule-based (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37.  67
    Design and Development of an Efficient Internship Management System.Prof Kunal R. Ahire Parth D. Bhavar, Arpita J. Yeole, Harsh M. Chordiya, Mugdha R. Puntambekar - 2025 - International Journal of Innovative Research in Science Engineering and Technology 14 (4).
    This paper presents the design and real-world implementation of an efficient, web-based Internship Management System (IMS) developed using the Django framework. The system addresses the limitations of traditional manual internship processes, which are often fragmented, time-consuming, and prone to communication gaps. The proposed IMS provides a centralized platform that integrates all key stakeholders—interns, human resources (HR), and hiring managers—thereby streamlining the entire internship lifecycle from application submission to project assignment, performance evaluation, and certificate generation. The system incorporates (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. Integration of Intelligence Data through Semantic Enhancement.David Salmen, Tatiana Malyuta, Alan Hansen, Shaun Cronen & Barry Smith - 2011 - In David Salmen, Tatiana Malyuta, Alan Hansen, Shaun Cronen & Barry Smith, Integration of Intelligence Data through Semantic Enhancement. CEUR, Vol. 808.
    We describe a strategy for integration of data that is based on the idea of semantic enhancement. The strategy promises a number of benefits: it can be applied incrementally; it creates minimal barriers to the incorporation of new data into the semantically enhanced system; it preserves the existing data (including any existing data-semantics) in their original form (thus all provenance information is retained, and no heavy preprocessing is required); and it embraces the full spectrum of (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  39.  53
    Cloud Resiliency Engineering: Best Practices for Ensuring High Availability in Multi-Cloud Architectures.Baladari Venkata - 2022 - International Journal of Science and Research 11 (6):2062-2067.
    Ensuring cloud resiliency through engineering is essential for maintaining high availability, fault tolerance, and disaster recovery within contemporary cloud infrastructures. As more businesses move towards multi - cloud environments, maintaining system reliability and efficiency while also controlling costs takes centre stage. This study delves into optimal strategies for bolstering cloud reliability via automated failover systems, real - time data duplication, load distribution, and self - restoring networks. The analysis focuses on strategies for disaster recovery, cost - effective resource (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  40.  49
    Automated Sign Language Recognition with Machine Learning.Javadi Adarsh Kumar Prashanthi Regonda, Eppili Jatin, Attem Varun Yadav - 2025 - International Journal of Innovative Research in Science Engineering and Technology 14 (4):9099-9015.
    The purpose of this research is to design a system using machine learning to automate sign language gesture recognition and facilitate unproblematic interaction between the hearing/speech impaired community and society as a whole. This research works towards solving the communication disability faced by the deaf and mute community through a computer vision framework for recognizing hand gestures and mapping them to relevant text or speech. The work employs a rich dataset of static American Sign Language (ASL) hand signs and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. Building Scalable MLOps: Optimizing Machine Learning Deployment and Operations.Vijayan Naveen Edapurath - 2024 - International Journal of Scientific Research in Engineering and Management 8 (10):1-5.
    As machine learning (ML) models become increasingly integrated into mission-critical applications and production systems, the need for robust and scalable MLOps (Machine Learning Operations) practices has grown significantly. This paper explores key strategies and best practices for building scalable MLOps pipelines to optimize the deployment and operation of machine learning models at an enterprise scale. It delves into the importance of automating the end-to-end lifecycle of ML models, from data ingestion and model training to testing, deployment, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42.  39
    A Predictive Approach to Cloud Storage Cost Optimization.Baladari Venkata - 2023 - International Journal of Science and Research (IJSR) 12 (8):2583-2586.
    Cloud storage has become an essential component of modern data management, but increasing storage costs present a significant challenge for organizations. Conventional tier-based storage systems necessitate manual distribution, resulting in potential inefficiencies and increased expenses. This study presents a forecasting model for intelligent data tiering, utilizing machine learning to automate storage selections based on access frequency. Utilizing historical usage patterns, the model automatically categorizes data into three storage tiers: hot, warm, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43.  65
    Next-Gen Test Automation in Life Insurance: Self-Healing Frameworks.Pareek Chandra Shekhar - 2021 - International Journal of Scientific Research in Engineering and Management 5 (7):1-13.
    The exponential complexity of contemporary Life Insurance applications - shaped by stringent regulatory compliance requirements, dynamic customer - centric innovation, and expansive product diversification - has magnified the challenges of maintaining traditional test automation frameworks. These frameworks often falter under the weight of frequent application updates, evolving user interfaces (UI), and fluctuating backend integrations, leading to brittle test scripts and heightened maintenance costs. Self-healing test automation frameworks offer a cutting-edge, AI-driven solution to this paradigm. By leveraging advanced machine learning (ML) (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  44. Predicting Heart Disease using Neural Networks.Ahmed Muhammad Haider Al-Sharif & Samy S. Abu-Naser - 2023 - International Journal of Academic Information Systems Research (IJAISR) 7 (9):40-46.
    Cardiovascular diseases, including heart disease, pose a significant global health challenge, contributing to a substantial burden on healthcare systems and individuals. Early detection and accurate prediction of heart disease are crucial for timely intervention and improved patient outcomes. This research explores the potential of neural networks in predicting heart disease using a dataset collected from Kaggle, consisting of 1025 samples with 14 distinct features. The study's primary objective is to develop an effective neural network model for binary classification, identifying (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  45. Forecasting COVID-19 cases Using ANN.Ibrahim Sufyan Al-Baghdadi & Samy S. Abu-Naser - 2023 - International Journal of Academic Engineering Research (IJAER) 7 (10):22-31.
    Abstract: The COVID-19 pandemic has posed unprecedented challenges to global healthcare systems, necessitating accurate and timely forecasting of cases for effective mitigation strategies. In this research paper, we present a novel approach to predict COVID-19 cases using Artificial Neural Networks (ANNs), harnessing the power of machine learning for epidemiological forecasting. Our ANNs-based forecasting model has demonstrated remarkable efficacy, achieving an impressive accuracy rate of 97.87%. This achievement underscores the potential of ANNs in providing precise and data-driven insights into (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  46.  81
    CLOUD-NATIVE MODEL DEPLOYMENT FOR FINANCIAL APPLICATIONS.Tambi Varun Kumar - 2015 - International Journal of Current Engineering and Scientific Research (IJCESR) 2 (9):114-123.
    The financial industry is increasingly embracing cloud-native technologies to ensure scalable, reliable, and secure deployment of AI/ML models for critical applications such as fraud detection, risk assessment, and real-time customer analytics. Traditional on-premise or monolithic deployment approaches limit agility and scalability, particularly in environments requiring high-frequency data processing and compliance adherence. This paper explores a comprehensive framework for cloud-native model deployment tailored specifically for financial applications, incorporating containerization, orchestration, CI/CD pipelines, and microservices architecture.
    Download  
     
    Export citation  
     
    Bookmark  
  47.  73
    Enhancing Data Centre Networks through Cisco Application Centric Infrastructure (ACI).Sandesh Jagtap Abhishek Pawaskar, Sneha Shinde, Pramila Malbhage - 2018 - International Journal of Advanced Research in Education and Technology 5 (1).
    : In the evolving landscape of data center networks, agility, automation, and scalability have become essential components for modern enterprise IT infrastructures. Cisco's Application Centric Infrastructure (ACI) represents a significant shift toward intent-based networking by aligning network operations with application requirements. This paper explores how Cisco ACI enhances data center performance, simplifies network management, and supports rapid application deployment through a software-defined networking (SDN) approach Cisco ACI is built around a policy-driven model that integrates software and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48.  73
    Cryptocurrency Price Forecasting with Sentiment-Driven Alerts using ML.K. Kavitha K. Abhinay, K. Tharun, K. Saicharan, K. Gopi - 2025 - International Journal of Innovative Research in Science Engineering and Technology 14 (4):9280-9287.
    Cryptocurrency price forecasting is a challenging task due to market volatility and unpredictable investor behavior. This project introduces a sentiment-driven machine learning approach to improve prediction accuracy. Sentiment data is collected from platforms like Twitter and financial news using Natural Language Processing (NLP) techniques. These sentiments are quantified and combined with historical price data to form a robust dataset. An LSTM (Long Short-Term Memory) model is used for its ability to learn temporal dependencies in timeseries data. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. AI-Driven Synthetic Data Generation for Financial Product Development: Accelerating Innovation in Banking and Fintech through Realistic Data Simulation.Debasish Paul Rajalakshmi Soundarapandiyan, Praveen Sivathapandi - 2022 - Journal of Artificial Intelligence Research and Applications 2 (2):261-303.
    The rapid evolution of the financial sector, particularly in banking and fintech, necessitates continuous innovation in financial product development and testing. However, challenges such as data privacy, regulatory compliance, and the limited availability of diverse datasets often hinder the effective development and deployment of new products. This research investigates the transformative potential of AI-driven synthetic data generation as a solution for accelerating innovation in financial product development. Synthetic data, generated through advanced AI techniques such as Generative (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50.  35
    Detecting Hate Speech in Tweets with Advanced Machine Learning Techniques.Dornipadu Karthika Chaitrika, Chillale Lalitha, Erthineni Gnanasai, Deshai Keerthi & K. Mudduswamy - 2025 - International Journal of Scientific Research in Science, Engineering and Technology 12 (3).
    Hate speech detection is a critical aspect of online content moderation, ensuring that digital platforms remain safe and inclusive. With the exponential rise of social media, harmful content such as hate speech and offensive language has increased, necessitating automated solutions for effective moderation. This project employs Natural Language Processing (NLP) and Machine Learning (ML) techniques to classify tweets into three categories: Hate Speech, Offensive Speech, and No Hate or Offensive Speech. By leveraging a Decision Tree Classifier, the system efficiently (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 986