Results for 'anomaly detection'

986 found
Order:
  1.  16
    Real Time Anomaly Detection using Drone Surveillance.Aparna Burhade Raj Shah - 2021 - International Journal of Innovative Research in Science, Engineering and Technology 10 (10):13696-13701.
    Deep learning has shown significant performance in many domains including natural language processing, recommendation systems, and self-driving cars in current years. From all the available applications detecting anomalies is a key problem that has been studied within research domains. The purpose is to assists with recognizing individual actions and detecting whether it is an anomaly or normal activity. To address this challenge of a detection algorithm for action recognition the author has presented a 3dimesional convolutional neural network model (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2.  24
    Advanced Threat Detection Using AI-Driven Anomaly Detection Systems.Sharma Sidharth - 2024 - Journal of Science Technology and Research (JSTAR) 4 (1):266-272.
    In the rapidly evolving digital landscape, cyber threats are becoming increasingly sophisticated, making traditional security measures inadequate. Advanced Threat Detection (ATD) leveraging Artificial Intelligence (AI)-driven anomaly detection systems offers a proactive approach to identifying and mitigating cyber threats in real time. This paper explores the integration of AI, particularly machine learning (ML) and deep learning (DL) techniques, in anomaly detection to enhance cybersecurity defenses. By analyzing vast amounts of network traffic, user behavior, and system logs, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3.  39
    Examination of Anomaly Process Detection Using Negative Selection Algorithm and Classification Techniques.Sharma Sakshi - 2020 - International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering (Ijareeie) 9 (6):2526-2534.
    The examination of anomaly process detection using negative selection algorithms and classification techniques focuses on enhancing the ability to identify deviations from expected patterns within complex data sets. Negative selection algorithms, inspired by biological immune systems, offer a novel approach to anomaly detection by efficiently distinguishing between normal and anomalous data points. When combined with various classification techniques, these algorithms can improve the accuracy and robustness of anomaly detection systems. This abstract explores the integration (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  4. Network Intrusion Detection using Machine Learning.B. Ravinder Reddy - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (4):1-15.
    With the growing sophistication and frequency of cyberattacks, there is a critical need for effective systems that can detect and prevent breaches in real time. The AI/ML-based Network Intrusion Detection System (NIDS) addresses this need by analyzing traffic patterns to identify security breaches in firewalls, routers, and network infrastructures. By integrating machine learning algorithms—K-Nearest Neighbors (KNN), Support Vector Machine (SVM), and Random Forest—the system is able to detect both known cyber threats and previously unseen attack vectors. Unlike traditional methods (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. HARNESSING AI FOR EVOLVING THREATS: FROM DETECTION TO AUTOMATED RESPONSE.Sanagana Durga Prasada Rao - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):91-97.
    The landscape of cybersecurity is constantly evolving, with adversaries becoming increasingly sophisticated and persistent. This manuscript explores the utilization of artificial intelligence (AI) to address these evolving threats, focusing on the journey from threat detection to autonomous response. By examining AI-driven detection methodologies, advanced threat analytics, and the implementation of autonomous response systems, this paper provides insights into how organizations can leverage AI to strengthen their cybersecurity posture against modern threats. Key words: Ransomware, Anomaly Detection, Advanced (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  6. Performance Comparison and Implementation of Bayesian Variants for Network Intrusion Detection.Tosin Ige & Christopher Kiekintveld - 2023 - Proceedings of the IEEE 1:5.
    Bayesian classifiers perform well when each of the features is completely independent of the other which is not always valid in real world applications. The aim of this study is to implement and compare the performances of each variant of the Bayesian classifier (Multinomial, Bernoulli, and Gaussian) on anomaly detection in network intrusion, and to investigate whether there is any association between each variant’s assumption and their performance. Our investigation showed that each variant of the Bayesian algorithm blindly (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  7.  48
    Advanced Network Traffic Analysis Models for Detecting Sophisticated Cyber Espionage Campaigns.V. Jain Jayant - 2025 - International Journal of Advanced Research in Cyber Security 6 (1):6-10.
    Cyber espionage campaigns pose significant challenges to global security, exploiting vulnerabilities in network infrastructures. This research paper explores advanced network traffic analysis models tailored for detecting sophisticated cyber espionage operations. The study focuses on leveraging machine learning algorithms, anomaly detection systems, and hybrid threat detection frameworks to identify subtle yet malicious activities within network traffic. Through a review of research, this paper synthesizes key findings and outlines practical applications, offering a roadmap for enhancing cybersecurity frameworks. Findings highlight (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8.  35
    Comprehensive Detection of Malware and Trojans in Power Sector Software: Safeguarding Against Cyber Threats.A. Sai Lochan - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (11):1-14.
    The increasing reliance on digital technologies within the power sector has introduced considerable cybersecurity risks, especially from malware and trojans. These threats can disrupt essential operations, manipulate grid functions, and compromise the integrity of energy systems, thereby endangering both economic stability and national security. This research aims to create a detection framework tailored to the specific challenges of the power sector. The proposed framework utilizes advanced methods such as behaviour based anomaly detection, machine learning algorithms, and both (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. Artificial Intelligence in Cybersecurity: Revolutionizing Threat Detection and Response.B. Yogeshwari - 2025 - International Journal of Innovative Research in Science Engineering and Technology 14 (3):2217-2223.
    The rapid evolution of cyber threats has made traditional cybersecurity methods increasingly inadequate. Artificial Intelligence (AI) has emerged as a transformative technology in the field of cybersecurity, offering enhanced capabilities for detecting and responding to cyber threats in real time. This paper explores the role of AI in revolutionizing cybersecurity, focusing on its applications in threat detection, anomaly detection, and automated response systems. Through the use of machine learning algorithms, AI can analyze vast amounts of data, identify (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10.  17
    Detecting Post-Biological and Interdimensional Civilizations: A New Framework Based on the Universal Law of Balance.Angelito Malicse - manuscript
    Detecting Post-Biological and Interdimensional Civilizations: A New Framework Based on the Universal Law of Balance -/- By: Angelito Enriquez Malicse -/- Introduction -/- The search for advanced extraterrestrial civilizations has long focused on physical evidence—radio signals, megastructures, or interstellar probes. However, if intelligence evolves beyond biological form, as suggested by AI-driven civilizations and interdimensional theories, traditional search methods may be inadequate. -/- This essay explores how the Universal Law of Balance in Nature can help predict the existence of post-biological civilizations (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11.  26
    Data Visualization in Financial Crime Detection: Applications in Credit Card Fraud and Money Laundering.Palakurti Naga Ramesh - 2023 - International Journal of Management Education for Sustainable Development 6 (6).
    This research paper investigates the transformative applications of data visualization techniques in the realm of financial crime detection, with a specific emphasis on addressing the challenges posed by credit card fraud and money laundering. The abstract explores the intricate landscape of visualizing financial data to uncover patterns, anomalies, and potential illicit activities. Through a comprehensive review of existing methodologies and case studies, the paper illuminates the pivotal role data visualization plays in enhancing the efficiency and accuracy of fraud (...) systems. By synergizing advanced visualization tools with machine learning algorithms, the study aims to provide insights into how financial institutions can bolster their defenses against evolving threats. Ethical considerations, usability, and the real-world impact of data visualization in combating financial crime are also scrutinized. This research contributes to the evolving discourse on leveraging visualization technologies to fortify financial systems against illicit activities, fostering a proactive and responsive approach to safeguarding economic ecosystems. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  12. Machine Learning-Based Intrusion Detection Framework for Detecting Security Attacks in Internet of Things.Jones Serena - manuscript
    The proliferation of the Internet of Things (IoT) has transformed various industries by enabling smart environments and improving operational efficiencies. However, this expansion has introduced numerous security vulnerabilities, making IoT systems prime targets for cyberattacks. This paper proposes a machine learning-based intrusion detection framework tailored to the unique characteristics of IoT environments. The framework leverages feature engineering, advanced machine learning algorithms, and real-time anomaly detection to identify and mitigate security threats effectively. Experimental results demonstrate the efficacy of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13.  88
    AN INTRUSION DETECTION SYSTEM MODEL FOR DETECTING KNOWN AND INNOVATIVE CYBER ATTACKS USING SVM ALGORITHM.Selvan Arul - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):150-157.
    Nowadays, intrusions have become a major problem faced by users. To stop these cyber attacks from happening, the development of a reliable and effective Intrusion Detection System (IDS) for cyber security has become an urgent issue to be solved. The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used to train (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. Classification of Anomalies in Gastrointestinal Tract Using Deep Learning.Ibtesam M. Dheir & Samy S. Abu-Naser - 2022 - International Journal of Academic Engineering Research (IJAER) 6 (3):15-28.
    Automatic detection of diseases and anatomical landmarks in medical images by the use of computers is important and considered a challenging process that could help medical diagnosis and reduce the cost and time of investigational procedures and refine health care systems all over the world. Recently, gastrointestinal (GI) tract disease diagnosis through endoscopic image classification is an active research area in the biomedical field. Several GI tract disease classification methods based on image processing and machine learning techniques have been (...)
    Download  
     
    Export citation  
     
    Bookmark   30 citations  
  15. Fraud Detection and Analysis for Insurance Claim using Machine Learning.S. Ramasamy - 2025 - Journal of Science Technology and Research (JSTAR) 6 (1):1-13.
    Fraudulent activities in insurance claims have become a significant challenge for the insurance industry, leading to substantial financial losses annually. This project, titled "Fraud Detection and Analysis for Insurance Claim using Machine Learning" aims to develop a robust and an efficient system to identify and analyze fraudulent claims. The system leverages machine learning techniques to analyze patterns, anomalies, and inconsistencies in claim data, enabling early detection of potentially fraudulent activities.
    Download  
     
    Export citation  
     
    Bookmark  
  16. Reinterpreting Relativity: Using the Equivalence Principle to Explain Away Cosmological Anomalies.Marcus Arvan - manuscript
    According to the standard interpretation of Einstein’s field equations, gravity consists of mass-energy curving spacetime, and an additional physical force or entity—denoted by Λ (the ‘cosmological constant’)—is responsible for the Universe’s metric-expansion. Although General Relativity’s direct predictions have been systematically confirmed, the dominant cosmological model thought to follow from it—the ΛCDM (Lambda cold dark matter) model of the Universe’s history and composition—faces considerable challenges, including various observational anomalies and experimental failures to detect dark matter, dark energy, or inflation-field candidates. This (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. SAR-BSO meta-heuristic hybridization for feature selection and classification using DBNover stream data.Dharani Talapula, Kiran Ravulakollu, Manoj Kumar & Adarsh Kumar - forthcoming - Artificial Intelligence Review.
    Advancements in cloud technologies have increased the infrastructural needs of data centers due to storage needs and processing of extensive dimensional data. Many service providers envisage anomaly detection criteria to guarantee availability to avoid breakdowns and complexities caused due to large-scale operations. The streaming log data generated is associated with multi-dimensional complexity and thus poses a considerable challenge to detect the anomalies or unusual occurrences in the data. In this research, a hybrid model is proposed that is motivated (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18.  49
    Road Abnormality Detection.C. Dastagiriaiah - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (3):1-13.
    Road abnormalities, such as speed breakers and potholes, pose significant risks to traffic safety, contributing to accidents, vehicle damage, and driver discomfort. Traditional methods for detecting these issues are primarily manual and reactive, leading to inefficiencies in maintenance and increased hazards for road users. To address this urgent need, the proposed project aims to develop a computer vision-based system for the automatic detection of these road anomalies. By utilizing techniques such as image processing and analysis through OpenCV, the system (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19.  27
    Enhancing Cloud Security with AI-Based Intrusion Detection Systems.Sharma Sidharth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):658-664.
    Cloud computing has transformed data management by providing scalable and on-demand services, but its open and shared infrastructure makes it highly vulnerable to sophisticated cyber threats. Traditional Intrusion Detection Systems (IDS) struggle with dynamic and large-scale cloud environments due to high false positives, limited adaptability, and computational overhead. To address these challenges, this paper proposes an AI-driven Intrusion Detection System (AI-IDS) that leverages deep learning models, including Convolutional Neural Networks (CNN) and Long Short-Term Memory (LSTM) networks, to analyze (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20.  29
    Automating Data Quality Monitoring In Machine Learning Pipelines.Vijayan Naveen Edapurath - 2023 - Esp International Journal of Advancements in Computational Technology 1 (2):104-111.
    This paper addresses the critical role of automated data quality monitoring in Machine Learning Operations (MLOps) pipelines. As organizations increasingly rely on machine learning models for decision-making, ensuring the quality and reliability of input data becomes paramount. The paper explores various types of data quality issues, including missing values, outliers, data drift, and integrity violations, and their potential impact on model performance. It then examines automated detection methods, such as statistical analysis, machine learning-based anomaly detection, rule-based systems, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21.  48
    Integrating Ensemble _Deep Learning Models for Cybersecurity in Cloud Network Forensics (12th edition).B. Menaka Dr S. Arulselvarani, - 2024 - International Journal of Multidisciplinary and Scientific Emerging Research 12 (4):2653-2606. Translated by Dr. S. Arulselvarani.
    To evaluate the effectiveness of our approach to enhancing cloud computing network forensics by integrating deep learning techniques with cybersecurity policies. With the increasing complexity and volume of cyber threats targeting cloud environments, traditional forensic methods are becoming inadequate. Deep learning techniques offer promising solutions for analyzing vast amounts of network data and detecting anomalies indicative of security breaches. By integrating deep learning models with cybersecurity policies, organizations can achieve enhanced threat detection, rapid response times, and improved overall security (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22.  11
    CYBERSECURITY STRATEGIES FOR IOT DEVICES IN SMART CITIES.Sharma Sidharth - 2017 - Journal of Artificial Intelligence and Cyber Security (Jaics) 1 (1):1-6.
    The rapid proliferation of Internet of Things (IoT) devices in smart cities has introduced numerous benefits, enhancing urban efficiency, sustainability, and automation. However, these interconnected systems also pose significant cybersecurity challenges, including data breaches, unauthorized access, and cyberattacks that can compromise critical infrastructure. This paper explores various cybersecurity strategies tailored for IoT environments in smart cities, focusing on encryption techniques, secure authentication mechanisms, network security protocols, and blockchain-based security models. Additionally, it discusses machine learningbased anomaly detection systems to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23.  91
    Smart City and IoT Data Collection Leveraging Generative AI.Eric Garcia - manuscript
    The rapid urbanization of modern cities necessitates innovative approaches to data collection and integration for smarter urban management. With the Internet of Things (IoT) at the core of these advancements, the ability to efficiently gather, analyze, and utilize data becomes paramount. Generative Artificial Intelligence (AI) is revolutionizing data collection by enabling intelligent synthesis, anomaly detection, and real-time decision-making across interconnected systems. This paper explores how generative AI enhances IoT-driven data collection in smart cities, focusing on applications in transportation, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24.  12
    Zero-Day Threat Protection: Advanced Cybersecurity Measures for Cloud-Based Guidewire Implementations.Adavelli Sateesh Reddy - 2023 - International Journal of Science and Research (IJSR) 12 (9):2219-2231.
    The contribution of this paper is a comprehensive cybersecurity framework to secure cloud hosted Guidewire implementations by addressing critical security challenges such as threat detection, incident response, compliance, and system performance. Based on advanced technologies like machine learning, behavioral analytics and auto patching, the framework detects and mitigates known and unknown threats, incidentally zero-day exploit. The system does this through micro segmenting, behavioral anomaly detection, and automated patch orchestration in a way that does not render the system (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25.  34
    Online Voting System_ using Machine Learning (13th edition).Shubham T. Borsare Vaishnavi D. Patil - 2025 - International Journal of Innovative Research in Computer and Communication Engineering 13 (1):1129-1131. Translated by Shubham T. Borsare Vaishnavi D. Patil.
    The increasing demand for secure and efficient voting systems has led to the exploration of online voting solutions. Traditional voting methods are often vulnerable to fraud, inefficiencies, and logistical challenges. This paper presents an online voting system that leverages machine learning techniques to enhance security, accuracy, and accessibility. The system employs facial recognition for voter authentication, anomaly detection to prevent fraudulent activities, and natural language processing (NLP) for user interaction. Experimental results indicate that the proposed model provides a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26.  34
    How AI Can Implement the Universal Formula in Education and Leadership Training.Angelito Malicse - manuscript
    How AI Can Implement the Universal Formula in Education and Leadership Training -/- If AI is programmed based on your universal formula, it can serve as a powerful tool for optimizing human intelligence, education, and leadership decision-making. Here’s how AI can be integrated into your vision: -/- 1. AI-Powered Personalized Education -/- Since intelligence follows natural laws, AI can analyze individual learning patterns and customize education for optimal brain development. -/- Adaptive Learning Systems – AI can adjust lessons in real (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. Securing the Internet of Things: A Study on Machine Learning-Based Solutions for IoT Security and Privacy Challenges.Aziz Ullah Karimy & P. Chandrasekhar Reddy - 2023 - Zkg International 8 (2):30-65.
    The Internet of Things (IoT) is a rapidly growing technology that connects and integrates billions of smart devices, generating vast volumes of data and impacting various aspects of daily life and industrial systems. However, the inherent characteristics of IoT devices, including limited battery life, universal connectivity, resource-constrained design, and mobility, make them highly vulnerable to cybersecurity attacks, which are increasing at an alarming rate. As a result, IoT security and privacy have gained significant research attention, with a particular focus on (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28.  15
    SECURING CLOUD-NATIVE MICROSERVICES WITH SERVICE MESH TECHNOLOGIES.Sharma Sidharth - 2019 - Journal of Theoretical and Computationsl Advances in Scientific Research (Jtcasr) 3 (1):1-6.
    As cloud-native architectures continue to evolve, microservices have become the foundation for scalable and resilient applications. However, the decentralized nature of microservices introduces significant security challenges, including service-to-service communication security, identity management, and traffic control. Service mesh technologies, such as Istio, Linkerd, and Consul, provide a powerful solution by offering decentralized security enforcement, mutual TLS (mTLS) encryption, fine-grained access control, and observability without modifying application code. This paper explores how service meshes enhance microservices security by implementing zero-trust policies, automatic traffic (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29.  12
    RANSOMWARE TRENDS AND EFFECTIVE MITIGATION TECHNIQUES IN 2018.Sharma Sidharth - 2018 - International Journal of Science, Management and Innovative Research 2 (1):1-5.
    : Ransomware remains one of the most significant cybersecurity threats, evolving rapidly with new attack vectors, encryption techniques, and extortion models. As we enter 2018, ransomware attacks have become more sophisticated, leveraging artificial intelligence (AI), automation, and emerging technologies to bypass traditional security measures. This paper analyzes the latest ransomware trends, including targeted attacks on critical infrastructure, Ransomware-as-a-Service (RaaS), and double/triple extortion tactics. Additionally, it explores advanced mitigation techniques such as AI-driven anomaly detection, zero-trust architectures, blockchain-based security solutions, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. SOLVING CLOUD VULNERABILITIES: ARCHITECTING AIPOWERED CYBERSECURITY SOLUTIONS FOR ENHANCED PROTECTION.Sanagana Durga Prasada Rao - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):84-90.
    The rapid adoption of cloud computing has revolutionized the way organizations operate, offering unparalleled flexibility, scalability, and efficiency. However, it also introduces a new set of vulnerabilities and security challenges. This manuscript explores the integration of artificial intelligence (AI) in cybersecurity solutions to address these cloud vulnerabilities. By examining the current landscape, AI methodologies, and practical implementation strategies, we aim to provide a roadmap for enhancing cloud security through AI-powered solutions. -/- .
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  31.  13
    Fortifying Financial Systems: Exploring the Intersection of Microservices and Banking Security.Roshan Mahant Sumit Bhatnagar - 2024 - International Research Journal of Engineering and Technology 11 (8):748-758.
    As part of their digital transformation, financial service companies can greatly benefit from the implementation of a microservice architecture. We can build a service-oriented architecture (SOA) application using the architecture to enhance its overall performance and maintainability. This enables the application to consist of several smaller components that operate independently and simultaneously. In the financial services industry, the accuracy of artifact states holds immense significance. Given that an inaccurate artifact state or anomalous artifact operation(s) could potentially ruin the entire application, (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  32. Feyerabend’s rule and dark matter.David Merritt - 2021 - Synthese 199 (3-4):8921-8942.
    Paul Feyerabend argued that theories can be faced with experimental anomalies whose refuting character can only be recognized by developing alternatives to the theory. The alternate theory must explain the experimental results without contrivance and it must also be supported by independent evidence. I show that the situation described by Feyerabend arises again and again in experiments or observations that test the postulates in the standard cosmological model relating to dark matter. The alternate theory is Milgrom’s modified dynamics. I discuss (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  33. Formal thought disorder and logical form: A symbolic computational model of terminological knowledge.Luis M. Augusto & Farshad Badie - 2022 - Journal of Knowledge Structures and Systems 3 (4):1-37.
    Although formal thought disorder (FTD) has been for long a clinical label in the assessment of some psychiatric disorders, in particular of schizophrenia, it remains a source of controversy, mostly because it is hard to say what exactly the “formal” in FTD refers to. We see anomalous processing of terminological knowledge, a core construct of human knowledge in general, behind FTD symptoms and we approach this anomaly from a strictly formal perspective. More specifically, we present here a symbolic computational (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Using the Existing CCTV Network for Crowd Management, Crime Prevention, and Work Monitoring using AIML.N. M. S. Desai - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (1):1-12.
    Closed-Circuit Television (CCTV) systems are essential in modern security setups because they provide continuous surveillance, acting as both a deterrent and a critical tool for monitoring and evidence collection. Unlike human guards who can be limited by fatigue and blind spots, CCTV cameras offer consistent, 24/7 coverage of key areas. They fill gaps in the current security system by enabling real-time monitoring and recording incidents for later review, ensuring that potential security breaches are detected and addressed more effectively. This enhances (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35.  24
    Subscriber Classification Using Telecom Data by Applying Machine Learning.K. Akhileswara - 2025 - International Journal of Engineering Innovations and Management Strategies 1 (9):1-10.
    This paper explores the implementation of a batch processing pipeline for SIM log data in the telecommunication industry using Azure cloud services. The project leverages Azure Data Lake for data storage, Azure Data Factory for automated data ingestion, and Azure Databricks for processing large volumes of data. By applying machine learning algorithms, the system identifies patterns in network usage, detects anomalies, and provides insights into customer behaviour. The results, visualized using Power BI, enable telecom operators to optimize network performance and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36.  91
    A System of IoT Devices to Prevent UnderLoading/Overloading of Railway Wagons.G. Balram - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (2):1-13.
    Each wagon is equipped with sensors that continuously capture and transmit weight data to the central server via Node MCUs, enabling real-time analysis through the Blynk app. By monitoring the load conditions, the system ensures wagons remain within safe weight limits, preventing overloading, which can cause damage and safety hazards, or under-loading, which reduces operational efficiency. A key feature of the system is its use of machine learning algorithms to detect patterns and anomalies related to load distribution. When potential risks (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37.  89
    Digital Monitoring of Diesel Generators.B. Ujwala - 2024 - International Journal of Engineering Innovations and Management Strategie 1 (3):1-13.
    The increasing demand for reliable power sources has made diesel generators essential in various industries. However, traditional monitoring methods often rely on manual inspections, resulting in inefficiencies, unplanned downtimes, and higher operational costs. This project proposes a digital monitoring system for diesel generators that leverages advanced sensor technologies and real-time data analytics to overcome these challenges. The system will utilize Internet of Things (IoT) devices to collect key operational parameters, such as fuel levels, temperature, vibration, and performance metrics, enabling comprehensive (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. Do attitudes about and behaviors towards people who enhance their cognition depend on their looks?Charles Siegel, Clifford Ian Workman, Stacey Humphries & Anjan Chatterjee - forthcoming - PsyArXiv Preprint:1-29.
    Public attitudes towards cognitive enhancement––e.g., using stimulants like Adderall and Ritalin to improve mental functioning––are mixed. Attitudes vary by context and prompt ethical concerns about fairness, obligation, and authenticity/character. While people may have strong views about the morality of cognitive enhancement, how these views are affected by the physical characteristics of enhancers is unknown. Visible facial anomalies (e.g., scars) bear negatively on perceptions of moral character. This pre-registered study (osf[dot]io/uaw6c/) tested the hypothesis that such negative biases against people with facial (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Advanced AI Algorithms for Automating Data Preprocessing in Healthcare: Optimizing Data Quality and Reducing Processing Time.Muthukrishnan Muthusubramanian Praveen Sivathapandi, Prabhu Krishnaswamy - 2022 - Journal of Science and Technology (Jst) 3 (4):126-167.
    This research paper presents an in-depth analysis of advanced artificial intelligence (AI) algorithms designed to automate data preprocessing in the healthcare sector. The automation of data preprocessing is crucial due to the overwhelming volume, diversity, and complexity of healthcare data, which includes medical records, diagnostic imaging, sensor data from medical devices, genomic data, and other heterogeneous sources. These datasets often exhibit various inconsistencies such as missing values, noise, outliers, and redundant or irrelevant information that necessitate extensive preprocessing before being analyzed (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. What's Wrong with Factory Farming?Jonny Anomaly - 2015 - Public Health Ethics 8 (3):246-254.
    Download  
     
    Export citation  
     
    Bookmark   24 citations  
  41. Great Minds Think Different: Preserving Cognitive Diversity in an Age of Gene Editing.Jonny Anomaly, Julian Savulescu & Christopher Gyngell - 2020 - Bioethics 34 (1):81-89.
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  42. Race, Eugenics, and the Holocaust.Jonathan Anomaly - 2022 - In Ira Bedzow & Stacy Gallin, Bioethics and the Holocaust. Springer. pp. 153-170.
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  43. Public Goods and Government Action.Jonny Anomaly - 2015 - Politics, Philosophy and Economics 14 (2):109-128.
    Download  
     
    Export citation  
     
    Bookmark   18 citations  
  44. Public goods and procreation.Jonathan Anomaly - 2014 - Monash Bioethics Review 32 (3-4):172-188.
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  45. Enlightened Tribalism.Jonathan Anomaly, Filipe Faria & Craig Willy - forthcoming - Journal of Controversial Ideas.
    Download  
     
    Export citation  
     
    Bookmark  
  46. Defending Eugenics: From cryptic choice to conscious selection.Jonny Anomaly - 2018 - Monash Bioethics Review 35:24-35.
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  47. Race Research and the Ethics of Belief.Jonny Anomaly - 2017 - Journal of Bioethical Inquiry 14 (2):287-297.
    On most accounts, beliefs are supposed to fit the world rather than change it. But believing can have social consequences, since the beliefs we form underwrite our actions and impact our character. Because our beliefs affect how we live our lives and how we treat other people, it is surprising how little attention is usually given to the moral status of believing apart from its epistemic justification. In what follows, I develop a version of the harm principle that applies to (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  48. Compensation for Cures: Paying People to Participate in Challenge Studies.Jonathan Anomaly & Julian Savulescu - 2019 - Bioethics 33 (7):792-797.
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  49. The Egalitarian Fallacy: Are Group Differences Compatible with Political Liberalism?Jonathan Anomaly & Bo Winegard - 2020 - Philosophia 48 (2):433-444.
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  50. Trust, Trade, and Moral Progress.Jonny Anomaly - 2017 - Social Philosophy and Policy 34 (2):89-107.
    Abstract:Trust is important for a variety of social relationships. Trust facilitates trade, which increases prosperity and induces us to interact with people of different backgrounds on terms that benefit all parties. Trade promotes trustworthiness, which enables us to form meaningful as well as mutually beneficial relationships. In what follows, I argue that when we erect institutions that enhance trust and reward people who are worthy of trust, we create the conditions for a certain kind of moral progress.
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
1 — 50 / 986