ISSN : 2583-2646
1.
Fuzzy Based Routing Protocol For Smart Grid NetworkR. Karpaga Priya, Venkatanarayanan.S
Download

Smart Grid (SG) can be portrayed as a high level electric power network structure for improved adequacy, resolute quality and security, with smooth joining of sustainable and non-inexhaustible sources through automated control and flow correspondences progresses.


2.
A Data-Oriented M2m Messaging Mechanism for IndustrialS. Morrey Christain, Robert Johanson .V.D
Download

Machine-to-machine (M2M) communication is a vital empowering innovation for the future. Industrial Internet of Things (IoT) applications. It assumes a significant part in the availability and combination of mechanized machines, like sensors, actuators, regulators, and robots.


3.
Design of implantable Flower Maze Structured AntennaGayathri.C, Venkatanarayanan.S
Download

In this work, an original scaled down round labyrinth molded implantable recieving wire is presented for clinical field to be worked in clinical band. The biocompatible polyamide substrate (r = 4.3 and tan = 0.004) with 0.05 mm thickness has been utilized as both substrate and superstrate.


4.
Secured Low Power Wireless Sensor Network By Using Lion Optimization AlgorithmMuhammadu Ansari, Sadamiro A. O
Download

Remote sensor organization (WSN) has been a subject of expansive assessment attempts in the new year’s, and has been particularly seen as a widespread and general strategy for a couple emerging applications, for instance, a continuous traffic noticing, natural framework and battle zone observation.


5.
Error Detection Technique for a Median FilterG. Barkavi, G. B. Shanawaz
Download

In picture legal sciences, recognition of picture imitations including non-direct controls have gotten a lot of interest in late past. Middle separating (MF) is one such non-straight control procedure which is regularly utilized in number of uses, for example, to conceal drive commotions.


6.
Privacy-Preserving Homomorphic Encryption Schemes for Machine Learning in the CloudRanadeep Palle, Dr. A. Punitha
Download

This examination investigates the joining of protection safeguarding homomorphic encryption plans in cloud-based AI to address blossoming concerns regarding information security and protection. This proposed method is based on recent contributions and focuses on tailoring homomorphic encryption algorithms like Paillier and Fully Homomorphic Encryption (FHE) to specific machine learning tasks. To strike a balance between data utility and privacy, seamless compatibility with preprocessing pipelines is prioritized.


7.
Anomaly Detection in Cybersecurity: Leveraging Machine Learning AlgorithmsAshok Choppadandi, Jagbir Kaur, Pradeep Kumar
Chenchala, Akshay Agarwal, Varun Nakra, Pandi Kirupa Gopalakrishna Pandian
Download

Detecting anomalies is turning to be one of the focal areas in cyber defence system in the presence of numerous types of cyber threats. The research looks at multi-layer application of machine learning regimes in cyber security applications and particularly focuses on the anomaly detection which enables the computer to develop and respond to new threats, provide predictive and monitoring services.


8.
Proactive Scaling Strategies for Cost-Efficient Hyperparameter Optimization in Cloud-Based Machine Learning Models: A
Comprehensive Review
Madan Mohan Tito Ayyalasomayajula, Sailaja Ayyalasomayajula
Download

Hyperparameter tuning is critical to machine learning model development, significantly impacting model performance. However, the process can be time-consuming and resource-intensive, especially when dealing with complex deep-learning models and large datasets. This paper explores proactive scaling strategies for efficient and cost-effective hyperparameter configuration in machine learning models using cloud infrastructure.


9.
Advanced Security Mechanisms in Kubernetes: Isolation and Access Control StrategiesAnirudh Mustyala, Sumanth Tatineni
Download

Kubernetes has emerged as a powerful platform for orchestrating containerized applications, but with its growing adoption, security concerns have become increasingly paramount. This paper explores advanced security mechanisms within Kubernetes, focusing on isolation and access control strategies designed to enhance the security posture of Kubernetes environments. Isolation techniques such as namespaces, network policies, and node isolation are critical in preventing unauthorized access and minimizing the attack surface.


10.
Evaluating Planning Strategies for Prioritizing the most viable Projects to Maximize Investment Returns Amit Mangal
Download

Maximizing investment returns and the entire project benefits through strategic project prioritization is paramount in programs aimed at enhancing the sustainability of building infrastructures. This necessity is particularly evident when implementing a revolving-fund approach, leveraging savings from initial projects for subsequent improvements. The success of such an approach depends on the meticulous prioritization of projects.


11.
SOAR Solutions in PCI Compliance: Orchestrating Incident Response for Regulatory Security Naresh Kilaru, Sai Krishna
Manohar Cheemakurthi, Vinodh Gunnam
Download

This paper seeks to understand how to use Security Orchestration, Automation, and Response (SOAR) solutions in achieving and sustaining PCI Compliance, emphasizing the incident response for regulatory security. Based on the principles of the SOAR framework, improvements are made regarding the speed and accuracy of the incident response procedures, which are essential for compliance with the PCI DSS.


12.
Block Chain-enabled Data Analytics for Ensuring Data Integrity and Trust in AI Systems Lohith Paripati, Nitin Prasad, Jigar Shah,
Narendra Narukulla, Venudhar Rao Hajari
Download

The rapid advancement of artificial intelligence systems has brought about many possibilities and issues in multiple fields. Indeed, recent advances in AI algorithms have already provided capabilities on data analysis and making decision with incomparable efficiency; therefore, reliability and credibility of available data remain as priority concern. Current architecture of a centralized data warehousing framework makes it open to fraud, has vulnerability of single point failure, and the process is nontransparent in nature.


13.
Advanced AI Techniques in Wireless MIMO Communication: Improving Throughput, Latency, and Robustness
Vikram Nattamai Sankaran
Download

The rapid advancement of wireless communication technologies necessitates innovative solutions to meet the growing demand for high data rates, reliability, and efficiency. This paper presents a novel AI-enhanced Multiple Input Multiple Output (MIMO) communication system that leverages advanced machine learning techniques to optimize beam forming, channel estimation, and resource allocation.


14.
Detailed Cost-Benefit Analysis of Geothermal HVAC Systems for Residential Applications: Assessing Economic and
Performance Factors
Ankitkumar Tejani, Jyoti Yadav, Vinay Toshniwal, Rashi Kandelwal
Download

Geothermal HVAC systems provide the best solution to conventional HVAC systems since they are economical, environmentally friendly, and long-term cost-efficient. The following paper presents an analysis of the cost and benefits of geothermal HVAC systems in residential areas with respect to costs and performance. Typically, it looks at the purchase prices, the running costs, costs of repairs and maintenance and any environmental effects.


15.
Optimizing Scalability and Performance in Cloud Services: Strategies and SolutionsDr. Saloni Sharma, Ritesh Chaturvedi
Download

This research paper explores strategies and solutions for optimizing scalability and performance in cloud services. It examines various aspects of cloud architecture, scalability techniques, performance optimization strategies, and advanced technologies. The study delves into vertical and horizontal scaling, auto-scaling techniques, load balancing, caching mechanisms, and database optimization. Additionally, it investigates the role of containerization, serverless computing, and edge computing in enhancing cloud performance.


16.
Harnessing The Power Of Big Data: The Evolution Of AI And Machine Learning In Modern TimesVenkata Nagesh Boddapati,
Eswar Prasad Galla, Janardhana Rao Sunkara, Sanjay Ramdas Bauskar, Gagan Kumar Patra, Chandrababu Kuraku, Chandrakanth Rao Madhavaram
Download

There has been a tremendous shift in the fields of Artificial Intelligence (AI) and Machine Learning (ML) due to the fast development of big data analytics. Today, and particularly in recent years, we are witnessing the increase in volumes of data originating from social networks, IoT devices, and enterprise systems which have offered the chance to develop more complex and precise AI and ML models. This paper aims to discuss the development of AI and the use of ML, which occurred due to the availability of immense datasets. It also looks at how data availability has helped these novelties gain more accuracy, efficiency, and versatility.


17.
AI-Optimized Bioinformatics Pipelines in DevOpsYogesh Ramaswamy
Download

The implementation of AI methods into DevOps pipelines within bioinformatics has several effects: Initially, it liberates researchers’ time as it provides for automation of simple and repetitive procedures like data pre-processing and feature extraction. Secondly deployment of AI models can be done at scale as the data can be processed in parallel and distributed fashion. This helps to enhance the rate of processing large amounts of information and the efficiency of functioning. In addition, the integration of AI into the models has been proven to increase the high predictive and classifying effectiveness of bioinformatics results gained from specimens.


18.
CI/CD Automation for Payment Gateways: Azure vs. AWSPavan Kumar Joshi
Download

The payment industry has evolved a lot in the tech aspect. Free-For-All features a CI/CD culture because of cloud-computing integration intended to improve the CI/CD pipeline for payment gateways. Two cloud platforms, Azure and AWS, provide rich CI/CD services that include numerous automation tools, which enable payment gateways to provide high availability, security, and scalability. This paper considers the Azure and AWS CI/CD solutions for the automated deployment of payment gateways. One of the issues that contribute to the decision is the integration of tools, security, deployment options, and cost.


19.
Designing Scalable Data Engineering Pipelines Using Azure and DatabricksSantosh Kumar Singu
Download

Data engineering pipelines can be seen as the fundamental structure of today’s modern data-driven organizations, as they are responsible for processing large amounts of data and preparing it for analysis. Since today’s organizations are investing more in cloud solutions for their pipelines, these have to be scalable and flexible. The focus of this paper is the actual design of scalable data engineering pipelines using Microsoft Azure and Databricks as the two setup platforms in the handling of large-scale data operations.


20.
Predicting tomorrow’s Ailments: How AI/ML Is Transforming Disease ForecastingMohit Surender Reddy, Manikanth Sarisa,
Siddharth Konkimalla, Sanjay Ramdas Bauskar, Hemanth Kumar Gollangi, Eswar Prasad Galla, Shravan Kumar Rajaram
Download

The most common of these technologies include artificial intelligence (AI) as well as machine learning (ML), both of which are revolutionizing the healthcare system, especially in disease prediction. Given the emerging data produced from systems in healthcare, EHRs, social media, environment, and genomics, AI and ML algorithms continue to find genuine applications in anticipating disease outbreaks or patients’ health futures. Disease forecasting is looked at in this paper with regard to the different methods and algorithms being used in current practice, as well as the possibility that AI/ML could do more in identifying patterns and relationships that are difficult to decipher using traditional statistical analytical tools.


21.
Adoption of Virtual Reality in Medical Training and TherapyVenkat Raviteja Boppana
Download

The adoption of Virtual Reality (VR) technology in the medical field is rapidly transforming the way medical training and therapy is delivered. As of December 2021, VR has found significant applications in areas such as medical education, surgery simulation, physical rehabilitation, and mental health therapy. Medical professionals are utilizing VR to practice complex procedures in a controlled, risk-free environment, allowing them to hone their skills without jeopardizing patient safety.


22.
The Synergy of AI-Driven Analytics and MDM: Enhancing Data Accuracy and Decision-Making in Enterprise SystemsAmit Kumar
Download

Enterprises today need accurate and reliable information to make informed business decisions and stay competitive. This paper explores the convergence of Artificial Intelligence (AI) and Master Data Management (MDM) to facilitate greater data accuracy, integrity and decision-making capabilities in Enterprise systems. However, traditional MDMs alone are insufficient to confidently ensure data quality as data and the number of data sources to be managed grows exponentially. Thanks to AI-driven analytics, enterprises can validate data better and clean data automatically while also finding hidden insights to derive stronger MDM practices.


23.
ETL in Data Lakes vs. Data WarehousesNishanth Reddy Mandala
Download

The Extract, Transform, Load (ETL) process plays a pivotal role in data integration, enabling businesses to consolidate data from disparate sources into a unified system for analysis. This paper presents a comparative analysis of ETL processes in Data Lakes and Data Warehouses, focusing on the architecture, performance, and flexibility of each approach. The discussion highlights the distinct roles of data lakes, which handle large volumes of unstructured and semi-structured data, versus traditional data warehouses, which are optimized for structured, relational data. Several case studies and performance evaluations are included to illustrate the strengths and weaknesses of both architectures.


24.
Redefining Brand Safety in Programmatic Advertising: Machine Learning Approaches to Content AnalysisAnkush Singhal
Download

Today, digital marketing has transformed, as programmatic advertising has become the new normal, allowing advertisers to deliver their campaigns to the right audiences at scale. Yet, in an ever-changing digital landscape, brand safety remains a challenge. Most traditional brand safety mechanisms fail to do the job of context well, leading to either missed opportunities or inappropriate placements that destroy the brand’s reputation. In this paper, we explore using machine learning to redefine brand safety in programmatic advertising through the process of content analysis.