ISSN : 2583-2646
1.
Social Media Analytics, Opinion Mining and Sentiment Analysis for Business IntelligenceUpendra Kanuru, Sirisha Cheepuri
Download

The rise of social media platforms has led to an unprecedented amount of unstructured text data. This presents Business Intelligence (BI) with a great chance to learn more about public ideas, feelings, and market dynamics. This study looks into new ways to use social media analytics, like opinion mining and sentiment analysis, to improve business intelligence (BI) tools. The report talks about how standard BI systems have trouble interpreting social media data that is noisy, high-volume, and fast-moving, as well as how hard it is to use these insights to make strategic decisions. It stresses the necessity for advanced methods for collecting and preparing data, as well as advanced opinion mining and sentiment analysis using Natural Language Processing (NLP), Machine Learning (ML), and Deep Learning (DL), coupled with comprehending the context and making predictions.


2.
Enhancing Data Security and Transparency Through Blockchain TechnologySrinath Muralinathan
Download

Growing dependence on digital surroundings for data storage, transaction handling, and communication has led to newer concerns involving security, privacy, and transparency. Classic centralized systems suffer heavily from cyber attacks, data breach scenarios, and improper modifications that require the implementation of more efficient security frameworks. In that regard, blockchain technology, based on decentralized cryptographic security, is a solution to these aforementioned problems. Aside from guaranteeing immutability, transparency, and security from vulnerabilities, blockchain is also one such technology that acts as a distributed ledger.


3.
Home-Based Rehabilitation Post-COVID-19: A Review of Protocols, Clinical Outcomes, and Lessons Learned.Priti Nathani
Download

The domain of rehabilitation has changed so much, even with the COVID-19 pandemic. Given the high rate of long-term physical, respiratory, and cognitive impairment after SARS-CoV-2 infection, home-based rehabilitation has proved to be an essential alternative to the often-limiting brick-and-mortar rehabilitation. The rationale for home-based rehabilitation in the post-COVID context is reviewed in this review, along with core clinical protocols including physical therapy, respiratory training, and cognitive rehabilitation. Further, such interventions are also explored in regard to their clinical effectiveness, where outpatient, functional outcomes, pulmonary recovery, and improvements in mental health and quality of life are considered.


4.
AI-Based Fraud Detection in Accounts Payable and Payment Automation SystemsDeepesh Vinodkumar Semlani, Sudha Rani Pujari
Download

With growing sophistication and numbers of digital finance systems, the risk of fraud in accounts payable (AP) and automated payment systems has deepened. Legacy rule-based controls cannot cope with detecting sophisticated threats like invoice forgery, vendor impersonation, and duplicate disbursements. This review examines the combination of machine learning (ML) and AI with AP processes, showing how smart systems enhance anomaly detection, reduce false positives, and enable scalable fraud protection. It gives best AI techniques, including deep learning, unsupervised outlier detection, explainable AI (XAI), and federated learning.


5.
Building LLM Powered Applications from Scratch - GEN AI Architect perspectiveBhanuvardhan Nune
Download

As large language models (LLMs) evolve into core infrastructure for intelligent systems, the need for practical architectural guidance grows ever more urgent. This review takes the perspective of a Generative AI (GenAI) architect tasked with designing, building, and deploying LLM-powered applications from the ground up. Drawing from foundational research and real-world implementations, it outlines the modular architecture of such systems, from user interface orchestration to memory, inference, and alignment layers. It discusses the challenges of scaling, trust, latency, retrieval augmentation, and tool integration.


6.
Persona-Based Design for Telecom Project ToolsShirish Kashinath Borkar
Download

The world of telecommunications is changing quickly, thus tools need to do more than just meet technical goals. They also need to connect with the real needs of project teams. This article talks about how persona-based design may be used in telecom project tools. It shows how personas can help connect what users want with how these systems work. The analysis combines together important research findings and shows measurable benefits, like fewer mistakes and more efficient work completion. It also gives a theoretical basis for putting the ideas into practice. Telecom companies may create better, more inclusive, and more flexible solutions that fit with the challenges of modern network operations by using user-centered design concepts.


7.
Digital Systems Security: Case Study of an IT Consulting firmUpendra Kanuru, Odiase Irumudomon
Download

This case study looks at Adler Consulting's digital systems security architecture in depth and makes suggestions for how to improve it. Adler Consulting is a well-known organisation that provides IT solutions all around the world. Adler Consulting has more than 20,000 workers and brings in more than $1 billion a year. Because of this, they need to have strong security to deal with new cyber dangers that come up. The study goes into detail on the organization's existing security setup, which includes SIEM/SEM, WAF, and multi-cloud environments. It also points out the most relevant flaws and threats.