View year:

  1.  48
    Automated Cyberbullying Detection Framework Using NLP and Supervised Machine Learning Models.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):421-432.
    The rise of social media has created a new platform for communication and interaction, but it has also facilitated the spread of harmful behaviors such as cyberbullying. Detecting and mitigating cyberbullying on social media platforms is a critical challenge that requires advanced technological solutions. This paper presents a novel approach to cyberbullying detection using a combination of supervised machine learning (ML) and natural language processing (NLP) techniques, enhanced by optimization algorithms. The proposed system is designed to identify and classify cyberbullying (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  2.  29
    Cloud-Based Secure Storage: A Framework for Efficient Encryption, Decryption, and Data Dispersion.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):427-434.
    The exponential growth of cloud storage has necessitated advanced security measures to protect sensitive data from unauthorized access. Traditional encryption methods provide a layer of security, but they often lack the robustness needed to address emerging threats. This paper introduces an optimized framework for secure cloud storage that integrates data encryption, decryption, and dispersion using cutting-edge optimization techniques. The proposed model enhances data security by first encrypting the data, then dispersing it across multiple cloud servers, ensuring that no single server (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  3.  39
    Deep Learning Techniques for Comprehensive Emotion Recognition and Behavioral Regulation.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):383-389.
    Emotion detection and management have emerged as pivotal areas in humancomputer interaction, offering potential applications in healthcare, entertainment, and customer service. This study explores the use of deep learning (DL) models to enhance emotion recognition accuracy and enable effective emotion regulation mechanisms. By leveraging large datasets of facial expressions, voice tones, and physiological signals, we train deep neural networks to recognize a wide array of emotions with high precision. The proposed system integrates emotion recognition with adaptive management strategies that provide (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  4.  29
    Efficient Aggregated Data Transmission Scheme for Energy-Constrained Wireless Sensor Networks.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):445-460.
    Optimization algorithms such as Genetic Algorithms (GA) and Particle Swarm Optimization (PSO) are employed to determine the optimal aggregation and transmission schedules, taking into account factors such as network topology, node energy levels, and data urgency. The proposed approach is validated through extensive simulations, demonstrating significant improvements in energy consumption, packet delivery ratio, and overall network performance. The results suggest that the optimized aggregated packet transmission method can effectively extend the lifespan of duty-cycled WSNs while ensuring reliable data communication. Future (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  5.  44
    Efficient Data Center Management: Advanced SLA-Driven Load Balancing Solutions.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):368-376.
    In modern data centers, managing the distribution of workloads efficiently is crucial for ensuring optimal performance and meeting Service Level Agreements (SLAs). Load balancing algorithms play a vital role in this process by distributing workloads across computing resources to avoid overloading any single resource. However, the effectiveness of these algorithms can be significantly enhanced through the integration of advanced optimization techniques. This paper proposes an SLA-driven load balancing algorithm optimized using methods such as genetic algorithms, particle swarm optimization, and simulated (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  6.  58
    IoT-Integrated Smart Home Technologies with Augmented Reality for Improved User Experience.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):389-394.
    The paper also discusses the technical architecture, including the network protocols, data management strategies, and user interface design considerations necessary to implement such a system. Additionally, it addresses the challenges related to data security, privacy, and system interoperability. Finally, the paper outlines potential future enhancements, such as the incorporation of AI-driven predictive analytics and advanced AR features, to further elevate the smart home experience.
    Direct download  
     
    Export citation  
     
    Bookmark  
  7.  51
    Multipath Routing Optimization for Enhanced Load Balancing in Data-Heavy Networks.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):377-382.
    In today's data-driven world, the efficient management of network resources is crucial for optimizing performance in data centers and large-scale networks. Load balancing is a critical process in ensuring the equitable distribution of data across multiple paths, thereby enhancing network throughput and minimizing latency. This paper presents a comprehensive approach to load balancing using advanced optimization techniques integrated with multipath routing protocols. The primary focus is on dynamically allocating network resources to manage the massive volume of data generated by modern (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  8.  37
    Optimized Attribute-Based Search and Secure Storage for Cloud Computing Environments.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):361-370.
    In the modern digital era, cloud storage has become an indispensable service due to its scalability, accessibility, and cost-effectiveness. However, with the vast amount of sensitive information stored on cloud platforms, ensuring data security and privacy remains a critical challenge. Traditional encryption techniques, while secure, often hinder efficient data retrieval, especially when using keyword searches. To address this, attribute-based keyword search (ABKS) offers a promising solution by allowing secure, fine-grained access control and efficient keyword searches over encrypted data.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  9.  76
    SVM-Enhanced Intrusion Detection System for Effective Cyber Attack Identification and Mitigation.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):397-403.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational overhead. By leveraging (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  10.  28
    Wireless IoT Sensors for Environmental Pollution Monitoring in Urban Areas.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):434-441.
    The data collected by these sensors are transmitted to a centralized system where optimization algorithms, such as Genetic Algorithms (GA), Particle Swarm Optimization (PSO), and Simulated Annealing (SA), are applied to optimize sensor placement, data transmission, and processing efficiency. This ensures accurate, real-time pollution monitoring and data analysis, providing actionable insights for policymakers, environmental agencies, and the general public. The system's performance is evaluated through simulations and real-world experiments, demonstrating its capability to deliver reliable and timely pollution data. Future work (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  11.  39
    Innovative Approaches in Cardiovascular Disease Prediction Through Machine Learning Optimization.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):350-359.
    Cardiovascular diseases (CVD) represent a significant cause of morbidity and mortality worldwide, necessitating early detection for effective intervention. This research explores the application of machine learning (ML) algorithms in predicting cardiovascular diseases with enhanced accuracy by integrating optimization techniques. By leveraging data-driven approaches, ML models can analyze vast datasets, identifying patterns and risk factors that traditional methods might overlook. This study focuses on implementing various ML algorithms, such as Decision Trees, Random Forest, Support Vector Machines, and Neural Networks, optimized through (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  12.  49
    Transforming Consumer Behavior Analysis with Cutting-Edge Machine Learning.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):360-368.
    The research outlines a workflow that incorporates data collection, preprocessing, model training, and optimization. Real-world datasets from retail and e-commerce sectors are utilized to validate the proposed methodology, showcasing substantial improvements in model performance. The results indicate that optimized models not only provide better predictions of consumer behaviour but also enhance customer segmentation and targeting strategies. The study concludes with recommendations for future research, including the exploration of hybrid optimization techniques and the application of these methods in real-time analytics.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  13.  43
    Advanced Driver Drowsiness Detection Model Using Optimized Machine Learning Algorithms.S. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):396-402.
    Driver drowsiness is a significant factor contributing to road accidents, resulting in severe injuries and fatalities. This study presents an optimized approach for detecting driver drowsiness using machine learning techniques. The proposed system utilizes real-time data to analyze driver behavior and physiological signals to identify signs of fatigue. Various machine learning algorithms, including Support Vector Machines (SVM), Convolutional Neural Networks (CNN), and Random Forest, are explored for their efficacy in detecting drowsiness. The system incorporates an optimization technique—such as Genetic Algorithms (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  14.  43
    AI-Driven Emotion Recognition and Regulation Using Advanced Deep Learning Models.S. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):383-389.
    Emotion detection and management have emerged as pivotal areas in humancomputer interaction, offering potential applications in healthcare, entertainment, and customer service. This study explores the use of deep learning (DL) models to enhance emotion recognition accuracy and enable effective emotion regulation mechanisms. By leveraging large datasets of facial expressions, voice tones, and physiological signals, we train deep neural networks to recognize a wide array of emotions with high precision. The proposed system integrates emotion recognition with adaptive management strategies that provide (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  15.  32
    Scalable Encryption Protocol for Searchable Data Management in IoT Systems.S. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):409-415.
    As the Internet of Things (IoT) continues to expand, ensuring secure and efficient data storage and retrieval becomes a critical challenge. IoT devices, often constrained by limited computational resources, require lightweight encryption protocols that balance security and performance. This paper presents an optimized encryption protocol designed specifically for lightweight, searchable data in IoT environments. The proposed protocol utilizes advanced optimization techniques to enhance the efficiency and security of searchable encryption, enabling rapid data retrieval without compromising the integrity and confidentiality of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  16.  36
    Adaptive SVM Techniques for Optimized Detection of Known and Novel Cyber Intrusions.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):398-405.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational overhead.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  17.  29
    Efficient Cryptographic Methods for Secure Searchable Data in IoT Frameworks.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):409-415.
    As the Internet of Things (IoT) continues to expand, ensuring secure and efficient data storage and retrieval becomes a critical challenge. IoT devices, often constrained by limited computational resources, require lightweight encryption protocols that balance security and performance. This paper presents an optimized encryption protocol designed specifically for lightweight, searchable data in IoT environments. The proposed protocol utilizes advanced optimization techniques to enhance the efficiency and security of searchable encryption, enabling rapid data retrieval without compromising the integrity and confidentiality of (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  18.  31
    Enhanced Secure Cloud Storage: An Integrated Framework for Data Encryption and Distribution.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):416-427.
    Traditional encryption methods provide a layer of security, but they often lack the robustness needed to address emerging threats. This paper introduces an optimized framework for secure cloud storage that integrates data encryption, decryption, and dispersion using cutting-edge optimization techniques. The proposed model enhances data security by first encrypting the data, then dispersing it across multiple cloud servers, ensuring that no single server holds the complete dataset. Decryption occurs only when the dispersed data fragments are reassembled, which adds an additional (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  19.  43
    Intelligent Driver Drowsiness Detection System Using Optimized Machine Learning Models.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):397-405.
    : Driver drowsiness is a significant factor contributing to road accidents, resulting in severe injuries and fatalities. This study presents an optimized approach for detecting driver drowsiness using machine learning techniques. The proposed system utilizes real-time data to analyze driver behavior and physiological signals to identify signs of fatigue. Various machine learning algorithms, including Support Vector Machines (SVM), Convolutional Neural Networks (CNN), and Random Forest, are explored for their efficacy in detecting drowsiness. The system incorporates an optimization technique—such as Genetic (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  20.  29
    Low-Power IoT Sensors for Real-Time Outdoor Environmental Pollution Measurement.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):430-440.
    The data collected by these sensors are transmitted to a centralized system where optimization algorithms, such as Genetic Algorithms (GA), Particle Swarm Optimization (PSO), and Simulated Annealing (SA), are applied to optimize sensor placement, data transmission, and processing efficiency. This ensures accurate, real-time pollution monitoring and data analysis, providing actionable insights for policymakers, environmental agencies, and the general public. The system's performance is evaluated through simulations and real-world experiments, demonstrating its capability to deliver reliable and timely pollution data. Future work (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  21.  22
    Latency-Aware Packet Transmission Optimization in Duty-Cycled WSNs.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):444-459.
    Wireless Sensor Networks (WSNs) have become increasingly prevalent in various applications, ranging from environmental monitoring to smart cities. However, the limited energy resources of sensor nodes pose significant challenges in maintaining network longevity and data transmission efficiency. Duty-cycled WSNs, where sensor nodes alternate between active and sleep states to conserve energy, offer a solution to these challenges but introduce new complexities in data transmission. This paper presents an optimized approach to aggregated packet transmission in duty-cycled WSNs, utilizing advanced optimization techniques (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  22.  38
    Machine Learning-Based Cyberbullying Detection System with Enhanced Accuracy and Speed.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):421-429.
    The rise of social media has created a new platform for communication and interaction, but it has also facilitated the spread of harmful behaviors such as cyberbullying. Detecting and mitigating cyberbullying on social media platforms is a critical challenge that requires advanced technological solutions. This paper presents a novel approach to cyberbullying detection using a combination of supervised machine learning (ML) and natural language processing (NLP) techniques, enhanced by optimization algorithms. The proposed system is designed to identify and classify cyberbullying (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  23.  32
    Optimization Algorithms for Load Balancing in Data-Intensive Systems with Multipath Routing.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):377-382.
    : In today's data-driven world, the efficient management of network resources is crucial for optimizing performance in data centers and large-scale networks. Load balancing is a critical process in ensuring the equitable distribution of data across multiple paths, thereby enhancing network throughput and minimizing latency. This paper presents a comprehensive approach to load balancing using advanced optimization techniques integrated with multipath routing protocols. The primary focus is on dynamically allocating network resources to manage the massive volume of data generated by (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  24.  42
    Smart Homes with Augmented Reality and IoT Integration for Enhanced User Experience and Automation.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):389-394.
    The proposed system allows users to monitor and control various home appliances, security systems, and environmental controls through AR interfaces, which overlay digital information on the physical environment. IoT devices communicate with each other and with the AR system, providing real-time data and enabling automated responses based on user preferences or environmental conditions. This synergy between AR and IoT facilitates a more responsive and intelligent home environment that adapts to the needs of its occupants.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  25. AI-POWERED THREAT INTELLIGENCE FOR PROACTIVE SECURITY MONITORING IN CLOUD INFRASTRUCTURES.Tummalachervu Chaitanya Kanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):76-83.
    Cloud computing has become an essential component of enterprises and organizations globally in the current era of digital technology. The cloud has a multitude of advantages, including scalability, flexibility, and cost-effectiveness, rendering it an appealing choice for data storage and processing. The increasing storage of sensitive information in cloud environments has raised significant concerns over the security of such systems. The frequency of cyber threats and attacks specifically aimed at cloud infrastructure has been increasing, presenting substantial dangers to the data, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  26. HARNESSING AI FOR EVOLVING THREATS: FROM DETECTION TO AUTOMATED RESPONSE.Sanagana Durga Prasada Rao - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):91-97.
    The landscape of cybersecurity is constantly evolving, with adversaries becoming increasingly sophisticated and persistent. This manuscript explores the utilization of artificial intelligence (AI) to address these evolving threats, focusing on the journey from threat detection to autonomous response. By examining AI-driven detection methodologies, advanced threat analytics, and the implementation of autonomous response systems, this paper provides insights into how organizations can leverage AI to strengthen their cybersecurity posture against modern threats. Key words: Ransomware, Anomaly Detection, Advanced Persistent Threats (APTs), Automated (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  27. SOLVING CLOUD VULNERABILITIES: ARCHITECTING AIPOWERED CYBERSECURITY SOLUTIONS FOR ENHANCED PROTECTION.Sanagana Durga Prasada Rao - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):84-90.
    The rapid adoption of cloud computing has revolutionized the way organizations operate, offering unparalleled flexibility, scalability, and efficiency. However, it also introduces a new set of vulnerabilities and security challenges. This manuscript explores the integration of artificial intelligence (AI) in cybersecurity solutions to address these cloud vulnerabilities. By examining the current landscape, AI methodologies, and practical implementation strategies, we aim to provide a roadmap for enhancing cloud security through AI-powered solutions. -/- .
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  28.  70
    Graves' Disease: Current Knowledge and Management.Ghaffar Irum - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):145-156.
    This review was conducted to examine the causes, diagnoses, clinical manifestations, and available treatments for Graves' disease. Keywords like "Graves' disease," "radioactive iodine," "etiology," and "treatment" were used to search for data pertaining to Textbooks on endocrinology and other papers from these sources were also located. The introduction, etiology, risk factors, symptoms, diagnosis, course of treatment, and the contribution of many factors to the beginning of Graves' disease are all covered in this review article.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  29.  58
    (1 other version)PRECAUTION OF MIXING MILL SHAFT BROKEN AND ENHANCEMENT OF EMPLOYEE SAFETY.R. Jeyapandi Prathap - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):290-310.
    This abstract describes a control system for a 3 horsepower (3hp) alternating current (AC) motor that operates in both forward and reverse directions with a delay of 2 seconds using two limit switches. The system is designed to ensure the safety of the motor and surrounding equipment by introducing a delay before the motor changes direction, and by using two limit switches to control the direction of the motor. When the motor runs in the forward direction and the first limit (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  30.  46
    (1 other version)PRECAUTION OF MIXING MILL FOR EMPLOYEE SAFETY.R. Jeyapandi Prathap - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):290-310.
    This abstract describes a control system for a 3 horsepower (3hp) alternating current (AC) motor that operates in both forward and reverse directions with a delay of 2 seconds using two limit switches. The system is designed to ensure the safety of the motor and surrounding equipment by introducing a delay before the motor changes direction, and by using two limit switches to control the direction of the motor. When the motor runs in the forward direction and the first limit (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  31.  36
    Cloud-Based IoT System for Outdoor Pollution Detection and Data Analysis.Prathap Jeyapandi - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):424-430.
    Air pollution is a significant environmental concern that affects human health, ecosystems, and climate change. Effective monitoring and management of outdoor air quality are crucial for mitigating its adverse effects. This paper presents an advanced approach to outdoor pollution measurement utilizing Internet of Things (IoT) technology, combined with optimization techniques to enhance system efficiency and data accuracy. The proposed framework integrates a network of IoT sensors that continuously monitor various air pollutants, such as particulate matter (PM), carbon monoxide (CO), sulfur (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  32. EDIBLE MUSHROOMS AND THEIR CULTIVATION.Ali Mubashar - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):98-144.
    Wild mushrooms are of great significance to people of places where they naturally occur, as they provide an essential source of nutrition and contribute to the local economy. Multiple studies have conducted significant studies and classified many kinds of mushrooms to show their unique characteristics. Pleurites spp. and Lentinula eddoes are commonly cultivated plants valued for their floral properties. Mushrooms contain a variety of carbohydrates. Certain carbohydrates have shown the ability to reduce the risk of cancer and prevent the immune (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  33.  65
    Assays in analgesic studies.Akram Muhammad - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):57-75.
    Pain is a multiplex uncomfortable experience consisting of sensory cases including emotion, time, cognition, time and motivation. It can be persistent, chronic or momentary i.e. lasting for a very short period of time and its location can either be muscular or visceral. Analgesics are molecules that particularly mitigate pain by acting on the peripheral pain mechanism or central nervous system without remarkably responsiveness.Different animals have been used as experimental models for the direct investigation and study of neuronal activity in animals (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  34.  33
    Machine Learning-Driven Optimization for Accurate Cardiovascular Disease Prediction.Yoheswari S. - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):350-359.
    The research methodology involves data preprocessing, feature engineering, model training, and performance evaluation. We employ optimization methods such as Genetic Algorithms and Grid Search to fine-tune model parameters, ensuring robust and generalizable models. The dataset used includes patient medical records, with features like age, blood pressure, cholesterol levels, and lifestyle habits serving as inputs for the ML models. Evaluation metrics, including accuracy, precision, recall, F1-score, and the area under the ROC curve (AUC-ROC), assess the model's predictive power.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  35.  30
    OPTIMIZING CONSUMER BEHAVIOUR ANALYTICS THROUGH ADVANCED MACHINE LEARNING ALGORITHMS.Yoheswari S. - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):362-370.
    Consumer behavior analytics has become a pivotal aspect for businesses to understand and predict customer preferences and actions. The advent of machine learning (ML) algorithms has revolutionized this field by providing sophisticated tools for data analysis, enabling businesses to make data-driven decisions. However, the effectiveness of these ML algorithms significantly hinges on the optimization techniques employed, which can enhance model accuracy and efficiency. This paper explores the application of various optimization techniques in consumer behaviour analytics using machine learning algorithms. By (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  36.  87
    Awareness and Current knowledge of Neurogenerative disorders.Laila Umme - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):267-289.
    Although the brain has numerous functions, there are issues related to it, such as depression, anxiety, stroke, and many more, which we covered in this study. In this essay, we covered a variety of therapeutic plants, their possible phytochemical components, and how they can treat neurological issues. Plant derivatives can potentially treat these memory-related problems by their extract and decoction. Therefore, many of days favor herbal and traditional medicine over Western medicine.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  37. Consumption of flowers and their medicinal properties.Laila Umme - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):157-175.
    The human being has selected a variety of domesticated plants that gives a benefit, and also significant in food production. The origin of these plants mostly in Central Asia such as China having great variety of crops such as oats, barley, sesame, pumpkin, sorghum, asparagus, pear, apple and citrus etc. While centers of origin such as Mexico and Central America have great diversity in corn, beans, squash, maguey, nopal, sunflower, avocado, cocoa etc. In many countries poor nutrition is a current (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  38.  54
    Advanced Attribute-Based Keyword Search for Secure Cloud Data Storage Solutions.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):350-360.
    This paper delves into the integration of optimization techniques within ABKS to enhance search efficiency and data security in cloud storage environments. We explore various optimization strategies, such as index compression, query processing enhancement, and encryption optimization, which aim to reduce computational overhead while maintaining robust security measures. Through a comprehensive analysis, the paper illustrates how these techniques can significantly improve the performance of cloud storage systems, ensuring both security and usability. Experimental results demonstrate that optimized ABKS not only accelerates (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  39.  44
    ADVANCED EMOTION RECOGNITION AND REGULATION UTILIZING DEEP LEARNING TECHNIQUES.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):383-388.
    Emotion detection and management have emerged as pivotal areas in humancomputer interaction, offering potential applications in healthcare, entertainment, and customer service. This study explores the use of deep learning (DL) models to enhance emotion recognition accuracy and enable effective emotion regulation mechanisms. By leveraging large datasets of facial expressions, voice tones, and physiological signals, we train deep neural networks to recognize a wide array of emotions with high precision. The proposed system integrates emotion recognition with adaptive management strategies that provide (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  40.  41
    AUGMENTED REALITY AND IOT-INTEGRATED SMART HOMES: ENHANCING USER EXPERIENCE AND AUTOMATION.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):389-394.
    The integration of Augmented Reality (AR) and the Internet of Things (IoT) within smart homes represents a significant leap forward in home automation and user experience. This paper explores a comprehensive framework that combines these technologies to create an immersive, efficient, and user-friendly smart home environment. By utilizing AR, users can interact with and control IoT-enabled devices in real time through visual and intuitive interfaces. This integration not only simplifies the management of home systems but also enhances the overall user (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  41.  48
    ENHANCED SLA-DRIVEN LOAD BALANCING ALGORITHMS FOR DATA CENTER OPTIMIZATION USING ADVANCED OPTIMIZATION TECHNIQUES.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):369-376.
    In modern data centers, managing the distribution of workloads efficiently is crucial for ensuring optimal performance and meeting Service Level Agreements (SLAs). Load balancing algorithms play a vital role in this process by distributing workloads across computing resources to avoid overloading any single resource. However, the effectiveness of these algorithms can be significantly enhanced through the integration of advanced optimization techniques. This paper proposes an SLA-driven load balancing algorithm optimized using methods such as genetic algorithms, particle swarm optimization, and simulated (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  42.  21
    OPTIMIZED AGGREGATED PACKET TRANSMISSION IN DUTY-CYCLED WIRELESS SENSOR NETWORKS.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):444-458.
    t: Wireless Sensor Networks (WSNs) have become increasingly prevalent in various applications, ranging from environmental monitoring to smart cities. However, the limited energy resources of sensor nodes pose significant challenges in maintaining network longevity and data transmission efficiency. Duty-cycled WSNs, where sensor nodes alternate between active and sleep states to conserve energy, offer a solution to these challenges but introduce new complexities in data transmission.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  43.  47
    OPTIMIZING CONSUMER BEHAVIOUR ANALYTICS THROUGH ADVANCED MACHINE LEARNING ALGORITHMS.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):360-368.
    Consumer behavior analytics has become a pivotal aspect for businesses to understand and predict customer preferences and actions. The advent of machine learning (ML) algorithms has revolutionized this field by providing sophisticated tools for data analysis, enabling businesses to make data-driven decisions. However, the effectiveness of these ML algorithms significantly hinges on the optimization techniques employed, which can enhance model accuracy and efficiency. This paper explores the application of various optimization techniques in consumer behaviour analytics using machine learning algorithms. By (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  44.  43
    OPTIMIZED CARDIOVASCULAR DISEASE PREDICTION USING MACHINE LEARNING ALGORITHMS.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):350-359.
    Cardiovascular diseases (CVD) represent a significant cause of morbidity and mortality worldwide, necessitating early detection for effective intervention. This research explores the application of machine learning (ML) algorithms in predicting cardiovascular diseases with enhanced accuracy by integrating optimization techniques. By leveraging data-driven approaches, ML models can analyze vast datasets, identifying patterns and risk factors that traditional methods might overlook. This study focuses on implementing various ML algorithms, such as Decision Trees, Random Forest, Support Vector Machines, and Neural Networks, optimized through (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  45.  29
    OPTIMIZED CLOUD SECURE STORAGE: A FRAMEWORK FOR DATA ENCRYPTION, DECRYPTION, AND DISPERSION.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):415-426.
    The exponential growth of cloud storage has necessitated advanced security measures to protect sensitive data from unauthorized access. Traditional encryption methods provide a layer of security, but they often lack the robustness needed to address emerging threats. This paper introduces an optimized framework for secure cloud storage that integrates data encryption, decryption, and dispersion using cutting-edge optimization techniques. The proposed model enhances data security by first encrypting the data, then dispersing it across multiple cloud servers, ensuring that no single server (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  46.  34
    Optimizing Data Center Operations with Enhanced SLA-Driven Load Balancing".S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):368-376.
    The research introduces a novel framework that incorporates real-time monitoring, dynamic resource allocation, and adaptive threshold settings to ensure consistent SLA adherence while optimizing computing performance. Extensive simulations are conducted using synthetic and real-world datasets to evaluate the performance of the proposed algorithm. The results demonstrate that the optimized load balancing approach outperforms traditional algorithms in terms of SLA compliance, resource utilization, and energy efficiency. The findings suggest that the integration of optimization techniques into load balancing algorithms can significantly enhance (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  47.  48
    OPTIMIZED DRIVER DROWSINESS DETECTION USING MACHINE LEARNING TECHNIQUES.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):395-400.
    Driver drowsiness is a significant factor contributing to road accidents, resulting in severe injuries and fatalities. This study presents an optimized approach for detecting driver drowsiness using machine learning techniques. The proposed system utilizes real-time data to analyze driver behavior and physiological signals to identify signs of fatigue. Various machine learning algorithms, including Support Vector Machines (SVM), Convolutional Neural Networks (CNN), and Random Forest, are explored for their efficacy in detecting drowsiness. The system incorporates an optimization technique—such as Genetic Algorithms (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  48.  30
    OPTIMIZED ENCRYPTION PROTOCOL FOR LIGHTWEIGHT AND SEARCHABLE DATA IN IOT ENVIRONMENTS.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):408-414.
    As the Internet of Things (IoT) continues to expand, ensuring secure and efficient data storage and retrieval becomes a critical challenge. IoT devices, often constrained by limited computational resources, require lightweight encryption protocols that balance security and performance. This paper presents an optimized encryption protocol designed specifically for lightweight, searchable data in IoT environments. The proposed protocol utilizes advanced optimization techniques to enhance the efficiency and security of searchable encryption, enabling rapid data retrieval without compromising the integrity and confidentiality of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  49.  38
    OPTIMIZED INTRUSION DETECTION MODEL FOR IDENTIFYING KNOWN AND INNOVATIVE CYBER ATTACKS USING SUPPORT VECTOR MACHINE (SVM) ALGORITHMS.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):398-404.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational overhead. By leveraging (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  50.  60
    OPTIMIZED SECURE CLOUD STORAGE USING ATTRIBUTE-BASED KEYWORD SEARCH.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):338-349.
    In the modern digital era, cloud storage has become an indispensable service due to its scalability, accessibility, and cost-effectiveness. However, with the vast amount of sensitive information stored on cloud platforms, ensuring data security and privacy remains a critical challenge. Traditional encryption techniques, while secure, often hinder efficient data retrieval, especially when using keyword searches. To address this, attribute-based keyword search (ABKS) offers a promising solution by allowing secure, fine-grained access control and efficient keyword searches over encrypted data. This paper (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  51.  50
    OPTIMIZATION TECHNIQUES FOR LOAD BALANCING IN DATA-INTENSIVE APPLICATIONS USING MULTIPATH ROUTING NETWORKS.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):377-382.
    In today's data-driven world, the efficient management of network resources is crucial for optimizing performance in data centers and large-scale networks. Load balancing is a critical process in ensuring the equitable distribution of data across multiple paths, thereby enhancing network throughput and minimizing latency. This paper presents a comprehensive approach to load balancing using advanced optimization techniques integrated with multipath routing protocols. The primary focus is on dynamically allocating network resources to manage the massive volume of data generated by modern (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  52.  35
    OPTIMIZED CYBERBULLYING DETECTION IN SOCIAL MEDIA USING SUPERVISED MACHINE LEARNING AND NLP TECHNIQUES.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):421-435.
    The rise of social media has created a new platform for communication and interaction, but it has also facilitated the spread of harmful behaviors such as cyberbullying. Detecting and mitigating cyberbullying on social media platforms is a critical challenge that requires advanced technological solutions. This paper presents a novel approach to cyberbullying detection using a combination of supervised machine learning (ML) and natural language processing (NLP) techniques, enhanced by optimization algorithms. The proposed system is designed to identify and classify cyberbullying (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  53.  77
    ASSOCIATION OF DEPRESSION WITH COVID-19 IN DIFFERENT COUNTRIES AMONG DIFFERENT CATEGORIES OF PEOPLE.Iqbal Zarqa - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):309-324.
    COVID-19 affected to the people all around the world. As its first and second wave has been passed and we are facing currently to third wave, but all around the world no one can overcome to this viral infectious disease. Likewise it is affecting to people like a viral disease physically but along with its effect, its huge effect on mental health worldwide. The significant academic research has shown that there is a correlation of mental issues and covid-19 pandemic. Among (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  54.  70
    Design and Development of Human Computer Interface using Virtual Reality Techniques.Iqbal Zarqa - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):325-337.
    The design and usability of computer interfaces are crucial factors in improving user experience and productivity in the field of human-computer interaction. This overview examines the development of computer interfaces, starting with command-line interfaces (CLI) and moving on to graphical user interfaces (GUI), touch interfaces, and gesture-controlled interfaces. The guiding concepts of interface development are highlighted: usability, accessibility and user-centered design. The harmony of form and function, the incorporation of cutting-edge technologies such as voice recognition and augmented reality, and the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  55.  59
    ASSOCIATION OF DEPRESSION WITH COVID-19 FOR VARIOUS PEOPLE.Iqbal Zarqa - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):305-324.
    COVID-19 affected to the people all around the world. As its first and second wave has been passed and we are facing currently to third wave, but all around the world no one can overcome to this viral infectious disease. Likewise it is affecting to people like a viral disease physically but along with its effect, its huge effect on mental health worldwide. The significant academic research has shown that there is a correlation of mental issues and covid-19 pandemic. Among (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  56.  60
    Analysis of Human Computer Interface ( HCI) using Meta Verse Techniques.Iqbal Zarqa - 2024 - Journal of Science Technology and Research (JSTAR) 5:1.
    : The design and usability of computer interfaces are crucial factors in improving user experience and productivity in the field of human-computer interaction. This overview examines the development of computer interfaces, starting with command-line interfaces (CLI) and moving on to graphical user interfaces (GUI), touch interfaces, and gesture-controlled interfaces. The guiding concepts of interface development are highlighted: usability, accessibility and user-centered design. The harmony of form and function, the incorporation of cutting-edge technologies such as voice recognition and augmented reality, and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  57. OPTIMIZING DATA SCIENCE WORKFLOWS IN CLOUD COMPUTING.Tummalachervu Chaitanya Kanth - 2024 - Journal of Science Technology and Research (JSTAR) 4 (1):71-76.
    This paper explores the challenges and innovations in optimizing data science workflows within cloud computing environments. It begins by highlighting the critical role of data science in modern industries and the pivotal contribution of cloud computing in enabling scalable and efficient data processing. The primary focus lies in identifying and analyzing the key challenges encountered in current data science workflows deployed in cloud infrastructures. These challenges include scalability issues related to handling large volumes of data, resource management complexities in optimizing (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
 Previous issues
  
Next issues