Results for 'Edge Computing'

990 found
Order:
  1. Edge Computing and Its Role in Strengthening Cloud Security.Thakur Siddharth Ravi - 2025 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 8 (5).
    As the adoption of cloud computing continues to grow, so do the concerns about the security of sensitive data and applications. Cloud environments are often seen as vulnerable to cyber-attacks due to their centralized nature and exposure to the internet. Edge computing, a distributed computing paradigm that brings computation and data storage closer to the data source, is emerging as a solution to enhance cloud security. By processing data closer to the edge of the network, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. Edge Computing in IoT Networks: Reducing Latency and Enhancing Scalability.Pednekar Saurabh Chandresh - 2025 - International Journal of Computer Technology and Electronics Communication 8 (1).
    The Internet of Things (IoT) has revolutionized the way we interact with the world by enabling devices to collect, process, and exchange data in real time. However, IoT networks often face challenges related to latency and scalability when large amounts of data are processed centrally in cloud-based infrastructures. Edge computing, which brings computation and data storage closer to the source of data generation, is emerging as a solution to address these challenges. By performing computation at the edge (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Energy Efficiency Multi task Offloading and Resource Allocation in Mobile Edge Computing.LiHuanjie Zang - 2018 - International Journal of Computer Techniques 5 (1):5-14.
    On edge computing, mobile devices can offload some computing intensive tasks to the cloud so that the time delay and battery losses can be reduced. Different from cloud computing, an edge computing model is under the constraint of radio transmitting bandwidth, power and etc. With regard to most models in presence, each user is assigned to a single mission, transmitting power or local CPU frequency on mobile terminals is deemed to be a constant. Furthermore, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. Testing the Simulation Hypothesis: The Annihilation of the Universe and Campbell’s Consciousness-Based Alternative.Eliott Edge - manuscript
    Bostrom's Simulation Argument has become synonymous with simulation theory, despite the existence of alternative frameworks that also suggest our universe may be a computer simulation—frameworks that do not require the assumption of posthumans. Further, Bostrom's work has spurred discussions around the potential destruction or termination of our universe, prompting existential anxieties and fueling extensive philosophical speculation. We evaluate the arguments of Greene, Turchin, Batin, Denkenberger, and Yampolskiy, alongside the counterarguments of Braddon-Mitchell, Latham, and Edge. We conclude that Bostrom's Simulation (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. The First Protocol Of Reaching Consensus Under Unreliable Mobile Edge Computing Paradigm.Ching ShuWang, Yan Qin, Yao Tsai Te & Shu-Ching Wang - 2019 - International Journal of Innovative Computing, Information and Control 15 (2):713 - 723.
    Mobile Edge Computing (MEC) is an emerging technology that enables computing directly at the edge of the cloud computing network. Therefore, it is important that MEC is applied with reliable transmission. The problem of reaching consensus in the distributed system is one of the most important issues in designing a reliable transmission network. However, all previous protocols for the consensus problem are not suitable for an MEC paradigm. It is the first time an optimal protocol (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. Advances and Analysis on Reducing Webpage Response Time with Effect of Edge Computing.N. Kamiyama, Y. Nakano, K. Shiomoto, G. Hasegawa, Masayuki Murata & Hideo Miyahara - 2018 - 2016 IEEE Global Communications Conference (GLOBECOM) 4.
    Modern webpages consist of many rich objects dynamically produced by servers and client terminals at diverse locations, so we face an increase in web response time. To reduce the time, edge computing, in which dynamic objects are generated and delivered from edge nodes, is effective. For ISPs and CDN providers, it is desirable to estimate the effect of reducing the web response time when introducing edge computing. Therefore, in this paper, we derive a simple formula (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. Internet of Things future in Edge Computing.C. Pvandana & Ajeet Chikkamannur - 2016 - International Journal of Advanced Engineering Research and Science 3 (12):148-154.
    With the advent of Internet of Things (IoT) and data convergence using rich cloud services, data computing has been pushed to new horizons. However, much of the data generated at the edge of the network leading to the requirement of high response time. A new computing paradigm, edge computing, processing the data at the edge of the network is the need of the time. In this paper, we discuss the IoT architecture, predominant application protocols, (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  8. Optimizing AI Models for Biomedical Signal Processing Using Reinforcement Learning in Edge Computing.A. Manoj Prabaharan - 2024 - Journal of Artificial Intelligence and Cyber Security (Jaics) 8 (1):1-7.
    . In the evolving landscape of healthcare, the efficient processing of biomedical signals is critical for real-time diagnosis and personalized treatment. Conventional cloud-based AI systems for biomedical signal processing face challenges such as high latency, bandwidth consumption, and data privacy concerns. Edge computing, which brings data processing closer to the source, has emerged as a potential solution to these limitations. However, optimizing AI models for edge devices, which often have limited computational resources, remains a challenge. This paper (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. Decentralized AI: The role of edge intelligence in next-gen computing.V. Talati Dhruvitkumar - 2021 - International Journal of Science and Research Archive 2 (1):216-232.
    With the rapid development of communication technology, the explosive growth of mobile and IoT devices, and growing requirements for real-time data processing, a new paradigm of computing, Edge Computing, has appeared. It moves computing power in the direction of data sources to mitigate latency, bandwidth usage, and dependence on cloud computing. In parallel, Artificial Intelligence (AI) has progressed notably with deep learning technology, highly optimized hardware, and distributed computing paradigms to yield smart applications of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. Enhancing Edge Network Efficiency through Software-Defined Networking and NFV Integration.Tran Kenny - 2020 - International Journal of Advanced Research in Education and Technology 7 (1):1606-1608.
    The proliferation of IoT devices and the emergence of latency-sensitive applications in 2019 accelerated the demand for edge computing architectures. To meet these demands, network infrastructure began shifting away from centralized data centers toward distributed, programmable edge nodes. This research explores how the integration of Software-Defined Networking (SDN) and Network Function Virtualization (NFV) can optimize edge network performance. The paper analyzes architectural models that enable dynamic routing, load balancing, and traffic prioritization at the edge. It (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. Edge-Cloud Convergence: Architecting Hybrid Systems for Real-Time Data Processing and Latency Optimization.Dutta Shaunot - 2023 - International Journal of Advanced Research in Arts, Science, Engineering and Management (Ijarasem) 10 (1):1147-1151.
    With the rapid growth of Internet of Things (IoT) devices and the increasing demand for real-time processing of large data volumes, traditional cloud-based systems struggle to meet latency and bandwidth requirements. Edge-Cloud convergence has emerged as a solution, combining the computational power of cloud data centers with the low-latency and high-throughput capabilities of edge devices. This paper explores the architecture, design principles, and best practices for building hybrid systems that integrate edge computing and cloud infrastructure. We (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Emergence and Computation at the Edge of Classical and Quantum Systems.Ignazio Licata - 2008 - In World Scientific, Physics of Emergence and Organization.
    The problem of emergence in physical theories makes necessary to build a general theory of the relationships between the observed system and the observing system. It can be shown that there exists a correspondence between classical systems and computational dynamics according to the Shannon-Turing model. A classical system is an informational closed system with respect to the observer; this characterizes the emergent processes in classical physics as phenomenological emergence. In quantum systems, the analysis based on the computation theory fails. It (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  13. Serverless Mesh Architectures for Multi-Cloud and Edge.Abhijeet Malviya Shubham Malhotra, Fnu Yashu - 2024 - International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10 (1):326-329.
    Serverless computing is changing the cloud application de- sign by removing the need to design, build, and manage infrastructure, and instead focusing on deploying code that can be elastic and rapid. However, while service meshes have recently been introduced to address the reliability of communication in microservices architectures, the grow- ing adoption of edge computing and multi-cloud strategies require new architectures that can cross different types of platforms. In this paper, we introduce a novel serverless mesh architecture (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  14. The Evolution of Cloud Computing: Key Trends and Future Directions.Rama Bansode Suvarna More - 2021 - International Journal of Advanced Research in Education and Technology 8 (1):447-452.
    Cloud computing has revolutionized the way businesses and individuals access and utilize computing resources. With its rapid adoption over the last few decades, it has become the backbone of many IT services across industries. This paper explores the evolution of cloud computing, highlighting key trends and identifying future directions that will shape the landscape. It discusses the evolution from traditional on-premise systems to the cloud-first approach, current advancements such as multi-cloud and hybrid cloud environments, and the growing (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. Enhancing Human-Computer Interaction With Real-Time Hand Gesture Translation.S. Yamuna DrG Nirmala - 2025 - International Journal of Innovative Research in Computer and Communication Engineering 13 (4):3108-3113.
    Using cutting-edge computer vision and machine learning techniques, this research study suggests a real-time system for hand gesture recognition and text conversion using OpenCV and MediaPipe. The system processes live video input, detects hand movements, and translates specific gestures into corresponding text outputs. By leveraging a deep learning-based hand tracking model and a rule-based gesture classification method, the approach ensures efficient and accurate recognition. The primary applications of this system include enhancing human-computer interaction, assisting individuals with speech impairments, and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Neural Computation of Surface Border Ownership and Relative Surface Depth from Ambiguous Contrast Inputs.Birgitta Dresp-Langley & Stephen Grossberg - 2016 - Frontiers in Psychology 7.
    The segregation of image parts into foreground and background is an important aspect of the neural computation of 3D scene perception. To achieve such segregation, the brain needs information about border ownership; that is, the belongingness of a contour to a specific surface represented in the image. This article presents psychophysical data derived from 3D percepts of figure and ground that were generated by presenting 2D images composed of spatially disjoint shapes that pointed inward or outward relative to the continuous (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  17. Trustworthy mobile edge caching: a blockchain approach to mitigate malicious nodes and incentivize cache sharing.Nastooh Taheri Javan - 2025 - Cluster Computing 28 (15):994.
    As mobile network traffic continues to grow, content caching on edge servers is critical for reducing latency. However, challenges such as malicious edge servers that may delete or manipulate cached content, along with the limited capacity of these servers, need to be addressed. To overcome the capacity limitations, helper mobile nodes can contribute their cache resources. However, due to their selfish behavior, an incentive mechanism is necessary to encourage resource sharing. Additionally, these helper nodes can also be malicious. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. The Nature and Function of Content in Computational Models.Frances Egan - 2018 - In Mark Sprevak & Matteo Colombo, The Routledge Handbook of the Computational Mind. Routledge.
    Much of computational cognitive science construes human cognitive capacities as representational capacities, or as involving representation in some way. Computational theories of vision, for example, typically posit structures that represent edges in the distal scene. Neurons are often said to represent elements of their receptive fields. Despite the ubiquity of representational talk in computational theorizing there is surprisingly little consensus about how such claims are to be understood. The point of this chapter is to sketch an account of the nature (...)
    Download  
     
    Export citation  
     
    Bookmark   23 citations  
  19. A Shift from Cloud Computing Model to Fog Computing.C. Sailesh & S. Svermani - 2016 - Journal of Applied Computing 1 (1).
    Cloud computing has provided many opportunities to businesses and individuals. It enables global and on demand network access to a shared pool of resources with minimal management effort. However, this bliss has become a problem for latency-sensitive applications. To improve efficiency of cloud and to reduce the amount of data that needs to be transported to the cloud for data processing, analysis and storage, a new network architect technology 'Fog Computing' has been introduced. In fog computing, small (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. SDN/NFV Architectures for Edge-Cloud Oriented IoT: A Systematic Review.Ansari Aaliyah Noor - 2015 - International Journal of Advanced Research in Education and Technology 2 (3).
    The integration of Software-Defined Networking (SDN) and Network Functions Virtualization (NFV) has emerged as a promising approach to optimize the performance and management of IoT systems, especially in edge-cloud computing environments. SDN provides centralized control and programmability, while NFV enables the virtualization of network functions, enhancing network flexibility and scalability. This paper presents a systematic review of SDN and NFV architectures for Edge-Cloud oriented IoT applications. We explore their benefits, challenges, and the synergy between SDN and NFV (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. On the Edge of Cognitive Revolution: The Impact of Neuro-Robotics on Mind and Singularity.Fatih Burak Karagöz - 2023 - Isbcs Workshop Semposium.
    The mind has always been a peculiar and elusive subject, sparking controversial theories throughout the history of philosophy. The initial theorization of the mind dates back to Orphism, which formulated a dualistic structure of soul and body (Johansen, 1999) [1], laying the foundation for Greek dualism, introspection, and the rise of metaphysical idealism. This ill-empirical stance, especially after Plato’s idea of forms, led to inaccessible theoretical concepts concerning the investigation of the relationship between body and mind. Although diverse theories provide (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Regulating Next-Generation Implantable Brain-Computer interfaces: Recommendations for Ethical Development and Implementation.Reneé Sirbu, Jessica Morley, Tyler Schroder, Raghavendra Pradyumna Pothukuchi, Abhishek Bhattacharjee & Luciano Floridi - manuscript
    Brain-computer interfaces (BCIs) offer significant therapeutic opportunities for a variety of neurophysiological and neuropsychiatric disorders and may perhaps one day lead to augmenting the cognition and decision-making of the healthy brain. However, existing regulatory frameworks designed for implantable medical devices (IMDs) are inadequate to address the unique ethical, legal, and social risks associated with next-generation networked brain-computer interfaces (BCIs). In this article, we make nine recommendations to support developers in the design of BCIs and nine recommendations to support policymakers in (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  23. Phase Symmetry and Criticality_ Structured Resonance at the Edge of Intelligence.Devin Bostick - manuscript
    The Critical Brain Hypothesis (CBH) proposes that the brain’s optimal state for information processing emerges at a phase transition between subcritical and supercritical regimes—where order and disorder momentarily balance. While this insight has guided decades of cognitive and computational neuroscience, it remains observational: CBH identifies where complexity emerges, but not why it sustains, how it evolves, or what governs its recurrence across scales. This paper introduces the Chirality of Dynamic Emergent Systems (CODES) as the structural resolution to that gap. CODES (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. Survey of Enhancing Security of Cloud Using Fog Computing.Abhishek Singh Abhishek Singh - 2019 - International Journal for Research Trends and Innovation 4 (1).
    Nowadays Fog Computing has become a vast research area in the domain of cloud computing. Due to its ability of extending the cloud services towards the edge of the network, reduced service latency and improved Quality of Services, which provides better user experience. However, the qualities of Fog Computing emerge new security and protection challenges. The Current security and protection estimations for cloud computing cannot be straightforwardly applied to the fog computing because of its (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. The central system as a computational engine.Susan Schneider - unknown
    The Language of Thought program has a suicidal edge. Jerry Fodor, of all people, has argued that although LOT will likely succeed in explaining modular processes, it will fail to explain the central system, a subsystem in the brain in which information from the different sense modalities is integrated, conscious deliberation occurs, and behavior is planned. A fundamental characteristic of the central system is that it is “informationally unencapsulated” -- its operations can draw from information from any cognitive domain. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Cross-Cloud Continuity : A Scalable Framework for Resilient and Regulated Digital Infrastructure.Kalyan Krishna Dasari - 2023 - International Journal of Scientific Research in Science, Engineering and Technology 10 (5).
    As digital infrastructure becomes increasingly reliant on multi-cloud architectures, ensuring consistent availability, fault tolerance, and disaster recovery across distributed systems is a critical challenge. This extended study advances the discourse on cloud resiliency engineering by addressing underexplored areas such as the quantification of resilience metrics, economic modeling of redundancy strategies, and the integration of AI-driven automation for predictive fault detection. It also evaluates the operational and regulatory complexities introduced by multi-jurisdictional deployments, legacy system modernization, and emerging threats like quantum (...). Unlike traditional approaches focused solely on infrastructure-level solutions, this research presents a multi-dimensional framework that encompasses human factors, policy-aware architecture, and vendor interoperability. By synthesizing insights from real-world implementations, performance benchmarks, and evolving technologies such as edge computing and post-quantum cryptography, the study provides a comprehensive roadmap for building resilient, secure, and scalable cloud systems. The proposed framework equips cloud architects, developers, and enterprise leaders with actionable strategies to design and manage cloud environments that are both technically robust and contextually adaptable. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  27. Optimized Machine Learning Algorithms for Real-Time ECG Signal Analysis in IoT Networks.P. Selvaprasanth - 2024 - Journal of Theoretical and Computationsl Advances in Scientific Research (Jtcasr) 8 (1):1-7.
    Electrocardiogram (ECG) signal analysis is a critical task in healthcare for diagnosing cardiovascular conditions such as arrhythmias, heart attacks, and other heart-related diseases. With the growth of Internet of Things (IoT) networks, real-time ECG monitoring has become possible through wearable devices and sensors, providing continuous patient health monitoring. However, real-time ECG signal analysis in IoT environments poses several challenges, including data latency, limited computational power of IoT devices, and energy constraints. This paper proposes a framework for Optimized Machine Learning Algorithms (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. Integrating AI, Machine Learning, and Quantum Computing for Advanced Diagnostic and Therapeutic Strategies in Modern Healthcare.T. O. Fatunmbi - 2021 - International Journal of Engineering and Technology Research 6 (1):26-41.
    This paper explores the integration of artificial intelligence (AI), machine learning (ML), and quantum computing in revolutionizing diagnostic and therapeutic approaches within modern healthcare. The convergence of these cutting-edge technologies is poised to address critical challenges in healthcare, such as precision medicine, early disease detection, and personalized treatment strategies. AI and ML algorithms, particularly deep learning, are demonstrated to enhance diagnostic accuracy through the analysis of complex medical data, including imaging and genomics. Furthermore, quantum computing presents novel (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. An Architecture of Thin Client in Internet of Things and Efficient Resource Allocation in Cloud for Data Distribution.Aymen Abdullah, Phamhung Phuoc & Eui Namhuh - 2017 - International Arab Journal of Information Technology 14 (6).
    These days, Thin-client devices are continuously accessing the Internet to perform/receive diversity of services in the cloud. However these devices might either has lack in their capacity (e.g., processing, CPU, memory, storage, battery, resource allocation, etc) or in their network resources which is not sufficient to meet users satisfaction in using Thin-client services. Furthermore, transferring big size of Big Data over the network to centralized server might burden the network, cause poor quality of services, cause long respond delay, and inefficient (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. AI-Driven Cloud Services for Guaranteed Disaster Recovery, Improved Fault Tolerance, and Transparent High Availability in Dynamic Cloud Systems.Bhushan Chaudhari, Satish Kabade & Akshay Sharma - 2023 - International Journal of Scientific Research in Science, Engineering and Technology 10 (6).
    Cloud computing alters the way organizations manage and deploy their IT resource. It provides an organization with scalable, inexpensive, and flexible options. The complexity and dynamic nature of cloud environments pose a challenge to maintaining high availability at all times, especially when the system fails or a disaster arises. The legacy techniques of disaster recovery, fault tolerance, and high availability leave behind much to be desired. These techniques are mostly static, slow to respond, and have a dismal ability to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Next-Generation Federated Learning: Overcoming Privacy and Scalability Challenges for.K. Kavikuyil - 2021 - International Journal of Multidisciplinary Research in Science, Engineering, Technology and Management (Ijmrsetm) 8 (3):681-684.
    Federated Learning (FL) is a machine learning paradigm that enables model training across decentralized devices while preserving data privacy. However, FL faces two significant challenges: privacy concerns and scalability issues. Privacy concerns arise from potential vulnerabilities in aggregating updates, whereas scalability issues stem from the increasing number of edge devices and the computational overhead required for communication and model updates. This paper explores cutting-edge advancements aimed at addressing these challenges, including advanced encryption techniques, differential privacy mechanisms, federated optimization (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. Transforming Pension Service Request Processing with Secure, Scalable, and AI-Powered Azure Cloud Technologies.Akshay Sharma & Satish Kabade - 2024 - International Journal of Scientific Research in Science, Engineering and Technology 11 (1).
    Pension service institutions are quickly going digital as they cope with increased service requirements, the demands of regulatory compliance, and challenges posed by cybersecurity. Legacy pension management systems usually have limited scope, are inefficient, and do not provide security on-premise infrastructure (Gartner, 2023). These aspects result in inefficiencies that create delays in processing pensions, an increase in the risk of fraud, and escalated operational costs (Ponemon Institute, 2023). The most critical aspect regarding pension transactions involves the secure, efficient, and scalable (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. Railway Revolution – AI-Driven Network Asset Change Detection for Infrastructure Excellence.Kumar Singh Dippu - 2023 - International Journal of Innovative Research in Science, Engineering and Technology (Ijirset) 12 (12):14995-15007.
    Railway asset change detection through Artificial Intelligence (AI) technology has transformed infrastructure monitoring by providing better efficiency combined with predictive maintenance functions and improved accuracy. The paper studies the development of railway asset monitoring throughout history while it moved from traditional manual inspections to AI-powered solutions. The study recognizes three main barriers which include irregular data acquisition practices along with restricted sensor abilities and imprecise AI model precision and difficulties applying them to current railway control platforms. The research investigates novel (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Pothole Detection Using YOLO.Krushna S. Shelke Dr Rupali S. Khule - 2025 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 8 (4).
    Maintaining road infrastructure is essential for ensuring public safety and supporting efficient transportation networks. One persistent problem is the formation of potholes, which pose hazards to drivers, contribute to traffic delays, and cause vehicle damage. Conventional methods for detecting potholes typically rely on manual inspection, which can be time-consuming, labor-intensive, and difficult to scale. This project presents an automated solution for identifying potholes using cutting-edge computer vision and machine learning approaches. Leveraging the YOLOv8 object detection algorithm, the system analyzes (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. Federated Learning: Privacy-Preserving Machine Learning in Distributed Systems.Devank Yogendra Tamhane Jatin Dinesh Mhatre, Tanaya Subodh Lohar - 2025 - International Journal of Computer Technology and Electronics Communication 8 (1).
    Federated Learning (FL) is an emerging machine learning paradigm designed to enable model training across decentralized data sources without requiring data to be transferred or centralized. This approach is especially valuable in environments where data privacy, regulatory compliance, and communication efficiency are paramount, such as healthcare, finance, and edge computing. Traditional machine learning methods typically require data to be aggregated in a central server, raising concerns about data privacy and security. Federated Learning addresses these concerns by keeping data (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. R.E.T.I.N.A. Real-Time Environmental Transcription and Interactive Navigation Assistant for Visually Impaired.Fiza Rahmathullah Najiya Abdulrahiman, Mohammed Safwan K. K., Brillons, Adarsh Narayanan - 2025 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 8 (4).
    RETINA (Real-time Environmental Transcription and Interpretation for Navigation and Assistance for Visually Impaired) is an innovative project aimed at enhancing the navigation and environmental awareness of visually impaired individuals through advanced assistive technology. The system integrates a portable, headband-mounted camera with a Raspberry Pi, enabling real-time capture and interpretation of visual information from the user's surroundings. Utilizing cutting-edge computer vision and machine learning algorithms, along with the Google Coral Accelerator for rapid processing, RETINA facilitates swift object recognition and detailed (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. Cloud Resiliency Engineering: Best Practices for Ensuring High Availability in Multi-Cloud Architectures.Baladari Venkata - 2022 - International Journal of Science and Research 11 (6):2062-2067.
    Ensuring cloud resiliency through engineering is essential for maintaining high availability, fault tolerance, and disaster recovery within contemporary cloud infrastructures. As more businesses move towards multi - cloud environments, maintaining system reliability and efficiency while also controlling costs takes centre stage. This study delves into optimal strategies for bolstering cloud reliability via automated failover systems, real - time data duplication, load distribution, and self - restoring networks. The analysis focuses on strategies for disaster recovery, cost - effective resource management, and (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  38. Multi-Cloud Data Resilience: Implementing Cross-Platform Data Strategies with Snowflake for P&C Insurance Operations.Adavelli Sateesh Reddy - 2023 - International Journal of Science and Research 12 (1):1387-1398.
    Property and Casualty (P&C) insurers are adopting multi-cloud environments as a strategic imperative because of their increasing data volumes and complexities in regulatory compliance, customer expectations and technological advancements. This paper discusses how Snowflake’s cloud-agnostic, unified platform enables insurers to create resilient, efficient, and compliant multi cloud data strategies. Using Snowflake’s elastic scalability, real-time analytics, secure data sharing and seamless cloud interoperability, insurers can optimize claims processing, augment fraud detection, and support customer engagement. The study offers core design principles for (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Challenges, Best Practices, and Future Perspectives:.Baladari Venkata - 2021 - European Journal of Advances in Engineering and Technology 8 (8):123-128.
    This study examines the shift from monolithic to microservices architecture, focusing on significant obstacles and effective methods including API gateways, containerization, Continuous Integration and Continuous Deployment (CI/CD) pipelines, and event-driven architectures. Technologies like AI-driven automation, serverless computing, and edge computing are anticipated to boost performance, reduce costs, and facilitate real-time processing. Research in self-healing systems, sustainable cloud computing, and multi-cloud approaches will enhance microservices in the future. To maximize the advantages of microservices, organizations should transition their (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Innovative Research on IoT Architecture and Robotic Operating Platforms: Applications of Large Language Models and Generative AI.Huiwen Han - 2024 - Ieee Xplore (Ricai 2024 Proceedings) 6 (Not applicable):881-887.
    This paper introduces an innovative design for robotic operating platforms, underpinned by a transformative Internet of Things (IoT) architecture, seamlessly integrating cutting-edge technologies such as large language models (LLMs), generative AI, edge computing, and 5G networks. The proposed platform aims to elevate the intelligence and autonomy of IoT systems and robotics, enabling them to make real-time decisions and adapt dynamically to changing environments. Through a series of compelling case studies across industries including smart manufacturing, healthcare, and service (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. Traditional Methods and Machine Learning for Anomaly Detection in Self-Organizing Networks.Aakula Lavanya & Dr K. Sekar - 2023 - International Journal of Scientific Research in Science, Engineering and Technology 10 (6).
    The motivation behind exploring anomaly detection in self-organizing networks lies in the evolving landscape of telecommunications and network management. Conventional methods for identifying network anomalies often struggle to adapt to the dynamic and complex nature of modern self-organizing networks. The problem addressed in this research is the efficacy of anomaly detection methods in self-organizing networks (SONs) within the context of telecommunications and network management. As SONs become increasingly prevalent to meet the demands of modern, highly dynamic wireless communication systems, the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Software Development Strategies for Multi-Regional Applications.Baladari Venkata - 2022 - European Journal of Advances in Engineering and Technology 9 (3):193-200.
    Deploying applications across multiple cloud regions boosts availability, disaster recovery, and user experience but raises complexities including data synchronization, network optimization, security, and cost management. This research examines the responsibilities of software developers in designing and overseeing multi-region cloud-based applications. The main goal is to identify and examine the essential factors and most effective methods that developers should adhere to when constructing reliable, expandable, and high-performance cloud-based applications, approaches to tackle these complexities, such as Infrastructure as Code (IaC) for automating (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. Decentralized AI for Secure IoT: Federated Learning Meets Intrusion Detection.Sinha Krish Prem - 2019 - International Journal of Multidisciplinary Research in Science, Engineering, Technology and Management (Ijmrsetm) 6 (8):1634-1639.
    The proliferation of Internet of Things (IoT) devices has significantly expanded the attack surface for cyber threats, necessitating robust security measures. Traditional Intrusion Detection Systems (IDS) often rely on centralized architectures, which can compromise data privacy and scalability. This paper explores the integration of Federated Learning (FL) into IDS for IoT networks, enabling decentralized model training while preserving data privacy. By leveraging local computation and aggregating model updates, FL facilitates collaborative learning across distributed IoT devices. The proposed approach aims to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. Widening Access to Applied Machine Learning With TinyML.Vijay Reddi, Brian Plancher, Susan Kennedy, Laurence Moroney, Pete Warden, Lara Suzuki, Anant Agarwal, Colby Banbury, Massimo Banzi, Matthew Bennett, Benjamin Brown, Sharad Chitlangia, Radhika Ghosal, Sarah Grafman, Rupert Jaeger, Srivatsan Krishnan, Maximilian Lam, Daniel Leiker, Cara Mann, Mark Mazumder, Dominic Pajak, Dhilan Ramaprasad, J. Evan Smith, Matthew Stewart & Dustin Tingley - 2022 - Harvard Data Science Review 4 (1).
    Broadening access to both computational and educational resources is crit- ical to diffusing machine learning (ML) innovation. However, today, most ML resources and experts are siloed in a few countries and organizations. In this article, we describe our pedagogical approach to increasing access to applied ML through a massive open online course (MOOC) on Tiny Machine Learning (TinyML). We suggest that TinyML, applied ML on resource-constrained embedded devices, is an attractive means to widen access because TinyML leverages low-cost and globally (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. The Evolution of Deep Learning: A Performance Analysis of CNNs in Image Recognition.Mittal Mohit - 2016 - International Journal of Advanced Research in Education and Technology(Ijarety) 3 (6):2029-2038.
    Computer vision, or image recognition, analyses and interprets visual data in real-world scenarios like images and videos. AI and ML research focusses on object, scene, action, and feature identification because of its usefulness in image processing. Neural networks and deep learning have improved image recognition systems significantly in recent years. Early image recognition used template matching to identify objects. A photo is compared to a stored template using similarity measures like correlation to get the best match. There are several constraints, (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  46. The AI Renaissance: Innovations, Ethics, and the Future of Intelligent Systems.Jagdish Jangid & Sachin Dixit - 2023 - Technoscience Academy.
    In this comprehensive exploration of Artificial Intelligence, The AI Renaissance: Innovations, Ethics, and the Future of Intelligent Systems takes readers on a captivating journey through the foundations, applications, and ethical dimensions of this groundbreaking technology. Divided into three insightful parts, the book begins with a deep dive into the evolution of AI, from early symbolic intelligence to the rise of deep learning, and examines the intersection of neuroscience and artificial general intelligence (AGI). Part two highlights AI’s transformative role across various (...)
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  47. Silicon minds: The rise of AI-powered chips.Dhruvitkumar Talati - 2021 - International Journal of Science and Research Archive 1 ((02)):097-108.
    The semiconductor industry is the fulcrum of digital revolution in the contemporary era, driving cutting-edge technologies that characterize the world today as being interconnected. Increasing demands for smart, rapid, and efficient computing continue to drive semiconductor innovation to new frontiers of possibility. In the next decade, the world semiconductor market will see explosive growth driven by disruptive technologies like artificial intelligence (AI), autonomous cars, 5G networks, and the Internet of Things (IoT). Of these, AI semiconductors, or AI chips, (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  48. Semantic Cluster Theory III: AI–Human Cognitive Compatibility and the Adaptive Derivation Engine (ADE).Suzume Suzume - manuscript
    This paper argues that artificial intelligence—particularly large language models—and human cognition share a fundamentally compatible concept-network architecture. Contrary to traditional comparisons that emphasize differences in computation, memory, or consciousness, this work demonstrates that AI and humans instantiate isomorphic structures across three dimensions: (1) latent conceptual nodes, (2) edge formation through consistency-checking or attention mechanisms, and (3) derivation expansion triggered by structurally dense concepts. -/- Based on this structural isomorphism, the paper introduces the Adaptive Derivation Engine (ADE) as a unified (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. 5G-Enabled Cloud Services: Unlocking New Frontiers for Low-Latency Applications and Network Slicing.Eneeyasri D. S. - 2025 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 8 (2):1105-1110.
    The introduction of 5G networks has brought forth a revolutionary shift in the capabilities of cloud services, especially with regard to low-latency applications and advanced network management techniques. 5G’s highspeed, low-latency, and massive connectivity features are particularly valuable for real-time applications, such as autonomous vehicles, industrial automation, augmented reality (AR), virtual reality (VR), and Internet of Things (IoT) ecosystems. Moreover, 5G enables network slicing, a technique that allows operators to create multiple virtual networks with customized performance characteristics within a single (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. The Quantum-Holographic Consciousness Criterion: A Definitive Resolution of the Simulation Hypothesis.Kwan Hong Tan - 2025 - Dissertation, Singapore University of Social Sciences
    The simulation hypothesis, popularized by philosopher Nick Bostrom in 2003, has remained one of the most intriguing yet unresolved questions in contemporary philosophy and theoretical physics. This thesis presents a novel theoretical framework—the Quantum-Holographic Consciousness Criterion (QHCC)—that provides a definitive resolution to whether we are living in a computer simulation. By integrating cutting-edge research from quantum consciousness studies, holographic physics, integrated information theory, and computational complexity theory, the QHCC demonstrates that classical computer simulations cannot support genuine consciousness due to (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
1 — 50 / 990