Articles

Browse all published research articles

7 articles found
Active filters: Search: cybersecurity ?
Open Access Review Article
29 pages 4870 KB

Innovations and Challenges in Pharmaceutical Supply Chain, Serialization and Regulatory Landscape

Shrikant Dhoke
Universal Journal of Pharmacy and Pharmacology 4(1); 10.31586/ujpp.2025.6002 - February 25, 2025
430 views 99 downloads
Abstract

The pharmaceutical supply chain has become increasingly complex and vulnerable to various risks, including counterfeit drugs, diversion, and fraud. As these challenges threaten patient safety and the ... Read more

Open Access Article
11 pages 1249 KB

Artificial Immune Systems: A Bio-Inspired Paradigm for Computational Intelligence

Praveen Kumar Myakala, Chiranjeevi Bura, Anil Kumar Jonnalagadda
Journal of Artificial Intelligence and Big Data 5(1); 10.31586/jaibd.2025.1233 - January 09, 2025
5548 views 190 downloads
Abstract

Artificial Immune Systems (AIS) are bio-inspired computational frameworks that emulate the adaptive mechanisms of the human immune system, such as self/non-self discrimination, clonal selection, and i... Read more

Open Access Review Article
11 pages 1158 KB

Cloud Based Payment Processing and Merchant Services: A Scalable and Secure Framework for Digital Transactions in a Globalized Economy

Jai Kiran Reddy Burugulla
Universal Journal of Finance and Economics 3(1); 10.31586/ujfe.2023.1290 - December 21, 2023
404 views 65 downloads
Abstract

In today’s world of a globalized economy and ubiquitous digital transactions, businesses are hungry for ways to increase transaction efficiency and security. In the real economy, solutions that scale ... Read more

Open Access Review Article
22 pages 3374 KB

Success Factors of Adopting Cloud Enterprise Resource Planning

Venkata Pavan Kumar Juturi
Universal Journal of Computer Sciences and Communications 2(1); 10.31586/ujcsc.2023.830 - December 05, 2023
1161 views 334 downloads
Abstract

The technologies for cloud ERP (Enterprise Resource Planning) have revolutionized the field of information technologies. Any kind of business can benefit from their flexibility, affordability, scalabi... Read more

Open Access Article
19 pages 2877 KB

Big Data and AI/ML in Threat Detection: A New Era of Cybersecurity

Seshagirirao Lekkala, Raghavaiah Avula, Priyanka Gurijala
Journal of Artificial Intelligence and Big Data 2(1); 10.31586/jaibd.2022.1125 - October 14, 2022
577 views 98 downloads
Abstract

The unrelenting proliferation of data, entwined with the prevalence of mobile devices, has given birth to an unprecedented growth of information obscured by noise. With the Internet of Things and myri... Read more

Open Access Review Article
26 pages 4242 KB

A Deep Learning Architectures for Enhancing Cyber Security Protocols in Big Data Integrated ERP Systems

Srinivasa Rao Maka, Varun Bodepudi, KishanKumar Routhu, Krishna Madhav Jha, Purna Chandra Rao Chinta, Manikanth Sakuru
Journal of Artificial Intelligence and Big Data 1(1); 10.31586/jaibd.2020.1238 - December 28, 2020
450 views 67 downloads
Abstract

Deep learning approaches are very useful to enhance cybersecurity protocols for industry-integrated big data enterprise resource planning systems. This research study develops deep learning architectu... Read more

Open Access Review Article
10 pages 1035 KB

A Comprehensive Study of Proactive Cybersecurity Models in Cloud-Driven Retail Technology Architectures

Chandrashekar Pandugula, Zakera Yasmeen
Universal Journal of Computer Sciences and Communications 1(1); 10.31586/ujcsc.2019.1253 - December 26, 2019
496 views 81 downloads
Abstract

This is a comprehensive, multi-year study designed to explore proactive security technologies implemented in cloud-driven retail technology architectures. Deploying cloud technologies in the retail en... Read more