PARTICULAR
|
Page No.
|
Kubernetes Essentials: The Backbone of Modern Container Orchestration
Sankara Aditya Sarma Garimella, Srivenkatesh Dudala
Abstract:
The rise of microservices has caused an increase in the usage of container technologies because the containers offer the perfect host for small independent applications like microservices.
Download full Length Paper......
|
1-9
|
Comparative Analysis of Core Machine Learning Models: Exploring the Predictive Power of Regression and Neural Networks
Srivenkatesh Dudala, Sankara Aditya Sarma Garimella
Abstract:
This paper explores the fundamental concepts and applications of three key machine learning models: linear regression, logistic regression, and neural networks.
Download full Length Paper......
|
10-20
|
Unified Payment Interface- A Study of Opportunity and challenges in India
Dr. Maneesh Kumar, Rama Raman Pandey
Abstract:
In financial division, the digital conversion is a massive revolution. Now days the financial sector is shifting to virtual mode from paper currency mode.
Download full Length Paper......
|
21-26
|
SAP ABAP RESTful Application Programming Model
Srihariram Chendamarai Kannan
Abstract:
The world of SAP business applications has experienced significant changes, propelled by evolving demands and technological progress.
Download full Length Paper......
|
27-37
|
Unified Payment Interface- A Study of Opportunity and challenges in India
Dr. Maneesh Kumar, Rama Raman Pandey
Abstract:
In financial division, the digital conversion is a massive revolution. Now days the financial sector is shifting to virtual mode from paper currency mode.
Download full Length Paper......
|
38-43
|
How to achieve Zero-downtime deployments and Graceful shutdown of K8 pods running on EKS
Jatla.Prasanna
|
44-48
|
Privacy Preservation in Outlier Detection
Ajinkya Rasam, Aditya Sawant
|
49-57
|
Optimizing Large Language Model Interactions: Strategies for Accurate and Specific Responses
Kiran Randhi
Abstract:
This paper explores the possible potential of automated prompt engineering in harnessing the capabilities of large language models (LLMs) to produce candid guidance.
Download full Length Paper......
|
58-61
|
Women Entrepreneurs: Understanding their challenges, opportunities and coping strategies: A Study on Sylhet City
Dr.Fatema khatun
Abstract:
The main purpose of this research is to find out the challenges and opportunities that most of the women specifically those who are entrepreneurs are facing challenges in Sylhet area, Bangladesh.
Download full Length Paper......
|
62-76
|
Service Virtualization: Accelerating Development Early in the Lifecycle
Avinash Swaminathan Vaidyanathan and
Srinath Vengaivasal Mohankumar
Abstract:
Service visualization is crucial in modern software testing, facilitating strong
and adaptable simulation of services that engage with intricate applications.
Download full Length Paper......
|
77-80
|
Data Privacy in Multi-Cloud: A Fragmentation and Distribution Approach
Rajesh Daruvuri
Sravani Chirumamilla
Pravallika Mannem
Suchitha Reddy Aeniga
Abstract:
Security and specifically data privacy remains a big concern especially in multi tenancy since it brings resource sharing that exposes environment to more security threats such as hacking.
Download full Length Paper......
|
81-86
|
Leveraging Generative AI for Efficient Product Briefing Document Generation in Supply Chain
Venkat Sharma Gaddala, Ravi Dharmalingam, Shaswat Kumar, Gary Borella
Abstract:
Generative AI enables an efficient product briefing document generation approach in the supply chain based on its leveraging to streamline the information flow and decision making.
Download full Length Paper......
|
87-95
|
Factors Influencing Financial Risk Tolerance: A Study of Demographic and Psychographic Characteristics among Investors
Dr. Subarnna Keshari Samal
Abstract:
This study examines the factors influencing Financial Risk Tolerance (FRT) by analyzing demographic and psychological variables, including age, income, education, gender, investment experience, and risk perception.
Download full Length Paper......
|
96-108
|
Advanced Persistent Threats: Understanding and Defending Against Long-Term Cyber Espionage
Rajender PellReddy
Abstract:
A well-prepared Advanced Persistent Threats, otherwise known as APTs, are one of the biggest and severest threats facing organizations at present.
Download full Length Paper......
|
109-123
|
Enhancing Network Performance Through Data Analytics
Satish Chandra Cherukuri
Abstract:
In the rapidly evolving field of telecommunications, data analytics has emerged as a critical tool for improving network performance,
Download full Length Paper......
|
124-130
|