Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Journal of Artificial Intelligence & Cloud Computing
About the Journal
Editorial Team
Current
Archives
Contact
About
Submissions
Privacy Statement
Search
Register
Login
Home
/
Archives
/
Vol. 1 No. 3 (2022): Volume 1 Issue 3
Vol. 1 No. 3 (2022): Volume 1 Issue 3
Published:
2022-09-30
Articles
Reduce the Effort and Time in Calculating the AbsenteeismPercentage of Students
Luay Abdulwahid Shihab, Manhal Mohammad Basher Hasan Aga (Author)
1-4
View PDF
Adopting Zero Trust Architecture in Data Engineering: ImplementingSecure, Trustless Systems for Modern Data Security
Abhijit Joshi (Author)
1-6
View PDF
The Method of Probabilistic Nodes Combination in HandwrittenCharacter Reconstruction
Dariusz Jacek Jakóbczak (Author)
1-6
View PDF
Utilizing Pega Decisioning for Data-Driven Dispute ResolutionStrategies
Sai Kiran Nandipati (Author)
1-6
View PDF
Cloud Computing – An Overview
V Senthur Velmurugan (Author)
1-3
View PDF
Enhancing Cybersecurity and Privacy with Artificial Intelligence
Naga Satya Praveen Kumar Yadati (Author)
1-5
View PDF
Cyber-Security in Nigeria. A Case Study of Surveillance andPrevention of Digital Crime by Lorliam. A Review beyond MereDigital Surveillance
James Chike Nwankwo (Author)
1-4
View PDF
Identity-Centric Security for Cloud Workloads
Anvesh Gunuganti (Author)
1-6
View PDF
Artificial Intelligence in Healthcare and Biotechnology: A Reviewof the Saudi Experience
Mohammed Aljumah, Fatema Dabdoub, Margaretta Colangelo, Ola El Kibbi, Sahar Shami, Abdullah Aljumah, Mohamed Boudjelal (Author)
1-6
View PDF
Machine Learning for Credit Risk Assessment in Banking: AnOverview
Goutham Sabbani (Author)
1-3
View PDF
Analysing Market Trends with AI
Raghavendra Sangarsu (Author)
1-3
View PDF
Natural Language Processing for Script Writing Assistance
Kailash Alle (Author)
1-6
View PDF
Demand Planning Integration Best Practices: SAP SCM Perspective– PART 3
Rajesh Azmeera (Author)
1-9
View PDF
Unlocking AWS Potential: Strategies and Best Practices for SMEs toEnhance Efficiency and Foster Innovation
Venkata Tadi (Author)
1-10
View PDF
The Role of Artificial Intelligence in Transforming Human ResourceManagement: A Literature Review
Somil Nishar (Author)
1-4
View PDF
Encryption of Host-to-Host Payment Transactions Using MasterSession Key Implementation for Multi-Merchant Acquirer Integrationvia a Single Payment Gateway Platform
Pavan Kumar Joshi (Author)
1-3
View PDF
Enhancing Financial Services: Leveraging Third-party APIs forFinTech Innovation
Sridhar Mooghala (Author)
1-5
View PDF
Enhancing Salesforce Security: Employing Artificial Intelligence andAutomation for Strong Protection
Sandhya Rani Koppanathi (Author)
1-6
View PDF
Integrating Advanced Data Analytics with Artificial Intelligence:Unveiling Synergies for Enhanced Decision-Making
Narayana Challa, Satish Kathiriya, Mahesh Babu Munjala (Author)
1-6
View PDF
Enhancing Real-Time Data Communication and Security in ConnectedVehicles Using MQTT Protocol
Purshotam S Yadav (Author)
1-6
View PDF
Design Approach for Highly Configurable Web Configurator &Ordering Platform
Nilesh D Kulkarni, Saurav Bansal (Author)
1-5
View PDF
Enhancing Restaurant Payments with QR Code Integration for Appleand Google Pay
Akash Gill (Author)
1-12
View PDF
Leveraging Distributed Computing for Enhanced Risk Managementand Compliance in Banking: A Pathway to Financial Success
Abhishek Shende (Author)
1-6
View PDF
Digital Transformation and Cloud Computing
Sravanthi Mallireddy (Author)
1-3
View PDF
Scaling Data Science: Challenges in Enterprise Adoption
Sowmya Ramesh Kumar (Author)
1-3
View PDF
Achieving Regulatory Compliance with ISO 27001 and NISTFrameworks: The Process and Challenges of Obtaining these CriticalCertifications for Clients
Wasif Khan (Author)
1-14
View PDF
Mastering Test Automation: Bridging Gaps for Seamless QA
Rohit Khankhoje (Author)
1-6
View PDF
AI-Driven Anomaly Detection: A New Frontier in Web ApplicationSecurity
Praveen Kumar Thopalle (Author)
1-6
View PDF
Integrating AI and Distributed Computing for Advanced DentalHealthcare Management
Abhishek Shende (Author)
1-3
View PDF
Flexible Rent Payment Options for Tenants
Krupa Goel (Author)
1-11
View PDF
Enhancing Cyber Security in the Banking Domain: InnovativeProblem Resolution
Arnab Dey (Author)
1-6
View PDF
A Unified Machine Learning Approach for Efficient ArtifactManagement in Jenkins CI/CD Pipelines
Praveen Kumar Thopalle (Author)
1-6
View PDF
Pharmacy and Artificial Intelligence (AI): A Review of RecentAdvancements
Bhavinkumar B Shah (Author)
1-4
View PDF
Utilizing Big Data and Cloud Computing to Transform Healthcare: Improving Patient
Manoj Kumar (Author)
1-5
View PDF
IP Expiration and Host Name Mismatch: A Common Client ServerConnectivity Issue
Prashanth Kodurupati (Author)
1-3
View PDF
Advancements in 5G Technology: Challenges and Opportunities for Nationwide Deployment
Krupal Shah (Author)
1-9
View PDF
Leveraging Machine Learning for Enhanced Climate Risk Compliance in Financial Institutions
Rohit Nimmala, Jagrut Nimmala (Author)
1-3
View PDF
Improving Restaurant Worker Efficiency with A Pos Swipe-Up Feature
Akash Gill (Author)
1-13
View PDF
Loss of Data Control Scenarios and Best Data Loss Prevention(DLP) Practices
Prashanth Kodurupati (Author)
1-3
View PDF
Integrating Large Language Models with Computer Vision for Enhanced Image Captioning: Combining LLMS with Visual Data to Generate more Accurate and Context-Rich Image Descriptions
Vedant Singh (Author)
1-10
View PDF
Securing the Future: Strategies for Modernizing Legacy Systems and Enhancing Cybersecurity
Vijayasekhar Duvvur (Author)
1-3
View PDF
GIS for 5G Network Deployment: Optimizing Coverage and Capacity with Spatial Analysis
Kirti Vasdev (Author)
1-3
View PDF
Artificial Intelligence-Powered Credit Card Fraud Detection: Feature Engineering and Machine Learning Approach’s
Varun Bodepudi, Niharika Katnapally, Srinivasa Rao Maka, Gangadhar Sadaram, Manikanth Sakuru, Laxmana Murthy Karaka (Author)
1-7
View PDF
Enhancing Mobile App Functionality and User Experience With Barcode Scanner API
Raja Patnaik (Author)
1-4
View PDF
Strategies for Protecting Against SQL Injection Vulnerabilities in Web Applications
Akshay Chandrachood (Author)
1-3
View PDF
Scheduled File Transfer Job Failures: Reasons and Remediation Measures from an MFT Perspective
Prashanth Kodurupati (Author)
1-3
View PDF
Adopting Zero Trust Architecture in Data Engineering: Implementing Secure, Trustless Systems for Modern Data Security
Abhijit Joshi (Author)
1-6
View PDF
Encryption of Host-to-Host Payment Transactions Using Master Session Key Implementation for Multi-Merchant Acquirer Integration via a Single Payment Gateway Platform
Pavan Kumar Joshi (Author)
1-3
View PDF
Cloud Computing and Public Sector Transformation: Revolutionizing Governmental Services and Operations
Bhargav Reddy Piduru (Author)
1-4
View PDF
issn
ISSN: 2754-6659 | Open Access
Make a Submission
Make a Submission
Information
For Readers
For Authors
For Librarians
Latest publications