International Journal of Science and Research (IJSR)
Information Technology
Downloads: 2 | Views: 314
Computer Science and Information Technology, India, Volume 13 Issue 5, May 2024
Pages: 518 - 527Sine Cosine Algorithm with Optimal Convolutional Autoencoder for Intrusion Detection and Classification Model
K. Hemavathi | Dr. R. Latha
Downloads: 2 | Views: 450
Information Technology, United States, Volume 7 Issue 11, November 2018
Pages: 1992 - 1996From Reactive to Proactive: Employing AI and ML in Automotive Brakes and Parking Systems to Enhance Road Safety
Vishwanadham Mandala
Downloads: 2 | Views: 333
Information Technology, United States, Volume 13 Issue 6, June 2024
Pages: 684 - 690Bridging Healthcare Systems: Revolutionizing U.S. Public Healthcare through HL7 FHIR Interoperability and API Technology
Sivachandran Selvaraj
Downloads: 2 | Views: 403
Computer Science and Information Technology, United States, Volume 11 Issue 3, March 2022
Pages: 1614 - 1615Enhancing Business Efficiency with Robotic Process Automation: Techniques, Challenges, and Future Prospects
Narendar Kumar Ale
Downloads: 2 | Views: 494
Information Technology, United States, Volume 13 Issue 6, June 2024
Pages: 1741 - 1747Risk Management and Compliance with Business Intelligence in Banking
Pranay Mungara
Downloads: 2 | Views: 496
Information Technology, India, Volume 12 Issue 5, May 2023
Pages: 2681 - 2682Blockchain in Cloud Computing
Goutham Sabbani
Downloads: 2 | Views: 350
Computer Science and Information Technology, United States, Volume 12 Issue 12, December 2023
Pages: 2130 - 2131AI and Machine Learning in Test Automation: Techniques, Challenges, and Future Prospects
Narendar Kumar Ale
Downloads: 2 | Views: 403
Information Technology, India, Volume 12 Issue 10, October 2023
Pages: 2168 - 2170Robotic Process Automation (RPA) for Efficient Healthcare: Transforming Eligibility Verification
Rahul Laxman Chaudhary
Downloads: 2 | Views: 285
Computer Science and Information Technology, United States, Volume 13 Issue 7, July 2024
Pages: 1190 - 1194Serverless Security: Best Practices for Protecting Functions-as-a-Service
Yamini Kannan
Downloads: 2 | Views: 546
Computer Science and Information Technology, India, Volume 11 Issue 5, May 2022
Pages: 2111 - 2118Zero Trust Architecture: Principles, Implementation, and Impact on Organizational Security
Yamini Kannan