SAP HANA–Driven Real-Time AI Cloud DevOps Architecture for Scalable ML, DL, and ERP-Integrated Cybersecurity Threat Detection
Main Article Content
Abstract
Article Details
Section
How to Cite
References
1. Diwakar, S., Bodda, S., Nutakki, C., Vijayan, A., Achuthan, K., & Nair, B. G. (2014). Neural control using EEG as a BCI technique for low-cost prosthetic arms. Proceedings of the 6th International Conference on Neural Computation Theory and Applications (NCTA). SciTePress+1
2. Kumar, R. K. (2023). Cloud-integrated AI framework for transaction-aware decision optimization in agile healthcare project management. International Journal of Computer Technology and Electronics Communication (IJCTEC), 6(1), 6347–6355. https://doi.org/10.15680/IJCTECE.2023.0601004
3. Pichaimani, T., Inampudi, R. K., &Ratnala, A. K. (2021). Generative AI for Optimizing Enterprise Search: Leveraging Deep Learning Models to Automate Knowledge Discovery and Employee Onboarding Processes. Journal of Artificial Intelligence Research, 1(2), 109-148.
4. Kumbum, P. K., Adari, V. K., Chunduru, V. K., Gonepally, S., &Amuda, K. K. (2020). Artificial intelligence using TOPSIS method. International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 3(6), 4305-4311.
5. Nagarajan, G. (2022). An integrated cloud and network-aware AI architecture for optimizing project prioritization in healthcare strategic portfolios. International Journal of Research and Applied Innovations, 5(1), 6444–6450. https://doi.org/10.15662/IJRAI.2022.0501004
6. Anand, L., &Neelanarayanan, V. (2019). Feature Selection for Liver Disease using Particle Swarm Optimization Algorithm. International Journal of Recent Technology and Engineering (IJRTE), 8(3), 6434-6439.
7. Raj, A. A., &Sugumar, R. (2022, December). Monitoring of the Social Distance between Passengers in Real-time through Video Analytics and Deep Learning in Railway Stations for Developing the Highest Efficiency. In 2022 International Conference on Data Science, Agents & Artificial Intelligence (ICDSAAI) (Vol. 1, pp. 1-7). IEEE.
8. Girdhar, P., Virmani, D., &Saravana Kumar, S. (2019). A hybrid fuzzy framework for face detection and recognition using behavioral traits. Journal of Statistics and Management Systems, 22(2), 271-287.
9. Konda, S. K. (2022). STRATEGIC EXECUTION OF SYSTEM-WIDE BMS UPGRADES IN PEDIATRIC HEALTHCARE ENVIRONMENTS. International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 5(4), 7123-7129.
10. M. A. Alim, M. R. Rahman, M. H. Arif, and M. S. Hossen, “Enhancing fraud detection and security in banking and e-commerce with AI-powered identity verification systems,” 2020.
11. Zhu, B., Shin, U., &Shoaran, M. (2021). Closed-loop neural prostheses with on-chip intelligence: a review and a low-latency machine learning model for brain state detection. arXiv. arXiv
12. Sivaraju, P. S. (2022). Enterprise-Scale Data Center Migration and Consolidation: Private Bank's Strategic Transition to HP Infrastructure. International Journal of Computer Technology and Electronics Communication, 5(6), 6123-6134.
13. Kapadia, V., Jensen, J., McBride, G., Sundaramoothy, J., Deshmukh, R., Sacheti, P., &Althati, C. (2015). U.S. Patent No. 8,965,820. Washington, DC: U.S. Patent and Trademark Office.
14. Rutkowski, T. M., Mori, H., Kodama, T., & Shinoda, H. (2015). Airborne ultrasonic tactile display brain–computer interface – A small robotic arm online control study. arXiv. arXiv
15. Mani, R. (2022). Enhancing SAP HANA Resilience and Performance on RHEL using Pacemaker: A Strategic Approach to Migration Optimization and Dual-Function Infrastructure Design. International Journal of Computer Technology and Electronics Communication, 5(6), 6061-6074.
16. Sudhan, S. K. H. H., & Kumar, S. S. (2015). An innovative proposal for secure cloud authentication using encrypted biometric authentication scheme. Indian journal of science and technology, 8(35), 1-5.
17. Balaji, K. V., &Sugumar, R. (2022, December). A Comprehensive Review of Diabetes Mellitus Exposure and Prediction using Deep Learning Techniques. In 2022 International Conference on Data Science, Agents & Artificial Intelligence (ICDSAAI) (Vol. 1, pp. 1-6). IEEE.
18. Archana, R., &Anand, L. (2023, May). Effective Methods to Detect Liver Cancer Using CNN and Deep Learning Algorithms. In 2023 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI) (pp. 1-7). IEEE.
19. Mohile, A. (2022). Enhancing Cloud Access Security: An Adaptive CASB Framework for Multi-Tenant Environments. International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 5(4), 7134-7141.
20. Vunnam, N., Kalyanasundaram, P. D., &Vijayaboopathy, V. (2022). AI-Powered Safety Compliance Frameworks: Aligning Workplace Security with National Safety Goals. Essex Journal of AI Ethics and Responsible Innovation, 2, 293-328.
21. Kumar, S. N. P. (2022). Improving Fraud Detection in Credit Card Transactions Using Autoencoders and Deep Neural Networks (Doctoral dissertation, The George Washington University).
22. Thangavelu, K., Kota, R. K., & Mohammed, A. S. (2022). Self-Serve Analytics: Enabling Business Users with AI-Driven Insights. Los Angeles Journal of Intelligent Systems and Pattern Recognition, 2, 73-112.
23. AnujArora, “Analyzing Best Practices and Strategies for Encrypting Data at Rest (Stored) and Data in Transit (Transmitted) in Cloud Environments”, “INTERNATIONAL JOURNAL OF RESEARCH IN ELECTRONICS AND COMPUTER ENGINEERING”, VOL. 6 ISSUE 4 ( OCTOBER- DECEMBER 2018).
24. Vinay Kumar Ch, Srinivas G, Kishor Kumar A, Praveen Kumar K, Vijay Kumar A. (2021). Real-time optical wireless mobile communication with high physical layer reliability Using GRA Method. J Comp SciAppl Inform Technol. 6(1): 1-7. DOI: 10.15226/2474-9257/6/1/00149
25. Hardial Singh, “The Role of Multi-Factor Authentication and Encryption in Securing Data Access of Cloud Resources in a Multitenant Environment”, THE RESEARCH JOURNAL (TRJ), VOL. 4 ISSUE 4-5 JULY-OCT 2018.
26. Pasumarthi, A. (2023). Dynamic Repurpose Architecture for SAP Hana Transforming DR Systems into Active Quality Environments without Compromising Resilience. International Journal of Engineering & Extended Technologies Research (IJEETR), 5(2), 6263-6274.
27. Navandar, P. (2021). Developing advanced fraud prevention techniques using data analytics and ERP systems. International Journal of Science and Research (IJSR), 10(5), 1326–1329. https://dx.doi.org/10.21275/SR24418104835 https://www.researchgate.net/profile/Pavan-Navandar/publication/386507190_Developing_Advanced_Fraud_Prevention_Techniquesusing_Data_Analytics_and_ERP_Systems/links/675a0ecc138b414414d67c3c/Developing-Advanced-Fraud-Prevention-Techniquesusing-Data-Analytics-and-ERP-Systems.pdf
28. Ramakrishna, S. (2022). AI-augmented cloud performance metrics with integrated caching and transaction analytics for superior project monitoring and quality assurance. International Journal of Engineering & Extended Technologies Research (IJEETR), 4(6), 5647–5655. https://doi.org/10.15662/IJEETR.2022.0406005
29. Yanagisawa, T., et al. (2011). Controlling a prosthetic arm using ECoG signals (cited in comprehensive study). RedALyC Journal. Redalyc