Results (11)
Search Parameters:
Keyword: InfrastructureAI-Enhanced Endpoint Compliance and Automated Vulnerability Management Framework for Essential Government Infrastructure
by Harshavardhan Malla
Journal of Engineering Research and Sciences, Volume 4, Issue 8, Page # 18-23, 2025; DOI: 10.55708/js0408002
Abstract: Public sector IT infrastructures that underpin essential services, such as transportation and law enforcement, are becoming progressively susceptible to advanced cyber attacks and encounter heightened regulatory demands, especially in accordance with CJIS and NIST standards. Regrettably, existing methods for compliance enforcement and patch management are primarily manual or only slightly automated, thereby constraining their scalability,… Read More
(This article belongs to the Section Information Systems – Computer Science (ISC))
An Overview of Cyber Security Considerations and Vulnerabilities in Critical Infrastructure Systems and Potential Automated Mitigation - A Review
by Roberto Mazzolin and Asad Madni
Journal of Engineering Research and Sciences, Volume 1, Issue 4, Page # 09-21, 2022; DOI: 10.55708/js0104002
Abstract: Executive leadership in government, military and industry are faced with many difficult challenges when trying to understand the complex interaction of public and government security policies, the vulnerabilities in the wide array of key technologies supporting critical infrastructure upon which society is vitally dependent, and the identification of key cyber security trends that will need… Read More
(This article belongs to the Section Electronic Engineering (EEE))
How to Fix Automation Flakiness: Root Causes and Enterprise-Level Solutions
by Sujeet Kumar Tiwari
Journal of Engineering Research and Sciences, Volume 5, Issue 2, Page # 9-23, 2026; DOI: 10.55708/js0502002
Abstract: Flakiness in automation is one of the most intractable barriers to dependable enterprise CI/CD, in which organizations can run more than 50M tests daily, and a 5-10% flaky rate may spoil thousands of builds. The paper brings together empirical research and industrial case studies on UI, API, mobile, and data pipelines to describe the prevalent… Read More
(This article belongs to the Section Hardware and Architecture – Computer Science (HAC))
A Vendor-Agnostic Multi-Cloud Integration Framework Using Boomi and SAP BTP
by Padmanabhan Venkiteela
Journal of Engineering Research and Sciences, Volume 4, Issue 12, Page # 1-14, 2025; DOI: 10.55708/js0412001
Abstract: The shift toward multi-cloud strategies has made a vendor-agnostic integration framework indispensable for seamlessly orchestrating workflows across heterogeneous platforms. Modern enterprises increasingly rely on a mix of cloud ecosystems leveraging Amazon Web Services (AWS) for elasticity, Google Cloud Platform (GCP) for advanced AI/ML capabilities, Azure Cloud and Oracle Cloud Infrastructure (OCI) for critical enterprise workloads… Read More
(This article belongs to the Section Information Systems – Computer Science (ISC))
Energy-Optimized Smart Transformers for Renewable-Rich Grids
by Sunday Omini Oboma and Edward Lambart
Journal of Engineering Research and Sciences, Volume 4, Issue 10, Page # 21-28, 2025; DOI: 10.55708/js0410003
Abstract: The accelerating and unrestrained use of energy globally raises serious concerns for the future of the planet, primarily due to the environmental devastation caused by fossil fuels. Achieving high energy efficiency in both fuel-driven and renewable energy systems is crucial for future energy optimization. Clean energy production is one of the most effective strategies to… Read More
(This article belongs to the Section Energy and Fuels (ENF))
Unveiling the Evolving Threat Landscape of Distributed Denial-of-Service (DDoS) Attacks Methodology and Security Measures
by Eman Eyadat, Mohammad Eyadat and Abedalrahman Alfaqih
Journal of Engineering Research and Sciences, Volume 4, Issue 10, Page # 9-20, 2025; DOI: 10.55708/js0410002
Abstract: This paper proposes a concrete severity classification framework and an evaluation lens for DDoS defenses (not a descriptive survey) and contributes two specific advancements. First, it introduces a quartile-based severity classification framework for Distributed Denial of Service (DDoS) attacks that extends beyond conventional binary detection. The framework classifies observed traffic into four categories (Q1–Q4) using… Read More
(This article belongs to the Special Issue on Special Issue on Multidisciplinary Sciences and Advanced Technology (SI-MSAT 2025) and the Section Information Systems – Computer Science (ISC))
Navigating the Autonomous Era: A Detailed Survey of Driverless Cars
by Vaibhavi Tiwari
Journal of Engineering Research and Sciences, Volume 3, Issue 10, Page # 21-36, 2024; DOI: 10.55708/js0310003
Abstract: The incorporation of cutting-edge technologies like sensor networks, artificial intelligence (AI), and vehicle-to everything (V2X) communication has hastened the rollout of autonomous vehicles (AVs), offering significant possibilities for the future of transportation. This document offers an extensive overview of AV technology, covering essential elements such as technological infrastructure, degrees of automation, cybersecurity threats, societal impacts,… Read More
(This article belongs to the Special Issue on Special Issue on Multidisciplinary Sciences and Advanced Technology (SI-MSAT 2024) and the Section Transportation Science & Technology (TST))
SimulatorBridger: System for Monitoring Energy Efficiency of Electric Vehicles in Real-World Traffic Simulations
by Reham Almutairi, Giacomo Berg and Graham Morgan
Journal of Engineering Research and Sciences, Volume 3, Issue 6, Page # 33-40, 2024; DOI: 10.55708/js0306004
Abstract: The increasing popularity and attention in Vehicular Ad-hoc Networks (VANETs) have prompted researchers to develop accurate and realistic simulation tools. Realistic simulation for VANETs is challenging due to the high mobility of vehicles and the need to integrate various communication modalities such as Vehicle-to-Infrastructure (V2I) and Vehicle-to-Vehicle (V2V) interactions. Existing simulators lack the capability to… Read More
(This article belongs to the Special Issue on Special Issue on Multidisciplinary Sciences and Advanced Technology (SI-MSAT 2024) and the Section Transportation Science & Technology (TST))
Numerical Analysis of Riverbank Slope Stability Considering Rainfall, Vegetation and Water Level Fluctuation
by Md Tanvir Ahsan, Ji-Peng Wang, Saidov Mirzo Sibgatullovich, Abdelali Dadda and Salikhov Farid Salokhiddinovich
Journal of Engineering Research and Sciences, Volume 3, Issue 4, Page # 20-31, 2024; DOI: 10.55708/js0304003
Abstract: The occurrence of landslides and slope instability along riparian zones has been a recurrent phenomenon of substantial concern globally. This paper presents a comprehensive investigation of riverbank slope stability utilizing soils from the Yellow River in China, with a particular emphasis on the effects of water level fluctuations, precipitation, and vegetation. The research examines the… Read More
(This article belongs to the Section Civil Engineering (CVE))
Model for Assessing Mobile Business Intelligence Readiness within South African Telecommunications Industry
by Philip Marothi Lemekwane and Nkqubela Ruxwana
Journal of Engineering Research and Sciences, Volume 1, Issue 5, Page # 213-222, 2022; DOI: 10.55708/js0105022
Abstract: To determine what needs to be done, organisations throughout the world need the capability to find out quickly, what is happening and why it happened. Therefore, having the intelligence to make informed decisions at the right time and place is the key to success in today's dynamic environment. As mobile systems become increasingly available, more… Read More
(This article belongs to the Section Information Systems – Computer Science (ISC))
Evaluating Project Complexity in Construction Sector in India
by Amit Moza, Virendra Kumar Paul and Sushil Kumar Solanki
Journal of Engineering Research and Sciences, Volume 1, Issue 5, Page # 198-212, 2022; DOI: 10.55708/js0105021
Abstract: Evaluating complexity, in order to manage it effectively, has been stressed by many researchers as one of the key areas of project management. This, as literature shows, has been done using different methodologies and assessing it from different perspectives resulting in measures that differ in their characteristics, their application, and their relevance with respect to… Read More
(This article belongs to the Section Construction and Building Technology (CBT))