Results (15)
Search Parameters:
Section: iscA Cloud-Native Decision Intelligence Architecture for Sustainable CPG Supply Chain Networks
by Prahlad Chowdhury
Journal of Engineering Research and Sciences, Volume 5, Issue 1, Page # 35-45, 2026; DOI: 10.55708/js0501004
Abstract: Many retail and consumer packaged goods (CPG) companies use disconnected data pipelines, which can slow down decisions and increase costs. This paper introduces a cloud-native data architecture that brings together sell-in, sell-out, marketing, e-commerce, and financial data into one managed source of truth. This setup helps teams make timely and reliable decisions. Built on Snowflake,… Read More
(This article belongs to the Special Issue on SP8 (Special Issue on Digital and Engineering Transformations in Science and Technology (SI-DETST-26)) and the Section Information Systems – Computer Science (ISC))
A Vendor-Agnostic Multi-Cloud Integration Framework Using Boomi and SAP BTP
by Padmanabhan Venkiteela
Journal of Engineering Research and Sciences, Volume 4, Issue 12, Page # 1-14, 2025; DOI: 10.55708/js0412001
Abstract: The shift toward multi-cloud strategies has made a vendor-agnostic integration framework indispensable for seamlessly orchestrating workflows across heterogeneous platforms. Modern enterprises increasingly rely on a mix of cloud ecosystems leveraging Amazon Web Services (AWS) for elasticity, Google Cloud Platform (GCP) for advanced AI/ML capabilities, Azure Cloud and Oracle Cloud Infrastructure (OCI) for critical enterprise workloads… Read More
(This article belongs to the Section Information Systems – Computer Science (ISC))
Implementing SAP Fiori in S/4HANA Transitions: Key Guidelines, Challenges, Strategic Implications, AI Integration Recommendations
by Trupti Raikar and Vinil Apelagunta
Journal of Engineering Research and Sciences, Volume 4, Issue 11, Page # 1-9, 2025; DOI: 10.55708/js0411001
Abstract: SAP GUI has become a legacy tool that does not receive new features in S/4HANA. The traditional SAP ECC interface has several drawbacks, such as its reliance on transaction codes, difficult navigation, and limited desktop use that is connected to on-premise systems. So, organizations looking to modernize need to switch to SAP Fiori. SAP Fiori… Read More
(This article belongs to the Section Information Systems – Computer Science (ISC))
Unveiling the Evolving Threat Landscape of Distributed Denial-of-Service (DDoS) Attacks Methodology and Security Measures
by Eman Eyadat, Mohammad Eyadat and Abedalrahman Alfaqih
Journal of Engineering Research and Sciences, Volume 4, Issue 10, Page # 9-20, 2025; DOI: 10.55708/js0410002
Abstract: This paper proposes a concrete severity classification framework and an evaluation lens for DDoS defenses (not a descriptive survey) and contributes two specific advancements. First, it introduces a quartile-based severity classification framework for Distributed Denial of Service (DDoS) attacks that extends beyond conventional binary detection. The framework classifies observed traffic into four categories (Q1–Q4) using… Read More
(This article belongs to the Special Issue on Special Issue on Multidisciplinary Sciences and Advanced Technology (SI-MSAT 2025) and the Section Information Systems – Computer Science (ISC))
Content Recommendation E-learning System for Personalized Learners to Enhance User Experience using SCORM
by Pasindu Udugahapattuwa and Shantha Fernando
Journal of Engineering Research and Sciences, Volume 4, Issue 9, Page # 30-46, 2025; DOI: 10.55708/js0409004
Abstract: E-learning is a main field used to improve learners’ learning environment. It would be more useful if the E-learning systems were improved by getting interactions and focusing on user experience. This research suggests increasing the user experience of students towards E-learning environments by recommending content according to their preferences. This research aims to make personalized… Read More
(This article belongs to the Special Issue on Special Issue on Multidisciplinary Sciences and Advanced Technology (SI-MSAT 2025) and the Section Information Systems – Computer Science (ISC))
AI-Enhanced Endpoint Compliance and Automated Vulnerability Management Framework for Essential Government Infrastructure
by Harshavardhan Malla
Journal of Engineering Research and Sciences, Volume 4, Issue 8, Page # 18-23, 2025; DOI: 10.55708/js0408002
Abstract: Public sector IT infrastructures that underpin essential services, such as transportation and law enforcement, are becoming progressively susceptible to advanced cyber attacks and encounter heightened regulatory demands, especially in accordance with CJIS and NIST standards. Regrettably, existing methods for compliance enforcement and patch management are primarily manual or only slightly automated, thereby constraining their scalability,… Read More
(This article belongs to the Section Information Systems – Computer Science (ISC))
Cloud ERP vs. On-Premise QAD ERP: A Cost-Benefit Analysis for Mid-Sized Manufacturers
by Ravi Jaiswal
Journal of Engineering Research and Sciences, Volume 4, Issue 7, Page # 1-14, 2025; DOI: 10.55708/js0407001
Abstract: For mid-sized manufacturing firms, the Enterprise Resource Planning (ERP) system plays a crucial role in streamlining operations and enabling strategic growth. Both adopting cloud-based ERP solutions and continuing to use On-Premise applications like QAD are important decisions as digital transformation increases. In this study, we conduct a retrospective case study of the cost-benefit analysis of… Read More
(This article belongs to the Section Information Systems – Computer Science (ISC))
An Educational Exhibit Aimed at Demonstrating the Rate of Growth of Computer Technology to Graduate Students
by Giacomo Bucci and Imad Zaza
Journal of Engineering Research and Sciences, Volume 3, Issue 11, Page # 1-23, 2024; DOI: 10.55708/js0311001
Abstract: This paper is an extended version of that presented at the conference Histelcon 2021 (IEEE). It provides a deeper illustration of the elements of the exhibit under development at the Faculty of Engineering at the University of Florence (Italy). The paper presented at Histelcon 2021 focussed on the birth of microprocessors, on the 8086, on… Read More
(This article belongs to the Section Information Systems – Computer Science (ISC))
A Thorough Examination of the Importance of Machine Learning and Deep Learning Methodologies in the Realm of Cybersecurity: An Exhaustive Analysis
by Ramsha Khalid and Muhammad Naqi Raza
Journal of Engineering Research and Sciences, Volume 3, Issue 7, Page # 11-22, 2024; DOI: 10.55708/js0307002
Abstract: In today's digital age, individuals extensively engage with virtual environments hosting a plethora of public and private services alongside social platforms. As a consequence, safeguarding these environments from potential cyber threats such as data breaches and system disruptions becomes paramount. Cybersecurity encompasses a suite of technical, organizational, and managerial measures aimed at thwarting unauthorized access… Read More
(This article belongs to the Special Issue on Special Issue on Multidisciplinary Sciences and Advanced Technology (SI-MSAT 2024) and the Section Information Systems – Computer Science (ISC))
Mathematical Model of Optimum Management of the Customs Control Process and Expert System for Ensuring Data Reliability
by Ilkhom Mukhtorov, Takhir Abduraxmonov and Abdusobir Saidov
Journal of Engineering Research and Sciences, Volume 3, Issue 5, Page # 1-13, 2024; DOI: 10.55708/js0305001
Abstract: The article considers the issue of modeling the multi-step process of customs clearance of goods in foreign trade. A mathematical model of control of the process under consideration has been developed. A brief review of existing methods for solving the linear programming problem with variable coefficients of the target function is given. The essence of… Read More
(This article belongs to the Special Issue on Special Issue on Computing, Engineering and Sciences (SI-CES 2023-24) and the Section Information Systems – Computer Science (ISC))
Blockchain Tokens for Agri-Food Supply Chain
by Ricardo Borges Dos Santos, Rodrigo Palucci Pantoni and Nunzio Marco Torrisi
Journal of Engineering Research and Sciences, Volume 2, Issue 2, Page # 15-23, 2023; DOI: 10.55708/js0202003
Abstract: The aim of this research is to suggest and analyze a framework to give universal publicity to food properties certificates from any certification authorities. The focus is the certification of agro product instances, i.e. unique for every single harvest, using smart contracts and blockchain non fungible tokens minted by third-party authorities. The development and testing… Read More
(This article belongs to the Special Issue on Special Issue on Computing, Engineering and Sciences (SI-CES 2022-23) and the Section Information Systems – Computer Science (ISC))
Applied Salt Technique to Secure Steganographic Algorithm
by Bo Bo Oo
Journal of Engineering Research and Sciences, Volume 2, Issue 2, Page # 8-14, 2023; DOI: 10.55708/js0202002
Abstract: Digital multimedia assets, including photographs, movies, and audio files, have become a staple of contemporary life. Steganography is a method for undetectable information concealment in these files. One can communicate messages to another by modifying multimedia signals so that a human would be unable to tell the difference between the original signal and the altered… Read More
(This article belongs to the Special Issue on Special Issue on Computing, Engineering and Sciences (SI-CES 2022-23) and the Section Information Systems – Computer Science (ISC))
Model for Assessing Mobile Business Intelligence Readiness within South African Telecommunications Industry
by Philip Marothi Lemekwane and Nkqubela Ruxwana
Journal of Engineering Research and Sciences, Volume 1, Issue 5, Page # 213-222, 2022; DOI: 10.55708/js0105022
Abstract: To determine what needs to be done, organisations throughout the world need the capability to find out quickly, what is happening and why it happened. Therefore, having the intelligence to make informed decisions at the right time and place is the key to success in today's dynamic environment. As mobile systems become increasingly available, more… Read More
(This article belongs to the Section Information Systems – Computer Science (ISC))
An Overview on Various Techniques used for Correct Interpretation of Roadway Symbols
by Abhinav Vinod Deshpande
Journal of Engineering Research and Sciences, Volume 1, Issue 3, Page # 28-38, 2022; DOI: 10.55708/js0103004
Abstract: In this study paper, a comparative analysis of various image enhancements in local domain techniques was made based on three-dimensional image quality statistics namely Mean Squared Error (MSE), Peak Signal to Noise Ratio (PSNR) and Image Quality Model (SSIM) to determine image quality. especially among them so that the process of image enhancement in the… Read More
(This article belongs to the Special Issue on Special Issue on Multidisciplinary Sciences and Advanced Technology (SI-MSAT 2022) and the Section Information Systems – Computer Science (ISC))
Analytical Framework to Minimize the Latency in Tele-herbal Healthcare Service
by Ogirima Sanni Abubakar Omuya and Arulogun Oladiran Tayo
Journal of Engineering Research and Sciences, Volume 1, Issue 1, Page # 39-50, 2022; DOI: 10.55708/js0101004
Abstract: Telemedicine is using telecommunications and IT and other ICT tools to widen healthcare services to remote rural areas. ICT global coverage, multicasting ability, and the high capacity of satellites in GEO can be served as an instrument to widen and enhance the high quality of healthcare service to remote rural areas. Long end-to-end latency could… Read More
(This article belongs to the Section Information Systems – Computer Science (ISC))