Category Archives: Volume 3 Issue 5

IJSRET Volume 3 Issue 5, September-2017

Volume 3 Issue 5

MANET, Evolutionary Algorithm, Email System, encryption scheme, journal entries, international journal of current research

Secret Sharing Schemes over MANET to Avoid Cheater Participation [102-109]

Author: Nisha Bharti, Hansa Acharya
MANET, Evolutionary Algorithm, Email System, encryption scheme, journal entries, international journal of current research

 

 

Web URL Classification and Malicious Activities: A Review [110-115]

Author: Anshika Bansal
MANET, Evolutionary Algorithm, Email System, encryption scheme, journal entries, international journal of current research

 

 

Malicious Web URL Classification using Evolutionary Algorithm [116-199]

Author: Anshika Bansal
MANET, Evolutionary Algorithm, Email System, encryption scheme, journal entries, international journal of current research

 

 

Attack over Email System: Review [200-206]

Author: Anuradha Kumari, Nitin Agrawal, Umesh Lilhore
MANET, Evolutionary Algorithm, Email System, encryption scheme, journal entries, international journal of current research

 

 

Encryption Scheme for Mobile Ad Hoc Networks: A Survey [207-209]

Author: Neha Dwivedi, Dr. Rajesh Shukla
MANET, Evolutionary Algorithm, Email System, encryption scheme, journal entries, international journal of current research

 

 

Evolutionary Algorithm Based Optimized Encryption Scheme for Mobile Ad-Hoc Network [210-216]

Author: Neha Dwivedi, Dr. Rajesh Shukla
MANET, Evolutionary Algorithm, Email System, encryption scheme, journal entries, international journal of current research

MANET, Evolutionary Algorithm, Email System, encryption scheme, journal entries, international journal of current research
MANET, Evolutionary Algorithm, Email System, encryption scheme, journal entries, international journal of current research

Power BI’s Role In The BI Lifecycle: A Complete Guide To Implementation, Development, And Maintenance

Authors: Joseph Fernandes

Abstract: Power BI has established itself as a versatile and comprehensive platform for the business intelligence (BI) lifecycle, supporting data integration, development, visualization, collaboration, and ongoing maintenance. This review article examines Power BI’s capabilities in consolidating heterogeneous data sources, performing robust ETL transformations, and delivering interactive dashboards that provide actionable insights for enterprise decision-making. The discussion explores key aspects of implementation, including agile development methodologies, data governance, role-based access controls, and performance optimization techniques. Case studies across healthcare, retail, and finance demonstrate the platform’s practical impact, highlighting efficiency gains, improved reporting accuracy, real-time analytics, and enhanced regulatory compliance. Additionally, the article addresses common challenges such as integration complexity, technical skill requirements, and governance concerns, providing recommendations for mitigation. Emerging trends such as AI-driven analytics, predictive modeling, real-time streaming data, and cloud-native architectures are analyzed, illustrating the evolving role of Power BI in enabling intelligent decision-support systems. The review emphasizes the strategic advantages of Power BI, including democratization of analytics, scalability, and adaptability to diverse organizational requirements. By synthesizing current practices, technological capabilities, and future innovations, this article provides a roadmap for leveraging Power BI effectively to drive operational efficiency, data-driven decision-making, and organizational agility in dynamic business environments.

DOI: https://doi.org/10.5281/zenodo.17275705

 

From Spreadsheets To Stories: Creating Actionable Insights With Tableau And The Business Intelligence Lifecycle

Authors: Rani Kumari

Abstract: The transition from traditional reporting methods to interactive, data-driven dashboards has transformed how organizations interpret and act upon information. This review examines the role of Tableau in the Business Intelligence (BI) lifecycle, focusing on its ability to convert raw data into actionable insights that support both strategic and operational decision-making. Tableau’s integration capabilities, including connections to diverse data sources and support for live or extracted datasets, enable organizations to streamline data preparation, cleansing, and transformation. Its visual analytics and interactive dashboards allow stakeholders to explore trends, perform what-if analyses, and monitor key performance indicators (KPIs) in real time. Advanced features, such as calculated fields, predictive modeling, and integration with AI/ML frameworks, enhance the depth and accuracy of insights, while collaborative and cloud-enabled solutions facilitate enterprise-wide adoption. Case studies from retail, healthcare, and finance illustrate Tableau’s practical impact in improving operational efficiency, forecasting, and decision support. The review also addresses challenges, including data quality management, user adoption barriers, and performance scaling, highlighting best practices to overcome these limitations. Looking forward, the integration of AI-driven analytics, real-time data streams, and embedded BI promises to expand Tableau’s influence in decision-making workflows. By adopting Tableau strategically, organizations can foster a culture of data literacy, enhance agility, and ensure that insights are actionable, timely, and aligned with business objectives. Overall, Tableau represents a bridge between complex datasets and operational intelligence, providing organizations with a robust, flexible, and scalable BI platform.

DOI: https://doi.org/10.5281/zenodo.17275764

 

Adaptive Web Interfaces Through Hybrid Server-Client Architecture: Leveraging ASP.NET MVC And React For Context-Aware UI

Authors: Hema Latha Boddupally

Abstract: Adaptive User Interfaces (AUIs) have become increasingly essential as modern software applications are expected to deliver seamless, intuitive, and personalized experiences across a broad spectrum of devices, screen dimensions, accessibility needs, and interaction contexts. With users frequently transitioning between desktops, tablets, mobile phones, and other emerging platforms, traditional fixed or solely responsive design approaches often fall short in addressing deeper adaptive requirements such as behavior-driven adjustments, contextual awareness, and user-specific personalization. This paper presents a hybrid model for AUI development that integrates ASP.NET MVC’s robust server-side rendering pipeline with React flexible, component-based client-side architecture, enabling interfaces that not only adapt visually but also evolve functionally based on user roles, preferences, device capabilities, and real-time interaction patterns. By leveraging server-side logic for initial content shaping and client-side React components for dynamic rendering and state-driven updates, the proposed model supports fine-grained adaptation, modular UI evolution, and scalable interface personalization. Building on established concepts in responsive design, adaptive graphical interfaces, and context-aware interaction models, the study outlines key architectural strategies, design principles, and implementation techniques that facilitate the development of maintainable, high-performance AUI systems. Furthermore, the paper examines practical challenges such as context modeling, synchronization between server and client layers, managing diverse user scenarios, and optimizing rendering performance, ultimately demonstrating how the synergy of MVC and React provides a powerful foundation for creating intelligent, user-centered adaptive interfaces capable of meeting the demands of modern digital ecosystems.

DOI: http://doi.org/10.5281/zenodo.18042587

Identity-Aware Network Segmentation Using NSX And Next-Generation Firewalls

Authors: Naveen Reddy Burramukku

Abstract: Modern enterprise networks are increasingly dynamic, driven by virtualization, cloud adoption, and the proliferation of distributed workloads. Traditional network segmentation approaches, which rely primarily on IP addresses, VLANs, and perimeter-based firewalls, are no longer sufficient to protect against sophisticated cyber threats, particularly those involving lateral movement within the data center. As attackers increasingly exploit compromised credentials and trusted internal access, there is a growing need for security models that are both granular and identity-centric.This research explores the concept of identity-aware network segmentation by integrating VMware NSX microsegmentation with Next-Generation Firewalls (NGFWs) to enforce security policies based on user, application, and workload identities rather than static network parameters. The proposed approach aligns with Zero Trust principles by assuming no implicit trust within the network and enforcing continuous verification of identity and context for every communication flow.The study presents an architectural framework that combines NSX’s distributed firewall capabilities with advanced NGFW features such as deep packet inspection, application identification, and user-based policy enforcement. A controlled virtual testbed is used to evaluate the effectiveness of the proposed model in mitigating east-west traffic threats, reducing attack surfaces, and limiting lateral movement within a virtualized data center environment. Performance impacts, scalability considerations, and operational complexity are also assessed to determine the feasibility of large-scale deployment.Results indicate that identity-aware segmentation significantly enhances internal network security by enabling fine-grained, context-aware policy enforcement without introducing substantial performance degradation. The integration of NSX and NGFW technologies provides improved visibility, simplified policy management, and stronger alignment with modern Zero Trust architectures. This research contributes to the growing body of work on software-defined security by demonstrating how identity-driven controls can be practically implemented to strengthen enterprise network defenses in hybrid and cloud-based environments.

Published by:
× How can I help you?