ISSN (Online): 2321-3418
server-injected
Engineering and Computer Science
Open Access

Optimizing Order Fulfillment through Advanced ERP Systems: A Case Study on Oracle NetSuite

DOI: 10.18535/ijsrm/v11i05.ec3· Pages: 929-953· Vol. 11, No. 05, (2023)· Published: May 29, 2023
PDF
Views: 616 PDF downloads: 314

Abstract

Order fulfillment is a critical aspect of supply chain management that significantly impacts customer satisfaction, operational efficiency, and profitability. This study explores the role of advanced Enterprise Resource Planning (ERP) systems in optimizing order fulfillment, with a focus on Oracle NetSuite as a case study. By leveraging its robust capabilities, including real-time tracking, automation, and integration of supply chain processes, Oracle NetSuite addresses common challenges such as inventory inaccuracies, delayed shipments, and inefficient workflows. The research employs both qualitative and quantitative methodologies to evaluate the system’s impact on key performance indicators (KPIs) such as order accuracy, lead time, and customer satisfaction. Findings reveal substantial improvements in operational efficiency and order processing times, demonstrating Oracle NetSuite’s value in modernizing supply chain operations. The study concludes with practical recommendations for implementation and continuous optimization strategies, underscoring the importance of adopting advanced ERP solutions for sustainable competitive advantage in dynamic business environments.

Keywords

Order fulfillmentEnterprise Resource Planning (ERP)Oracle NetSuitesupply chain managementoperational efficiencyreal-time trackingautomationinventory managementcustomer satisfactionperformance optimization. 2. Introduction

References

  1. JOSHI, D., SAYED, F., BERI, J., & PAL, R. (2021). An efficient supervised machine learning model approach for forecasting of renewable energy to tackle climate change. Int J Comp Sci Eng Inform Technol Res, 11, 25-32.Google Scholar ↗
  2. Al Imran, M., Al Fathah, A., Al Baki, A., Alam, K., Mostakim, M. A., Mahmud, U., & Hossen, M. S. (2023). Integrating IoT and AI For Predictive Maintenance in Smart Power Grid Systems to Minimize Energy Loss and Carbon Footprint. Journal of Applied Optics, 44(1), 27-47.Google Scholar ↗
  3. Mahmud, U., Alam, K., Mostakim, M. A., & Khan, M. S. I. (2018). AI-driven micro solar power grid systems for remote communities: Enhancing renewable energy efficiency and reducing carbon emissions. Distributed Learning and Broad Applications in Scientific Research, 4.Google Scholar ↗
  4. Joshi, D., Sayed, F., Saraf, A., Sutaria, A., & Karamchandani, S. (2021). Elements of Nature Optimized into Smart Energy Grids using Machine Learning. Design Engineering, 1886-1892.Google Scholar ↗
  5. Alam, K., Mostakim, M. A., & Khan, M. S. I. (2017). Design and Optimization of MicroSolar Grid for Off-Grid Rural Communities. Distributed Learning and Broad Applications in Scientific Research, 3.Google Scholar ↗
  6. Integrating solar cells into building materials (Building-Integrated Photovoltaics-BIPV) to turn buildings into self-sustaining energy sources. Journal of Artificial Intelligence Research and Applications, 2(2).Google Scholar ↗
  7. Manoharan, A., & Nagar, G. MAXIMIZING LEARNING TRAJECTORIES: AN INVESTIGATION INTO AI-DRIVEN NATURAL LANGUAGE PROCESSING INTEGRATION IN ONLINE EDUCATIONAL PLATFORMS.Google Scholar ↗
  8. Joshi, D., Parikh, A., Mangla, R., Sayed, F., & Karamchandani, S. H. (2021). AI Based Nose for Trace of Churn in Assessment of Captive Customers. Turkish Online Journal of Qualitative Inquiry, 12(6).Google Scholar ↗
  9. Khambati, A. (2021). Innovative Smart Water Management System Using Artificial Intelligence. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 12(3), 4726-4734.Google Scholar ↗
  10. Ferdinand, J. (2023). The Key to Academic Equity: A Detailed Review of EdChat’s Strategies.Google Scholar ↗
  11. Khambaty, A., Joshi, D., Sayed, F., Pinto, K., & Karamchandani, S. (2022, January). Delve into the Realms with 3D Forms: Visualization System Aid Design in an IOT-Driven World. In Proceedings of International Conference on Wireless Communication: ICWiCom 2021 (pp. 335-343). Singapore: Springer Nature Singapore.Google Scholar ↗
  12. Nagar, G., & Manoharan, A. (2022). THE RISE OF QUANTUM CRYPTOGRAPHY: SECURING DATA BEYOND CLASSICAL MEANS. 04. 6329-6336. 10.56726. IRJMETS24238.Google Scholar ↗
  13. Ferdinand, J. (2023). Marine Medical Response: Exploring the Training, Role and Scope of Paramedics and Paramedicine (ETRSp). Qeios.Google Scholar ↗
  14. Nagar, G., & Manoharan, A. (2022). ZERO TRUST ARCHITECTURE: REDEFINING SECURITY PARADIGMS IN THE DIGITAL AGE. International Research Journal of Modernization in Engineering Technology and Science, 4, 2686-2693.Google Scholar ↗
  15. JALA, S., ADHIA, N., KOTHARI, M., JOSHI, D., & PAL, R. SUPPLY CHAIN DEMAND FORECASTING USING APPLIED MACHINE LEARNING AND FEATURE ENGINEERING.Google Scholar ↗
  16. Ferdinand, J. (2023). Emergence of Dive Paramedics: Advancing Prehospital Care Beyond DMTs.Google Scholar ↗
  17. Nagar, G., & Manoharan, A. (2022). THE RISE OF QUANTUM CRYPTOGRAPHY: SECURING DATA BEYOND CLASSICAL MEANS. 04. 6329-6336. 10.56726. IRJMETS24238.Google Scholar ↗
  18. Nagar, G., & Manoharan, A. (2022). Blockchain technology: reinventing trust and security in the digital world. International Research Journal of Modernization in Engineering Technology and Science, 4(5), 6337-6344.Google Scholar ↗
  19. Joshi, D., Sayed, F., Jain, H., Beri, J., Bandi, Y., & Karamchandani, S. A Cloud Native Machine Learning based Approach for Detection and Impact of Cyclone and Hurricanes on Coastal Areas of Pacific and Atlantic Ocean.Google Scholar ↗
  20. Mishra, M. (2022). Review of Experimental and FE Parametric Analysis of CFRP-Strengthened Steel-Concrete Composite Beams. Journal of Mechanical, Civil and Industrial Engineering, 3(3), 92-101.Google Scholar ↗
  21. Agarwal, A. V., & Kumar, S. (2017, November). Unsupervised data responsive based monitoring of fields. In 2017 International Conference on Inventive Computing and Informatics (ICICI) (pp. 184-188). IEEE.Google Scholar ↗
  22. Agarwal, A. V., Verma, N., Saha, S., & Kumar, S. (2018). Dynamic Detection and Prevention of Denial of Service and Peer Attacks with IPAddress Processing. Recent Findings in Intelligent Computing Techniques: Proceedings of the 5th ICACNI 2017, Volume 1, 707, 139.Google Scholar ↗
  23. Mishra, M. (2017). Reliability-based Life Cycle Management of Corroding Pipelines via Optimization under Uncertainty (Doctoral dissertation).Google Scholar ↗
  24. Agarwal, A. V., Verma, N., & Kumar, S. (2018). Intelligent Decision Making Real-Time Automated System for Toll Payments. In Proceedings of International Conference on Recent Advancement on Computer and Communication: ICRAC 2017 (pp. 223-232). Springer Singapore.Google Scholar ↗
  25. Agarwal, A. V., & Kumar, S. (2017, October). Intelligent multi-level mechanism of secure data handling of vehicular information for post-accident protocols. In 2017 2nd International Conference on Communication and Electronics Systems (ICCES) (pp. 902-906). IEEE.Google Scholar ↗
  26. Ramadugu, R., & Doddipatla, L. (2022). Emerging Trends in Fintech: How Technology Is Reshaping the Global Financial Landscape. Journal of Computational Innovation, 2(1).Google Scholar ↗
  27. Ramadugu, R., & Doddipatla, L. (2022). The Role of AI and Machine Learning in Strengthening Digital Wallet Security Against Fraud. Journal of Big Data and Smart Systems, 3(1).Google Scholar ↗
  28. Doddipatla, L., Ramadugu, R., Yerram, R. R., & Sharma, T. (2021). Exploring The Role of Biometric Authentication in Modern Payment Solutions. International Journal of Digital Innovation, 2(1).Google Scholar ↗
  29. Dash, S. (2023). Designing Modular Enterprise Software Architectures for AI-Driven Sales Pipeline Optimization. Journal of Artificial Intelligence Research, 3(2), 292-334.Google Scholar ↗
  30. Dash, S. (2023). Architecting Intelligent Sales and Marketing Platforms: The Role of Enterprise Data Integration and AI for Enhanced Customer Insights. Journal of Artificial Intelligence Research, 3(2), 253-291.Google Scholar ↗
  31. Han, J., Yu, M., Bai, Y., Yu, J., Jin, F., Li, C., ... & Li, L. (2020). Elevated CXorf67 expression in PFA ependymomas suppresses DNA repair and sensitizes to PARP inhibitors. Cancer Cell, 38(6), 844-856.Google Scholar ↗
  32. Zeng, J., Han, J., Liu, Z., Yu, M., Li, H., & Yu, J. (2022). Pentagalloylglucose disrupts the PALB2-BRCA2 interaction and potentiates tumor sensitivity to PARP inhibitor and radiotherapy. Cancer Letters, 546, 215851.Google Scholar ↗
  33. Singu, S. K. (2021). Real-Time Data Integration: Tools, Techniques, and Best Practices. ESP Journal of Engineering & Technology Advancements, 1(1), 158-172.Google Scholar ↗
  34. Singu, S. K. (2021). Designing Scalable Data Engineering Pipelines Using Azure and Databricks. ESP Journal of Engineering & Technology Advancements, 1(2), 176-187.Google Scholar ↗
  35. Singu, S. K. (2022). ETL Process Automation: Tools and Techniques. ESP Journal of Engineering & Technology Advancements, 2(1), 74-85.Google Scholar ↗
  36. Malhotra, I., Gopinath, S., Janga, K. C., Greenberg, S., Sharma, S. K., & Tarkovsky, R. (2014). Unpredictable nature of tolvaptan in treatment of hypervolemic hyponatremia: case review on role of vaptans. Case reports in endocrinology, 2014(1), 807054.Google Scholar ↗
  37. Shakibaie-M, B. (2013). Comparison of the effectiveness of two different bone substitute materials for socket preservation after tooth extraction: a controlled clinical study. International Journal of Periodontics & Restorative Dentistry, 33(2).Google Scholar ↗
  38. Shakibaie, B., Blatz, M. B., Conejo, J., & Abdulqader, H. (2023). From Minimally Invasive Tooth Extraction to Final Chairside Fabricated Restoration: A Microscopically and Digitally Driven Full Workflow for Single-Implant Treatment. Compendium of Continuing Education in Dentistry (15488578), 44(10).Google Scholar ↗
  39. Shakibaie, B., Sabri, H., & Blatz, M. (2023). Modified 3-Dimensional Alveolar Ridge Augmentation in the Anterior Maxilla: A Prospective Clinical Feasibility Study. Journal of Oral Implantology, 49(5), 465-472.Google Scholar ↗
  40. Shakibaie, B., Blatz, M. B., & Barootch, S. (2023). Comparación clínica de split rolling flap vestibular (VSRF) frente a double door flap mucoperióstico (DDMF) en la exposición del implante: un estudio clínico prospectivo. Quintessence: Publicación internacional de odontología, 11(4), 232-246.Google Scholar ↗
  41. Gopinath, S., Ishak, A., Dhawan, N., Poudel, S., Shrestha, P. S., Singh, P., ... & Michel, G. (2022). Characteristics of COVID-19 breakthrough infections among vaccinated individuals and associated risk factors: A systematic review. Tropical medicine and infectious disease, 7(5), 81.Google Scholar ↗
  42. Phongkhun, K., Pothikamjorn, T., Srisurapanont, K., Manothummetha, K., Sanguankeo, A., Thongkam, A., ... & Permpalung, N. (2023). Prevalence of ocular candidiasis and Candida endophthalmitis in patients with candidemia: a systematic review and meta-analysis. Clinical Infectious Diseases, 76(10), 1738-1749.Google Scholar ↗
  43. Bazemore, K., Permpalung, N., Mathew, J., Lemma, M., Haile, B., Avery, R., ... & Shah, P. (2022). Elevated cell-free DNA in respiratory viral infection and associated lung allograft dysfunction. American Journal of Transplantation, 22(11), 2560-2570.Google Scholar ↗
  44. Chuleerarux, N., Manothummetha, K., Moonla, C., Sanguankeo, A., Kates, O. S., Hirankarn, N., ... & Permpalung, N. (2022). Immunogenicity of SARS-CoV-2 vaccines in patients with multiple myeloma: a systematic review and meta-analysis. Blood Advances, 6(24), 6198-6207.Google Scholar ↗
  45. Roh, Y. S., Khanna, R., Patel, S. P., Gopinath, S., Williams, K. A., Khanna, R., ... & Kwatra, S. G. (2021). Circulating blood eosinophils as a biomarker for variable clinical presentation and therapeutic response in patients with chronic pruritus of unknown origin. The Journal of Allergy and Clinical Immunology: In Practice, 9(6), 2513-2516.Google Scholar ↗
  46. Mukherjee, D., Roy, S., Singh, V., Gopinath, S., Pokhrel, N. B., & Jaiswal, V. (2022). Monkeypox as an emerging global health threat during the COVID-19 time. Annals of Medicine and Surgery, 79.Google Scholar ↗
  47. Gopinath, S., Janga, K. C., Greenberg, S., & Sharma, S. K. (2013). Tolvaptan in the treatment of acute hyponatremia associated with acute kidney injury. Case reports in nephrology, 2013(1), 801575.Google Scholar ↗
  48. Shilpa, Lalitha, Prakash, A., & Rao, S. (2009). BFHI in a tertiary care hospital: Does being Baby friendly affect lactation success?. The Indian Journal of Pediatrics, 76, 655-657.Google Scholar ↗
  49. Singh, V. K., Mishra, A., Gupta, K. K., Misra, R., & Patel, M. L. (2015). Reduction of microalbuminuria in type-2 diabetes mellitus with angiotensin-converting enzyme inhibitor alone and with cilnidipine. Indian Journal of Nephrology, 25(6), 334-339.Google Scholar ↗
  50. Gopinath, S., Giambarberi, L., Patil, S., & Chamberlain, R. S. (2016). Characteristics and survival of patients with eccrine carcinoma: a cohort study. Journal of the American Academy of Dermatology, 75(1), 215-217.Google Scholar ↗
  51. Gopinath, S., Sutaria, N., Bordeaux, Z. A., Parthasarathy, V., Deng, J., Taylor, M. T., ... & Kwatra, S. G. (2023). Reduced serum pyridoxine and 25-hydroxyvitamin D levels in adults with chronic pruritic dermatoses. Archives of Dermatological Research, 315(6), 1771-1776.Google Scholar ↗
  52. Han, J., Song, X., Liu, Y., & Li, L. (2022). Research progress on the function and mechanism of CXorf67 in PFA ependymoma. Chin Sci Bull, 67, 1-8.Google Scholar ↗
  53. Permpalung, N., Liang, T., Gopinath, S., Bazemore, K., Mathew, J., Ostrander, D., ... & Shah, P. D. (2023). Invasive fungal infections after respiratory viral infections in lung transplant recipients are associated with lung allograft failure and chronic lung allograft dysfunction within 1 year. The Journal of Heart and Lung Transplantation, 42(7), 953-963.Google Scholar ↗
  54. Swarnagowri, B. N., & Gopinath, S. (2013). Ambiguity in diagnosing esthesioneuroblastoma--a case report. Journal of Evolution of Medical and Dental Sciences, 2(43), 8251-8255.Google Scholar ↗
  55. Swarnagowri, B. N., & Gopinath, S. (2013). Pelvic Actinomycosis Mimicking Malignancy: A Case Report. tuberculosis, 14, 15.Google Scholar ↗
  56. Khambaty, A., Joshi, D., Sayed, F., Pinto, K., & Karamchandani, S. (2022, January). Delve into the Realms with 3D Forms: Visualization System Aid Design in an IOT-Driven World. In Proceedings of International Conference on Wireless Communication: ICWiCom 2021 (pp. 335-343). Singapore: Springer NatureGoogle Scholar ↗
  57. Jarvis, D. A., Pribble, J., & Patil, S. (2023). U.S. Patent No. 11,816,225. Washington, DC: U.S. Patent and Trademark Office.Google Scholar ↗
  58. Pribble, J., Jarvis, D. A., & Patil, S. (2023). U.S. Patent No. 11,763,590. Washington, DC: U.S. Patent and Trademark Office.Google Scholar ↗
  59. Maddireddy, B. R., & Maddireddy, B. R. (2020). Proactive Cyber Defense: Utilizing AI for Early Threat Detection and Risk Assessment. International Journal of Advanced Engineering Technologies and Innovations, 1(2), 64-83.Google Scholar ↗
  60. Maddireddy, B. R., & Maddireddy, B. R. (2020). AI and Big Data: Synergizing to Create Robust Cybersecurity Ecosystems for Future Networks. International Journal of Advanced Engineering Technologies and Innovations, 1(2), 40-63.Google Scholar ↗
  61. Maddireddy, B. R., & Maddireddy, B. R. (2021). Evolutionary Algorithms in AI-Driven Cybersecurity Solutions for Adaptive Threat Mitigation. International Journal of Advanced Engineering Technologies and Innovations, 1(2), 17-43.Google Scholar ↗
  62. Maddireddy, B. R., & Maddireddy, B. R. (2022). Cybersecurity Threat Landscape: Predictive Modelling Using Advanced AI Algorithms. International Journal of Advanced Engineering Technologies and Innovations, 1(2), 270-285.Google Scholar ↗
  63. Maddireddy, B. R., & Maddireddy, B. R. (2021). Cyber security Threat Landscape: Predictive Modelling Using Advanced AI Algorithms. Revista Espanola de Documentacion Cientifica, 15(4), 126-153.Google Scholar ↗
  64. Maddireddy, B. R., & Maddireddy, B. R. (2021). Enhancing Endpoint Security through Machine Learning and Artificial Intelligence Applications. Revista Espanola de Documentacion Cientifica, 15(4), 154-164.Google Scholar ↗
  65. Maddireddy, B. R., & Maddireddy, B. R. (2022). Real-Time Data Analytics with AI: Improving Security Event Monitoring and Management. Unique Endeavor in Business & Social Sciences, 1(2), 47-62.Google Scholar ↗
  66. Maddireddy, B. R., & Maddireddy, B. R. (2022). Blockchain and AI Integration: A Novel Approach to Strengthening Cybersecurity Frameworks. Unique Endeavor in Business & Social Sciences, 5(2), 46-65.Google Scholar ↗
  67. Maddireddy, B. R., & Maddireddy, B. R. (2022). AI-Based Phishing Detection Techniques: A Comparative Analysis of Model Performance. Unique Endeavor in Business & Social Sciences, 1(2), 63-77.Google Scholar ↗
  68. Maddireddy, B. R., & Maddireddy, B. R. (2023). Enhancing Network Security through AI-Powered Automated Incident Response Systems. International Journal of Advanced Engineering Technologies and Innovations, 1(02), 282-304.Google Scholar ↗
  69. Maddireddy, B. R., & Maddireddy, B. R. (2023). Automating Malware Detection: A Study on the Efficacy of AI-Driven Solutions. Journal Environmental Sciences And Technology, 2(2), 111-124.Google Scholar ↗
  70. Maddireddy, B. R., & Maddireddy, B. R. (2023). Adaptive Cyber Defense: Using Machine Learning to Counter Advanced Persistent Threats. International Journal of Advanced Engineering Technologies and Innovations, 1(03), 305-324.Google Scholar ↗
  71. Damaraju, A. (2021). Mobile Cybersecurity Threats and Countermeasures: A Modern Approach. International Journal of Advanced Engineering Technologies and Innovations, 1(3), 17-34.Google Scholar ↗
  72. Damaraju, A. (2021). Securing Critical Infrastructure: Advanced Strategies for Resilience and Threat Mitigation in the Digital Age. Revista de Inteligencia Artificial en Medicina, 12(1), 76-111.Google Scholar ↗
  73. Damaraju, A. (2022). Social Media Cybersecurity: Protecting Personal and Business Information. International Journal of Advanced Engineering Technologies and Innovations, 1(2), 50-69.Google Scholar ↗
  74. Damaraju, A. (2023). Safeguarding Information and Data Privacy in the Digital Age. International Journal of Advanced Engineering Technologies and Innovations, 1(01), 213-241.Google Scholar ↗
  75. Damaraju, A. (2022). Securing the Internet of Things: Strategies for a Connected World. International Journal of Advanced Engineering Technologies and Innovations, 1(2), 29-49.Google Scholar ↗
  76. Damaraju, A. (2020). Social Media as a Cyber Threat Vector: Trends and Preventive Measures. Revista Espanola de Documentacion Cientifica, 14(1), 95-112.Google Scholar ↗
  77. Damaraju, A. (2023). Enhancing Mobile Cybersecurity: Protecting Smartphones and Tablets. International Journal of Advanced Engineering Technologies and Innovations, 1(01), 193-212.Google Scholar ↗
  78. Chirra, D. R. (2022). Collaborative AI and Blockchain Models for Enhancing Data Privacy in IoMT Networks. International Journal of Machine Learning Research in Cybersecurity and Artificial Intelligence, 13(1), 482-504.Google Scholar ↗
  79. Chirra, D. R. (2023). The Role of Homomorphic Encryption in Protecting Cloud-Based Financial Transactions. International Journal of Advanced Engineering Technologies and Innovations, 1(01), 452-472.Google Scholar ↗
  80. Chirra, D. R. (2023). The Role of Homomorphic Encryption in Protecting Cloud-Based Financial Transactions. International Journal of Advanced Engineering Technologies and Innovations, 1(01), 452-472.Google Scholar ↗
  81. Chirra, D. R. (2023). Real-Time Forensic Analysis Using Machine Learning for Cybercrime Investigations in E-Government Systems. International Journal of Machine Learning Research in Cybersecurity and Artificial Intelligence, 14(1), 618-649.Google Scholar ↗
  82. Chirra, D. R. (2023). AI-Based Threat Intelligence for Proactive Mitigation of Cyberattacks in Smart Grids. Revista de Inteligencia Artificial en Medicina, 14(1), 553-575.Google Scholar ↗
  83. Chirra, D. R. (2023). Deep Learning Techniques for Anomaly Detection in IoT Devices: Enhancing Security and Privacy. Revista de Inteligencia Artificial en Medicina, 14(1), 529-552.Google Scholar ↗
  84. Chirra, B. R. (2021). AI-Driven Security Audits: Enhancing Continuous Compliance through Machine Learning. International Journal of Machine Learning Research in Cybersecurity and Artificial Intelligence, 12(1), 410-433.Google Scholar ↗
  85. Chirra, B. R. (2021). Enhancing Cyber Incident Investigations with AI-Driven Forensic Tools. International Journal of Advanced Engineering Technologies and Innovations, 1(2), 157-177.Google Scholar ↗
  86. Chirra, B. R. (2021). Intelligent Phishing Mitigation: Leveraging AI for Enhanced Email Security in Corporate Environments. International Journal of Advanced Engineering Technologies and Innovations, 1(2), 178-200.Google Scholar ↗
  87. Chirra, B. R. (2021). Leveraging Blockchain for Secure Digital Identity Management: Mitigating Cybersecurity Vulnerabilities. Revista de Inteligencia Artificial en Medicina, 12(1), 462-482.Google Scholar ↗
  88. Chirra, B. R. (2020). Enhancing Cybersecurity Resilience: Federated Learning-Driven Threat Intelligence for Adaptive Defense. International Journal of Machine Learning Research in Cybersecurity and Artificial Intelligence, 11(1), 260-280.Google Scholar ↗
  89. Chirra, B. R. (2020). Securing Operational Technology: AI-Driven Strategies for Overcoming Cybersecurity Challenges. International Journal of Machine Learning Research in Cybersecurity and Artificial Intelligence, 11(1), 281-302.Google Scholar ↗
  90. Chirra, B. R. (2020). Advanced Encryption Techniques for Enhancing Security in Smart Grid Communication Systems. International Journal of Advanced Engineering Technologies and Innovations, 1(2), 208-229.Google Scholar ↗
  91. Chirra, B. R. (2020). AI-Driven Fraud Detection: Safeguarding Financial Data in Real-Time. Revista de Inteligencia Artificial en Medicina, 11(1), 328-347.Google Scholar ↗
  92. Chirra, B. R. (2023). AI-Powered Identity and Access Management Solutions for Multi-Cloud Environments. International Journal of Machine Learning Research in Cybersecurity and Artificial Intelligence, 14(1), 523-549.Google Scholar ↗
  93. Chirra, B. R. (2023). Advancing Cyber Defense: Machine Learning Techniques for NextGeneration Intrusion Detection. International Journal of Machine Learning Research in Cybersecurity and Artificial Intelligence, 14(1), 550-573.'Google Scholar ↗
  94. Yanamala, A. K. Y. (2023). Secure and private AI: Implementing advanced data protection techniques in machine learning models. International Journal of Machine Learning Research in Cybersecurity and Artificial Intelligence, 14(1), 105-132.Google Scholar ↗
  95. Yanamala, A. K. Y., & Suryadevara, S. (2023). Advances in Data Protection and Artificial Intelligence: Trends and Challenges. International Journal of Advanced Engineering Technologies and Innovations, 1(01), 294-319.Google Scholar ↗
  96. Yanamala, A. K. Y., & Suryadevara, S. (2022). Adaptive Middleware Framework for Context-Aware Pervasive Computing Environments. International Journal of Machine Learning Research in Cybersecurity and Artificial Intelligence, 13(1), 35-57.Google Scholar ↗
  97. Yanamala, A. K. Y., & Suryadevara, S. (2022). Cost-Sensitive Deep Learning for Predicting Hospital Readmission: Enhancing Patient Care and Resource Allocation. International Journal of Advanced Engineering Technologies and Innovations, 1(3), 56-81.Google Scholar ↗
  98. Gadde, H. (2019). Integrating AI with Graph Databases for Complex Relationship Analysis. InternationalGoogle Scholar ↗
  99. Gadde, H. (2023). Leveraging AI for Scalable Query Processing in Big Data Environments. International Journal of Advanced Engineering Technologies and Innovations, 1(02), 435-465.Google Scholar ↗
  100. Gadde, H. (2019). AI-Driven Schema Evolution and Management in Heterogeneous Databases. International Journal of Machine Learning Research in Cybersecurity and Artificial Intelligence, 10(1), 332-356.Google Scholar ↗
  101. Gadde, H. (2023). Self-Healing Databases: AI Techniques for Automated System Recovery. International Journal of Advanced Engineering Technologies and Innovations, 1(02), 517-549.Google Scholar ↗
  102. Gadde, H. (2021). AI-Driven Predictive Maintenance in Relational Database Systems. International Journal of Machine Learning Research in Cybersecurity and Artificial Intelligence, 12(1), 386-409.Google Scholar ↗
  103. Gadde, H. (2019). Exploring AI-Based Methods for Efficient Database Index Compression. Revista de Inteligencia Artificial en Medicina, 10(1), 397-432.Google Scholar ↗
  104. Gadde, H. (2023). AI-Driven Anomaly Detection in NoSQL Databases for Enhanced Security. International Journal of Machine Learning Research in Cybersecurity and Artificial Intelligence, 14(1), 497-522.Google Scholar ↗
  105. Gadde, H. (2023). AI-Based Data Consistency Models for Distributed Ledger Technologies. Revista de Inteligencia Artificial en Medicina, 14(1), 514-545.Google Scholar ↗
  106. Gadde, H. (2022). AI-Enhanced Adaptive Resource Allocation in Cloud-Native Databases. Revista de Inteligencia Artificial en Medicina, 13(1), 443-470.Google Scholar ↗
  107. Gadde, H. (2022). Federated Learning with AI-Enabled Databases for Privacy-Preserving Analytics. International Journal of Advanced Engineering Technologies and Innovations, 1(3), 220-248.Google Scholar ↗
  108. Goriparthi, R. G. (2020). AI-Driven Automation of Software Testing and Debugging in Agile Development. Revista de Inteligencia Artificial en Medicina, 11(1), 402-421.Google Scholar ↗
  109. Goriparthi, R. G. (2023). Federated Learning Models for Privacy-Preserving AI in Distributed Healthcare Systems. International Journal of Machine Learning Research in Cybersecurity and Artificial Intelligence, 14(1), 650-673.Google Scholar ↗
  110. Goriparthi, R. G. (2021). Optimizing Supply Chain Logistics Using AI and Machine Learning Algorithms. International Journal of Advanced Engineering Technologies and Innovations, 1(2), 279-298.Google Scholar ↗
  111. Goriparthi, R. G. (2021). AI and Machine Learning Approaches to Autonomous Vehicle Route Optimization. International Journal of Machine Learning Research in Cybersecurity and Artificial Intelligence, 12(1), 455-479.Google Scholar ↗
  112. Goriparthi, R. G. (2020). Neural Network-Based Predictive Models for Climate Change Impact Assessment. International Journal of Machine Learning Research in Cybersecurity and Artificial Intelligence, 11(1), 421-421.Google Scholar ↗
  113. Goriparthi, R. G. (2023). Leveraging AI for Energy Efficiency in Cloud and Edge Computing Infrastructures. International Journal of Advanced Engineering Technologies and Innovations, 1(01), 494-517.Google Scholar ↗
  114. Goriparthi, R. G. (2023). AI-Augmented Cybersecurity: Machine Learning for Real-Time Threat Detection. Revista de Inteligencia Artificial en Medicina, 14(1), 576-594.Google Scholar ↗
  115. Goriparthi, R. G. (2022). AI-Powered Decision Support Systems for Precision Agriculture: A Machine Learning Perspective. International Journal of Advanced Engineering Technologies and Innovations, 1(3), 345-365.Google Scholar ↗
  116. Reddy, V. M., & Nalla, L. N. (2020). The Impact of Big Data on Supply Chain Optimization in Ecommerce. International Journal of Advanced Engineering Technologies and Innovations, 1(2), 1-20.Google Scholar ↗
  117. Nalla, L. N., & Reddy, V. M. (2020). Comparative Analysis of Modern Database Technologies in Ecommerce Applications. International Journal of Advanced Engineering Technologies and Innovations, 1(2), 21-39.Google Scholar ↗
  118. Nalla, L. N., & Reddy, V. M. (2021). Scalable Data Storage Solutions for High-Volume E-commerce Transactions. International Journal of Advanced Engineering Technologies and Innovations, 1(4), 1-16.Google Scholar ↗
  119. Reddy, V. M. (2021). Blockchain Technology in E-commerce: A New Paradigm for Data Integrity and Security. Revista Espanola de Documentacion Cientifica, 15(4), 88-107.Google Scholar ↗
  120. Reddy, V. M., & Nalla, L. N. (2021). Harnessing Big Data for Personalization in E-commerce Marketing Strategies. Revista Espanola de Documentacion Cientifica, 15(4), 108-125.Google Scholar ↗
  121. Reddy, V. M., & Nalla, L. N. (2022). Enhancing Search Functionality in E-commerce with Elasticsearch and Big Data. International Journal of Advanced Engineering Technologies and Innovations, 1(2), 37-53.Google Scholar ↗
  122. Nalla, L. N., & Reddy, V. M. (2022). SQL vs. NoSQL: Choosing the Right Database for Your Ecommerce Platform. International Journal of Advanced Engineering Technologies and Innovations, 1(2), 54-69.Google Scholar ↗
  123. Reddy, V. M. (2023). Data Privacy and Security in E-commerce: Modern Database Solutions. International Journal of Advanced Engineering Technologies and Innovations, 1(03), 248-263.Google Scholar ↗
  124. Reddy, V. M., & Nalla, L. N. (2023). The Future of E-commerce: How Big Data and AI are Shaping the Industry. International Journal of Advanced Engineering Technologies and Innovations, 1(03), 264-281.Google Scholar ↗
  125. Nalla, L. N., & Reddy, V. M. Machine Learning and Predictive Analytics in E-commerce: A Data-driven Approach.Google Scholar ↗
  126. Reddy, V. M., & Nalla, L. N. Implementing Graph Databases to Improve Recommendation Systems in E-commerce.Google Scholar ↗
  127. Chatterjee, P. (2023). Optimizing Payment Gateways with AI: Reducing Latency and Enhancing Security. Baltic Journal of Engineering and Technology, 2(1), 1-10.Google Scholar ↗
  128. Chatterjee, P. (2022). Machine Learning Algorithms in Fraud Detection and Prevention. Eastern-European Journal of Engineering and Technology, 1(1), 15-27.Google Scholar ↗
  129. Chatterjee, P. (2022). AI-Powered Real-Time Analytics for Cross-Border Payment Systems. Eastern-European Journal of Engineering and Technology, 1(1), 1-14.Google Scholar ↗
  130. Mishra, M. (2022). Review of Experimental and FE Parametric Analysis of CFRP-Strengthened Steel-Concrete Composite Beams. Journal of Mechanical, Civil and Industrial Engineering, 3(3), 92-101.Google Scholar ↗
  131. Krishnan, S., Shah, K., Dhillon, G., & Presberg, K. (2016). 1995: FATAL PURPURA FULMINANS AND FULMINANT PSEUDOMONAL SEPSIS. Critical Care Medicine, 44(12), 574.Google Scholar ↗
  132. Krishnan, S. K., Khaira, H., & Ganipisetti, V. M. (2014, April). Cannabinoid hyperemesis syndrome-truly an oxymoron!. In JOURNAL OF GENERAL INTERNAL MEDICINE (Vol. 29, pp. S328-S328). 233 SPRING ST, NEW YORK, NY 10013 USA: SPRINGER.Google Scholar ↗
  133. Krishnan, S., & Selvarajan, D. (2014). D104 CASE REPORTS: INTERSTITIAL LUNG DISEASE AND PLEURAL DISEASE: Stones Everywhere!. American Journal of Respiratory and Critical Care Medicine, 189, 1Google Scholar ↗
Author details
Sai krishna Chaitanya Tulli
Oracle NetSuite Developer, Qualtrics LLC, Qualtrics, 333 W River Park Dr, Provo, UT 84604
✉ Corresponding Author
👤 View Profile →