Volume 1, Issue 2 - 2025
Published: Oct-Dec 2025
Issue Information
- Volume: 1
- Issue: 2
- Year: 2025
- Articles: 5
Featured Articles
Ensemble Machine Learning Models for Predicting Credit Card Transaction Frauds in Banking Sector
Authors: Sunil Jacob Enokkaren, Jaya Vardhani Mamidala, Varun Bitkuri, Avinash Attipalli, Raghuvaran Kendyala, Jagan Kurma | DOI: 10.63665/ijetd-y1f2a001
Banks are known to incur substantial financial loss every year because of financial fraud in the banks. This can be mitigated through early detection, the development of a counter-strategy, and the recuperation of losses caused by such fraud. This paper presents a proposed ensemble architecture that integrates Long Short-Term Memory (LSTM) and Artificial Neural Network (ANN) to overcome the limitations of class imbalance and multi-layered patterns in transactional data during Credit Card Fraud Detection (CCFD).
Read Full Article →A Survey on the Use of MySQL and MongoDB in Data-Driven Applications for Small and Medium Enterprises
Authors: Rami Reddy Kothamaram, Dinesh Rajendran, Venkata Deepak Namburi, Vetrivelan Tamilmani, Aniruddha Arjun Singh, Vaibhav Maniar | DOI: 10.63665/ijetd-y1f2a002
The rapid increase in the digitization of data has changed the manner in which Small and Medium Enterprises (SMEs) interact and perceive information. Effective database systems are critical in establishing efficacy in operations, scalability and management of information with secure information management.
Read Full Article →Models of Predictive Business Intelligence for the Success of Entrepreneurial Ventures
Authors: Ezekiel Nyong | DOI: 10.xxxx/ijetd.2024.001.003
Traditional decision-making methods result in the failure of venture attempts; they operate in environments characterized by high uncertainty. In this paper, the authors discuss a predictive Business Intelligence architecture for nascent enterprises that applies machine learning methodologies together with diverse types of input data to predict the success of a particular venture.
Read Full Article →Zero Trust Architecture in Financial Networks: Implementation Challenges and Best Practices
Authors: Afex Callagher | DOI: 10.xxxx/ijetd.2024.001.004
In the modern world of cybersecurity, hackers attack banks and other financial institutions because they deal in private information. Zero Trust Architecture is simply a security model based on the philosophy "never trust, always verify.
Read Full Article →Digital Warfare: The Russia-Ukraine Conflict's Effect on Cybersecurity
Authors: Victor Ogunrinde | DOI: 10.xxxx/ijetd.2024.001.005
In terms of understanding cyberwarfare and its function in current interstate conflicts, Russia and Ukraine have ushered in a new age. Cyberattacks have been employed as a military strategy to undermine a country's defences, alter information, and destabilize important institutions.
Read Full Article →Have Research to Share?
Submit your manuscript for our upcoming issues.
Submit Your Research