Volume 1, Issue 2

Latest Research & Innovation

Volume 1, Issue 2 - 2025

Published: Oct-Dec 2025

Issue Information
  • Volume: 1
  • Issue: 2
  • Year: 2025
  • Articles: 5

Featured Articles

Ensemble Machine Learning Models for Predicting Credit Card Transaction Frauds in Banking Sector

Authors: Sunil Jacob Enokkaren, Jaya Vardhani Mamidala, Varun Bitkuri, Avinash Attipalli, Raghuvaran Kendyala, Jagan Kurma | DOI: 10.63665/ijetd-y1f2a001

Banks are known to incur substantial financial loss every year because of financial fraud in the banks. This can be mitigated through early detection, the development of a counter-strategy, and the recuperation of losses caused by such fraud. This paper presents a proposed ensemble architecture that integrates Long Short-Term Memory (LSTM) and Artificial Neural Network (ANN) to overcome the limitations of class imbalance and multi-layered patterns in transactional data during Credit Card Fraud Detection (CCFD).

Read Full Article →
A Survey on the Use of MySQL and MongoDB in Data-Driven Applications for Small and Medium Enterprises

Authors: Rami Reddy Kothamaram, Dinesh Rajendran, Venkata Deepak Namburi, Vetrivelan Tamilmani, Aniruddha Arjun Singh, Vaibhav Maniar | DOI: 10.63665/ijetd-y1f2a002

The rapid increase in the digitization of data has changed the manner in which Small and Medium Enterprises (SMEs) interact and perceive information. Effective database systems are critical in establishing efficacy in operations, scalability and management of information with secure information management.

Read Full Article →
Models of Predictive Business Intelligence for the Success of Entrepreneurial Ventures

Authors: Ezekiel Nyong | DOI: 10.xxxx/ijetd.2024.001.003

Traditional decision-making methods result in the failure of venture attempts; they operate in environments characterized by high uncertainty. In this paper, the authors discuss a predictive Business Intelligence architecture for nascent enterprises that applies machine learning methodologies together with diverse types of input data to predict the success of a particular venture.

Read Full Article →
Zero Trust Architecture in Financial Networks: Implementation Challenges and Best Practices

Authors: Afex Callagher | DOI: 10.xxxx/ijetd.2024.001.004

In the modern world of cybersecurity, hackers attack banks and other financial institutions because they deal in private information. Zero Trust Architecture is simply a security model based on the philosophy "never trust, always verify.

Read Full Article →
Digital Warfare: The Russia-Ukraine Conflict's Effect on Cybersecurity

Authors: Victor Ogunrinde | DOI: 10.xxxx/ijetd.2024.001.005

In terms of understanding cyberwarfare and its function in current interstate conflicts, Russia and Ukraine have ushered in a new age. Cyberattacks have been employed as a military strategy to undermine a country's defences, alter information, and destabilize important institutions.

Read Full Article →

Have Research to Share?

Submit your manuscript for our upcoming issues.

Submit Your Research