https://www.inlibrary.uz/index.php/ijdsml/issue/feedInternational journal of data science and machine learning2025-08-21T16:41:18+08:00Open Journal Systems<p>The International Journal of Data Science and Machine Learning (IJDSML) aims to provide a comprehensive platform for researchers, practitioners, and academicians to publish and access high-quality, cutting-edge research in the fields of data science and machine learning.</p>https://www.inlibrary.uz/index.php/ijdsml/article/view/124619Bridging Identity Assurance Gaps: Integrating FIDO2 and Certificate-Based Authentication for Phishing-Resistant, Scalable Enterprise Security2025-07-17T22:44:50+08:00Badal Bhushanbadal@academicpublishers.org<p>Identity protection is an essential component of enterprise security in the current era. With phishing, credential theft, and adversary-in-the-middle (AiTM) attacks persisting and morphing, traditional authentication methods like passwords and omnipresent multi-factor authentication (SMS, OTP, push notification, etc.) are proving increasingly inadequate. This article provides an in-depth examination of two modern and popular authentication protocols, namely FIDO2/WebAuthn and Certificate-Based Authentication (CBA). FIDO2 facilitates passwordless authentication with the assistance of cryptographic credentials securely bound to a person's device, offering improved usability and phishing resistance. CBA, rooted in public key infrastructure (PKI), remains a necessary requirement in compliance-focused environments and is crucial for safeguarding human and machine identities. This study explores how these technologies operate across diverse contexts, from enterprise-owned notebooks to personal mobile devices and non-human account systems. Using internationally accepted standards and frameworks—such as NIST SP 800-63-3, the CISA Zero Trust Maturity Model, and eIDAS—the document provides implementation considerations that incorporate policy and identity credential lifecycle approach techniques. It also evaluates operational recovery and fallback processes in cases of credential loss or compromise. A structured framework is provided to enable organizations to achieve identity assurance at scale and support evolving technology and regulatory demands. Future trends such as passkeys, derived credentials, quantum computing, and modular authentication systems are also considered, which will introduce flexibility and strength in the identity assurance landscape.</p>2025-07-17T00:00:00+08:00Copyright (c) 2025 Badal Bhushanhttps://www.inlibrary.uz/index.php/ijdsml/article/view/128893Privacy-Preserving Customer Segmentation for Scalable Media Optimization in E-Commerce2025-07-28T16:41:24+08:00Surya Narayana Reddy Chintacunta,surya@academicpublishers.orgSowjanya Deva,sowjanya@academicpublishers.org<p>E-commerce sites and marketers need to personalize customer experiences without breaking the law because people are becoming more worried about data privacy and third-party cookies are being phased out. This paper shows how to use machine learning to create a framework for customer segmentation and media optimization that protects privacy. The system is made to work in decentralized, privacy-sensitive settings. It uses unsupervised clustering, predictive modeling, and real-time decisioning engines to give users useful information without giving away their identity. Our method uses federated learning and cleanroom technologies to make sure that it follows laws like GDPR and CCPA. This is different from traditional commercial segmentation tools that rely heavily on centralized data collection and unclear personalization methods. The framework shows big improvements in performance when tested on real-world e-commerce datasets. It gets a 23% increase in Return on Ad Spend (ROAS), a 17% increase in conversion rates, and a 14% drop in cost-per-acquisition. The proposed solution is a scalable and compliant replacement for old marketing tools. It lets you target people more accurately and buy media more efficiently in today's changing digital world.</p>2025-07-28T00:00:00+08:00Copyright (c) 2025 Surya Narayana Reddy Chintacunta,, Sowjanya Deva,https://www.inlibrary.uz/index.php/ijdsml/article/view/128894AI-optimized SOC playbook for Ransomware Investigation2025-07-28T16:48:38+08:00Prassanna R Rajgopalprassanna@academicpublishers.org<p>In today’s fast-evolving threat landscape, ransomware attacks have become more sophisticated, faster, and more destructive leaving traditional Security Operations Center (SOC) response strategies struggling to keep pace. Traditional SOC workflows struggle to match the speed and complexity of modern ransomware attacks. Manual processes like alert triage, incident scoping, and containment often consume critical hours giving adversaries ample opportunity to encrypt data, exfiltrate assets, and demand ransoms. AI-optimized SOC playbooks are redefining this paradigm by automating the entire investigation lifecycle. Leveraging machine learning, LLMs, and real-time telemetry analysis, these systems rapidly identify high-fidelity threats, enrich alerts with contextual intelligence, and scope incidents with minimal analyst input reducing response time from hours to mere minutes.</p> <p>Generative AI further accelerates this shift by auto-generating attack summaries, mapping indicators to known threat tactics, and recommending or initiating containment actions such as isolation or credential revocation. These playbooks evolve continuously by learning from analyst feedback and past events, improving both accuracy and efficiency over time. The result is a measurable reduction in mean-time-to-detect (MTTD) and mean-time-to-respond (MTTR), while empowering SOC analysts to focus on strategic analysis over repetitive triage. As ransomware campaigns grow faster and more autonomous, adopting AI-driven SOC playbooks has become a mission-critical step for organizations seeking proactive, resilient security operations.</p>2025-07-28T00:00:00+08:00Copyright (c) 2025 Prassanna R Rajgopalhttps://www.inlibrary.uz/index.php/ijdsml/article/view/131040Self-Healing Software Architectures in the Cloud: AI-Driven Detection and Recovery Mechanisms2025-08-04T20:46:22+08:00Srinivasu Yalamatisrinivasu@academicpublishers.org<p>The recent evolution of cloud computing demands that systems are able to self-diagnose and self-heal as well as constantly optimize without human intervention. This paper provides an in-depth review of the self-healing software architectures in cloud computing, focusing on AI-induced detection and recovery methods. The authors talk about how self-healing systems have changed from traditional ideas to modern AI-powered systems and categorize the main types of methods used for synchronization, tracking, and fixing problems in today's cloud services. Based on a systematic review of available literature, we investigate essential issues such as fault detection accuracy, recovery time optimization, and system reliability improvement. The study finds that although much has been achieved in self-healing, the existing approaches are not yet able to efficiently deal with complex fault situations and to reduce the level of service interruption. Our results suggest that the application of large language models updated using machine learning has the potential to deliver up to an 85% increase in the accuracy of fault prediction and a 60% reduction in system downtime as compared to state-of-the-art approaches. Finally, we talk about what future research should focus on, including the necessary understanding and development of new AI models, different system structures, and standard ways to measure how well self-healing cloud systems work.</p>2025-08-04T00:00:00+08:00Copyright (c) 2025 Srinivasu Yalamatihttps://www.inlibrary.uz/index.php/ijdsml/article/view/133743Customer Deduction and Settlement Management Using Oracle Receivables and Channel Revenue Management at a Food Packaging company2025-08-14T14:53:42+08:00Sachin Sardanasachin8217@gmail.com<p>Mass production and distribution companies face multifaceted challenges in managing customer deductions, promotional rebates, and trade settlement processes. Fragmented and manual deduction workflows have contributed to revenue leakage, aging receivables, and delays in cash application. This paper explores the implementation of Oracle Channel Revenue Management (ChRM) integrated with Oracle Receivables to create a streamlined, automated solution for end-to-end deduction processing, from claim initiation through settlement and accounting. Drawing upon the case of a food packing company’s U.S. operations, the study highlights how a rules-based, system-driven approach enhanced accuracy and control. Notably, the company achieved a 90% reduction in manual write-offs and shortened average claim resolution time from 21 days to 8 days. The integrated model not only minimized manual intervention but also improved transparency, strengthened financial compliance, and enhanced working capital efficiency. These results affirm that Oracle ChRM, when deployed strategically, can transform deduction management into a driver of operational and financial excellence.</p>2025-08-12T00:00:00+08:00Copyright (c) 2025 Sachin Sardanahttps://www.inlibrary.uz/index.php/ijdsml/article/view/134263The Psychology of Visual Perception in Data Dashboards: Designing for Impact2025-08-16T15:38:37+08:00Dip Bharatbhai Pateldpatel729604@gmail.com<p>The paper is expansive on the psychology of visual perception in dashboards in a push to design for impact. Visualization is a game of storytelling that ensures everything meets human perception in their designs. It is based on building and developing better data visualizations to show how everything would be designed. It is explicit in terms of interpreting and communicating information in making sure that everything is applied to how it works in understanding different psychological requirements to show its application and use, based on improving how information can be applied and improved to make sure that it fits what is expected, based on improved visual impacts. Data interpretation works on processing data requirements to balance information delivery and aesthetics in the data visualizations. The paper is key in providing information that starts with improving compelling visuals, which come with improving the focus on data improvement and improving the essence that works on cognitive load and balance for understanding and reducing clutter or distractions of the data visuals. Organizing and improving information is an important aspect in ensuring that data visualization is effective and reliable, with related data points being explicit and improved in how viewers or the audience view and relate to the information being viewed. Case findings are that there lacks more knowledge in terms of how designing for impact is the future for data visualizations to make visual impact key.</p>2025-08-16T00:00:00+08:00Copyright (c) 2025 Dip Patelhttps://www.inlibrary.uz/index.php/ijdsml/article/view/135214The Real-Time Data Accuracy as a Driver of Customer Satisfaction in Telecom Services2025-08-21T16:41:18+08:00Rajasekhar Vetukurivetukuri@academicpublishers.org<p>The telecom sector now prioritizes real-time data accuracy because of increased consumer demand for top-notch customer experiences. The study investigates the connection between real-time data accuracy and customer satisfaction in telecom services. Accurate real-time information becomes essential for shaping customer experiences throughout service delivery and support functions as businesses increasingly depend on data-driven decision-making. This research demonstrates the connection between data inconsistencies and problems that include billing errors along with service interruptions which result in customer dissatisfaction. The study employed a mixed-method approach with qualitative interviews and quantitative surveys among telecom customers and service providers to examine the relationship between data accuracy and customer satisfaction. Real-time data accuracy builds customer trust while reducing resolution time for service problems and increasing customer loyalty. The research emphasizes that inaccurate data erodes customer trust leading to service churn which negatively impacts telecom companies' reputation. The research explores how technology such as AI and machine learning helps maintain real-time data accuracy while automation presents opportunities to reduce human errors. The study proposes several strategies for telecom companies to utilize precise real-time data to boost service quality while enhancing operational efficiency and achieving greater customer satisfaction. The research enhances comprehension of how data precision interacts with customer-focused business tactics in the telecommunications sector.</p>2025-08-21T00:00:00+08:00Copyright (c) 2025 Rajasekhar Vetukuri