https://theamericanjournals.com/index.php/tajet/issue/feedThe American Journal of Engineering and Technology2025-05-29T05:30:22+00:00Evan Ross Tyoeditor@theamericanjournals.comOpen Journal Systems<p>E-ISSN <strong>2689-0984</strong></p> <p>DOI Prefix <strong>10.37547/tajet</strong></p> <p>Started Year <strong>2019</strong></p> <p>Frequency <strong>Monthly</strong></p> <p>Language <strong>English</strong></p> <p>APC <strong>$250</strong></p>https://theamericanjournals.com/index.php/tajet/article/view/6119Development of the technology for producing new structures of shape-resistant two-layer plush knitwear2025-05-06T11:33:07+00:00Allaniyazov Gulomjon Sherniyazovichallaniyazov@theamericanjournals.comKholikov Kurbonali Madaminovichkholikov@theamericanjournals.comTureniyazov Adilbek Allambergenovichtureniyazov@theamericanjournals.comKarimbayev Nursultan Maratovichkarimbayev@theamericanjournals.com<p>This paper presents methods for improving the shape stability of plush knitwear, which, despite its advantages, tends to deform under load due to the structure of the ground yarn. The structures of two-layer plush knitwear are considered, in which one layer is plush knitwear, and the other layer consists of more shape-stable weaves. Three variants of double-layer plush knitwear with different structures are described. These developments improve shape stability, reduce elongation, enhance thermal protection properties, and expand the range of knitwear applications. The advantages of the new variants include increased durability, improved quality, and an aesthetically pleasing appearance.</p>2025-05-06T00:00:00+00:00Copyright (c) 2025 Allaniyazov Gulomjon Sherniyazovich, Kholikov Kurbonali Madaminovich, Tureniyazov Adilbek Allambergenovich, Karimbayev Nursultan Maratovichhttps://theamericanjournals.com/index.php/tajet/article/view/6204Enhancing Cloud Security with AI-Driven Big Data Analytics2025-05-28T04:41:14+00:00Vijaya lakshmi Middaemiddae@theamericanjournals.com<p>Since cloud computing is changing so rapidly, maintaining strong security is now a major issue for companies everywhere. Massive volumes of mixed data are constantly created in cloud environments at every layer, involving virtual machines, containers, storage, identity management and application activities. It is usually not possible for traditional security systems and old monitoring tools to manage vast and changing data flow in real time. Con- ventional methods fail to discover advanced persistent threats, attacks by team members and new vulnerabilities because they do not easily adjust to changing situations. To fix the urgent problem of weak security in cloud sys- tems, this research introduces an AI-powered big data analytics system. The aim is to use artificial intelligence and big data technologies to improve spot- ting threats, marking unusual incidents and reducing risks as they happen. Machine learning and deep learning are used within the system which makes use of distributed processing platforms such as Apache Spark, Hadoop and Kafka. Together, these pieces ensure that a lot of log data and telemetry from hybrid and multi-cloud setups are ingested, worked on and analyzed quickly and efficiently. The proposed solution uses Isolation Forests, Ran- dom Forests, Autoencoders and LSTM networks to spot abnormal activity and risks. They can recognize unusual patterns in network activity, website logs and API usage to find out about possible attacks. It also makes use of natural language processing to study unstructured log data for threats and compares these to the ones listed in external threat intelligence. The archi- tecture is built with a layer using Kafka and Logstash to get data ingested, another using Spark and HDFS for processing and a third for real-time threat analysis and prediction with AI. Information about threats is presented vi- sually in dashboards with the help of Grafana and Kibana, so analysts can easily respond to any threats. Risks are scored with a mechanism that focuses on the worst incidents and those expected to have the biggest impact. Bench- mark datasets such as CICIDS 2017 and UNSW-NB15 are used, along with anonymized real-world activity logs from the cloud, to assess the suggested solution’s robustness. The data suggests that using this technology is more effective and faster than using traditional security approaches. This study has resulted in an AI-based security framework that can handle large enter- prise loads, adaptive security models and affordable implementation paths for the cloud. Thanks to this work, cloud security can now focus on ad- vancing to automating early detection, providing continuous monitoring and implementing automatic steps when needed. Ultimately, the use of AI and big data analytics changes how cloud security functions. This research en- ables systems to detect threats and rate risks in real time, helping to improve the security of today’s cloud networks.</p>2025-05-28T00:00:00+00:00Copyright (c) 2025 Vijaya lakshmi Middaehttps://theamericanjournals.com/index.php/tajet/article/view/6152Secure DevOps in Retail Cloud: Strategies for Compliance and Resilience2025-05-14T08:06:56+00:00Suresh Gangulagangula@theamericanjournals.com<p>Integrating DevOps principles in retail cloud environments has revolutionized software development, deployment, and operations. However, this shift introduces complex security and compliance challenges, particularly as retailers handle sensitive customer data, financial transactions, and business intelligence. This review examines the role of DevOps in enhancing security, discusses the limitations of traditional security models, and explores cloud-native security solutions tailored for retail enterprises. Additionally, the paper highlights regulatory compliance mandates that retailers must adhere to in cloud-based DevOps frameworks. This review analyzes best practices and provides actionable insights for retail businesses to achieve secure, compliant, and resilient cloud infrastructures while maintaining agile DevOps workflows.</p>2025-05-14T00:00:00+00:00Copyright (c) 2025 Suresh Gangulahttps://theamericanjournals.com/index.php/tajet/article/view/6196Multimodal Deepfake Detection Using Transformer-Based Large Language Models: A Path Toward Secure Media and Clinical Integrity2025-05-24T10:17:53+00:00Kutub Thakurthakur@theamericanjournals.comMd Abu Sayedsayed@theamericanjournals.comSanjida Akter Tishatisha@theamericanjournals.comMd Khorshed Alamalam@theamericanjournals.comMd Tarek Hasanhasan@theamericanjournals.comJannatul Ferdous Shornashorna@theamericanjournals.comSadia Afrinafrin@theamericanjournals.comMd Zahin Hossain Georgegeorge@theamericanjournals.comEftekhar Hossain Ayonayon@theamericanjournals.com<p>Deepfakes pose a significant threat across various domains by generating highly realistic manipulated audio-visual content, with critical implications for security and clinical environments. This</p> <p><br>paper presents a robust multimodal deepfake detection framework powered by transformer-based large language models (LLMs) that effectively analyze and integrate visual, auditory, and textual modalities. Utilizing the FakeAVCeleb dataset, we compare our proposed model with traditional machine learning and deep learning methods, including Logistic Regression, Support Vector Machine (SVM), Random Forest, and Long Short-Term Memory (LSTM) networks. Experimental results demonstrate that the transformer-based model significantly outperforms others, achieving an accuracy of 96.55%, precision of 96.47%, recall of 96.50%, F1-score of 96.48%, and an AUC of 0.97. This enhanced performance is attributed to the model’s ability to capture complex semantic and temporal dependencies across modalities. The findings suggest the proposed model’s strong potential for real-world applications such as telemedicine, clinical video authentication, and digital identity verification, establishing a promising direction for deploying deepfake detection technologies in sensitive and high-stakes environments.</p>2025-05-24T00:00:00+00:00Copyright (c) 2025 Kutub Thakur, Md Abu Sayed, Sanjida Akter Tisha, Md Khorshed Alam, Md Tarek Hasan, Jannatul Ferdous Shorna, Sadia Afrin, Md Zahin Hossain George, Eftekhar Hossain Ayonhttps://theamericanjournals.com/index.php/tajet/article/view/6149Evolution of Automated Testing Methods Using Machine Learning2025-05-12T14:01:34+00:00Anna Deviatkoanna@theamericanjournals.com<p>program testing is crucial for guaranteeing program dependability, but it has historically included a lot of manual labor, which restricts coverage and raises expenses. By creating and selecting test cases, anticipating defect-prone locations, and evaluating test results, machine learning (ML)-driven testing approaches automate and improve traditional software testing. This study examines the development of these techniques. Significant enhancements are provided by ML-driven techniques, such as early fault detection, shorter testing times, and increased test coverage. The paper offers a thorough synthesis of current developments, contrasting ML-based testing with conventional methods in a number of areas, including efficacy and efficiency in defect identification. It also highlights important research gaps, talks about real-world implementation issues, and looks at multidisciplinary uses of machine learning technologies, such as deep learning and reinforcement learning. The paper concludes by highlighting machine learning's revolutionary influence on software testing procedures and projecting a time when testing will become more independent, flexible, and incorporated into ongoing software development processes.</p>2025-05-12T00:00:00+00:00Copyright (c) 2025 Anna Deviatkohttps://theamericanjournals.com/index.php/tajet/article/view/6170Ensuring the Availability of Critical Cloud Services Through SRE Practices2025-05-19T09:41:59+00:00Alexandr Hacicheanthacicheant@theamericanjournals.com<p>The availability of cloud services is a critical factor in the success of digital products. Downtime in essential systems—whether for fintech platforms or major online retailers—can lead to substantial financial losses and reputational damage. Meanwhile, modern cloud infrastructures continue to grow in complexity. Distributed architectures, automated scaling, and frequent software releases all increase the risk of system failures.</p> <p>In this dynamic environment, companies are actively seeking strategies to minimize incidents and mitigate their impact. One of the most effective approaches is Site Reliability Engineering (SRE)—a discipline pioneered at Google that combines engineering best practices with operational processes to enhance the reliability and resilience of cloud services.</p> <p>This article examines how Site Reliability Engineering (SRE) principles address the challenges of maintaining cloud services availability. Alexandr Hacicheant, Head of Reliability Engineering at Mayflower, provides an analysis of key issues in this field, the core methodologies of SRE, and real-world applications that contribute to minimizing downtime.</p>2025-05-19T00:00:00+00:00Copyright (c) 2025 Alexandr Hacicheanthttps://theamericanjournals.com/index.php/tajet/article/view/6134Enhancing Order Scheduling Efficiency with Packaging Lead Time in Oracle E-Business Suites Implementation2025-05-09T05:07:25+00:00Srinivasan Narayanannarayanan@theamericanjournals.com<p>This article deals with the intricacies of packaging lead time requirements in order fulfillment in the Business-to-Business (B2B) context, with different requirements being customer-driven and regulation-driven. The article discusses how Oracle E-Business Suite (EBS) as an integrated ERP package handles order promising processes and how it addresses packaging requirements on domestic and international shipments. In the B2B context, customers need materials shipped in particular types of packaging, from generic cartons to specialized packing skids or pallets. As a robust application, Oracle EBS is strongly positioned to address such packaging needs in a diversified manner by sub-applications like Oracle Order Management and Oracle Global Order Promising. The document talks about the setup of packaging specifications in Oracle EBS using common lookups, descriptive flexfields (DFF), and workflows within Oracle Order Management. Order line workflow customization and defaulting rules are also dealt with in the document to further optimize the order promising process, presenting an end-to-end solution to simplify operations. Finally, the paper outlines Oracle EBS benefits in order fulfillment automation, compliance assurance, and customer satisfaction improvement. It highlights the important part that technology plays in coping with the intricacies of contemporary manufacturing and supply chain management and presents Oracle EBS as a central facilitator of operational excellence and long-term business expansion. As a whole, this journal presents a complete image of the dynamics of packaging lead time demands in the B2B model and the important role played by Oracle EBS in mitigating these challenges.</p>2025-05-09T00:00:00+00:00Copyright (c) 2025 Srinivasan Narayananhttps://theamericanjournals.com/index.php/tajet/article/view/6161Building Microfrontend Architecture with Flutter for Modular Apps2025-05-15T13:18:49+00:00Shruthi Alekhaalekha@theamericanjournals.com<p>Software engineers working on scaling Flutter applications often encounter initially clean and manageable codebases that gradually evolve into highly complex and difficult-to-maintain software systems. This paper investigates the applicability of microfrontend principles—commonly employed in modern web engineering—to address architectural scalability, maintainability, and modularization challenges in Flutter-based systems.</p> <p>Traditional single-codebase Flutter apps are great in the early stages of development. However, as teams and features expand, so do the associated headaches. We have applied these techniques in practice and observed significant improvements in architectural scalability and maintainability.</p> <p>Through empirical implementation and applied research, it has been demonstrated that modular Flutter architectures enable engineering teams to mitigate collaboration inefficiencies, resolve dependency management complexities, and establish sustainable software development workflows. This paper is grounded not only in theory but also in practical design patterns and implementation frameworks for handling cross-module state management, securing boundaries between components, and setting up CI/CD pipelines that work with modular architecture. Empirical observations from production environments have demonstrated quantifiable improvements in build times, developer productivity, and long-term maintainability.</p>2025-05-15T00:00:00+00:00Copyright (c) 2025 Shruthi Alekhahttps://theamericanjournals.com/index.php/tajet/article/view/6122Cybersecurity Challenges in Healthcare IT: Business Strategies for Mitigating Data Breaches and Enhancing Patient Trust2025-05-07T03:05:21+00:00MD Sheam Arafatarafat@theamericanjournals.comKirtibhai Desaidesai@theamericanjournals.comMir Abrar Hossainhossain@theamericanjournals.comAyesha Islam Ashaasha@theamericanjournals.comSharmin Akterakter@theamericanjournals.com<p>Healthcare IT security threats create multiple threats that endanger patient privacy together with operational processes and medical institution trust levels. Medical organizations that adopt digital adoption methods depend more on electronic health records (EHRs), cloud computing and connected medical devices which creates growing cyberattack risks. The paper examines various difficulties affecting healthcare IT cybersecurity through a focus on expanding data breaches that cause patient trust issues. The research adopts a data-based framework to study security threats which involve ransomware, insider threats, and phishing attacks together with their impact on financial losses and reputational damage. Through this analysis the Health Insurance Portability and Accountability Act (HIPAA) and General Data Protection Regulation (GDPR) serve as regulatory emphasis with assessment of worldwide healthcare institution compliance obstacles. This study presents multiple business strategies to combat cybersecurity risks through visionary threat detection tools alongside AI security systems and blockchain protocols alongside complete risk management protocols. This paper analyzes recent verifiable studies from respected sources to locate essential research holes in healthcare cybersecurity defense and provides usable solutions for organizations. Research outcomes demonstrate that healthcare organizations must implement multiple protective measures to protect patient data in order to preserve their institutional trustworthiness. The written work presents usable knowledge for public servants in addition to healthcare leadership teams and information security experts who deal with new digital threats.</p>2025-05-06T00:00:00+00:00Copyright (c) 2025 MD Sheam Arafat, Kirtibhai Desai, Mir Abrar Hossain, Ayesha Islam Asha, Sharmin Akterhttps://theamericanjournals.com/index.php/tajet/article/view/6209Mitigating Algorithmic Bias in Predictive Models2025-05-29T05:30:22+00:00Tamanno Maripovamaripova@theamericanjournals.com<p>This article considers the issue of systematic errors in predictive machine-learning models generating disparate outcomes for different social groups and proposes a holistic approach to its mitigation. The risks and increasing legal requirements, along with corporate commitments to ethical AIs, drive the relevance of this study. The work herewith attempts to develop a bias-source taxonomy at data collection and annotation, proxy-feature selection, model training, and deployment stages; also, it tries to compare pre-, in-, and post-processing methods' effectiveness on representative datasets measured by demographic parity, equalized error rates, and disparate impact. This article is unprecedented in undertaking a two-level approach: first, a systematic review of regulatory definitions (NIST, IBM) and case studies (COMPAS, healthcare-service prediction, face recognition) that identified key bias factors from sample imbalance to feedback loops; second, an empirical comparison of Reweighing, adversarial debiasing, threshold post-processing techniques alongside flexible multi-objective strategies—YODO (via AI Fairness 360 and Fairlearn libraries)—considering acceptable accuracy losses. The root source of unfairness remains data bias; hence, pre-processing must be undertaken (rebalancing, synthetic oversampling), while in- and post-processing can essentially harmonize group metrics at some cost in accuracy reduction Furthermore, without continuous online monitoring and documentation (datasheets, model cards), the balanced model risks losing fairness due to dynamic feedback effects. Bringing together technical fixes with rules and making the audit process official ensures the ability to copy and openness, which is key for long-term faith in AI systems. This article will help machine-learning builders, AI-responsibility experts, and checkers find ways to find, gauge, and lessen algorithmic bias in live models.</p>2025-05-29T00:00:00+00:00Copyright (c) 2025 Tamanno Maripovahttps://theamericanjournals.com/index.php/tajet/article/view/6156Optimization of Microservices Architecture Performance in High-Load Systems2025-05-15T03:11:38+00:00Artem Iurchenkolurchenko@theamericanjournals.com<p>The article addresses the issue of optimizing the performance of microservices architecture under high-load conditions. Based on a systematic literature review, six key quality attributes of microservices are identified: scalability, performance, availability, manageability, security, and testability. A comprehensive approach to optimizing the performance of microservices architecture in high-load systems is examined, incorporating containerization (Docker), orchestration (Kubernetes), architectural patterns (CQRS, Event Sourcing), caching (Redis), and fault tolerance mechanisms (Circuit Breaker, Bulkhead). The study on load testing conducted on a prototype e-commerce system confirmed the effectiveness of the combined application of these solutions: the average response time with 5,000 concurrent users was reduced to 450–500 ms, while the error rate did not exceed 0.5%. The topic of optimizing the performance of microservices architecture in high-load systems is of interest to researchers, system architects, and engineers in distributed computing systems, as the application of modern load balancing methods, resource orchestration, and inter-service communication optimization based on contemporary parallel computing models enables a new level of scalability, fault tolerance, and adaptability of information infrastructures. This is critically important for the stable operation of complex distributed systems under constantly increasing demands for processing and analyzing large volumes of data.</p>2025-05-15T00:00:00+00:00Copyright (c) 2025 Artem Iurchenkohttps://theamericanjournals.com/index.php/tajet/article/view/6101Enhancing Safety in Oil and Gas Drilling Operations: A Deep Dive into Protocols and Risk Management2025-05-01T07:01:48+00:00Chinedu Davidchinedu@theamericanjournals.comHassan Emmanuelhassan@theamericanjournals.com<p>Oil and gas drilling operations are among the most complex and high-risk industrial activities, involving hazardous environments that require strict safety protocols and adherence to best practices to prevent accidents, injuries, and environmental harm. This article provides a detailed review of the essential safety protocols and best practices that should be implemented throughout the oil and gas drilling process, from exploration and well construction to production and decommissioning. The study discusses safety management systems, hazard identification, risk assessments, and emergency response plans, with a focus on continuous improvement and safety culture in the industry. The implementation of these safety practices is crucial to ensuring the well-being of workers, protecting the environment, and improving operational efficiency.</p>2025-05-01T00:00:00+00:00Copyright (c) 2025 Chinedu David, Hassan Emmanuelhttps://theamericanjournals.com/index.php/tajet/article/view/6199Reducing Deployment Time in Large-Scale Cloud Systems Through Automated DevOps Pipelines2025-05-27T05:07:37+00:00Haina Vladyslavvladyslav@theamericanjournals.com<p>This article explores methods for reducing deployment time in large-scale cloud systems through the implementation of automated DevOps pipelines. The focus lies on integrating the principles of Continuous Integration (CI) and Continuous Delivery (CD), adopting Infrastructure as Code (IaC), leveraging containerization and orchestration tools, and incorporating AI-driven solutions to optimize deployment workflows. The theoretical foundations of DevOps and CI/CD are examined alongside empirical data derived from comparative analyses of manual and automated deployment processes. The study also offers practical recommendations for improving the efficiency of cloud infrastructure. Findings confirm that the holistic application of these methods leads to reduced deployment times, lower operational costs, and enhanced system resilience. The insights presented in this paper will be relevant to both researchers and practitioners working on distributed cloud system development, where automated DevOps pipelines serve as a critical tool for minimizing deployment time and streamlining CI/CD processes. The study's outcomes and methodologies hold potential value for academia as well as industry professionals seeking to enhance the scalability, efficiency, and resilience of modern IT infrastructures.</p>2025-05-27T00:00:00+00:00Copyright (c) 2025 Haina Vladyslavhttps://theamericanjournals.com/index.php/tajet/article/view/6151Enhancing Search Intelligence with Geospatial Data and Machine Learning2025-05-13T10:38:01+00:00Oleksii Segedasegeda@theamericanjournals.com<p>This article explores the potential for improving intelligent search through the integration of geospatial data and machine learning techniques. It reviews current approaches in the field of GEOINT, including the processing of satellite imagery, vector data, and crowd-sourced sources such as OpenStreetMap, along with the application of deep learning architectures (e.g., VGG16, U-Net) and anomaly detection algorithms (e.g., Isolation Forest, One-Class SVM). A comprehensive literature review is provided, highlighting the relevance of the topic and identifying a research gap stemming from the lack of a holistic interdisciplinary framework. In response, the article proposes an integrated methodology aimed at increasing the accuracy and interpretability of intelligent search systems. Based on empirical data derived from modern computational platforms and multimodal models, the study demonstrates that combining geospatial data with intelligent search algorithms opens new opportunities for building adaptive and high-precision analytical systems capable of responding quickly to dynamic environmental changes. The findings are of interest to professionals and researchers in geoinformatics and machine learning seeking to merge analytical methods to improve the performance of intelligent search systems with spatial data. Additionally, the approaches discussed may prove valuable in interdisciplinary research related to decision-making optimization in fields such as urban planning, logistics, and environmental monitoring.</p>2025-05-12T00:00:00+00:00Copyright (c) 2025 Oleksii Segedahttps://theamericanjournals.com/index.php/tajet/article/view/6190Models for Adapting Business Strategies in Manufacturing Enterprises Amid Digital Technology Integration2025-05-23T13:46:08+00:00Dmitrii Pshichenkopshichenko@theamericanjournals.com<p>This article explores current approaches to the digital transformation of business strategies in manufacturing enterprises, identifying the core prerequisites and influencing factors for successful adaptation in the context of Industry 4.0. The study provides a comprehensive review of discrete maturity models, platform-based and hybrid approaches, incorporating BIM frameworks and interregional partnerships. Six key catalysts of digital transformation are identified: the predominance of information exchange, the acceleration of communication processes, the restructuring of organizational models, the rise of enabling technologies (IoT, Big Data, AI), evolving competency requirements, and the emergence of digital ecosystems. A unified matrix of digital tools is presented, including IoT, Big Data, AI, robotics, ERP/MES/PLM systems, and 3D printing. The article also outlines organizational and managerial mechanisms for implementation, covering agile-based structures, digital functional domains, and project financing models. The insights presented will be of interest to researchers in strategic management and digital transformation, particularly those focused on the theoretical justification and empirical validation of adaptive business models within Industry 4.0 manufacturing environments. Additionally, the approaches discussed may prove valuable to industrial enterprise executives, digital integration consultants, and government experts involved in shaping regulatory frameworks that promote digitization in the manufacturing sector.</p>2025-05-23T00:00:00+00:00Copyright (c) 2025 Dmitrii Pshichenkohttps://theamericanjournals.com/index.php/tajet/article/view/6146Cryptographic techniques in blockchain for enhanced digital asset security2025-05-12T13:02:46+00:00Poltavskyi Dmytrodmytro@theamericanjournals.com<p>This article examines the role cryptographic methods play in protecting digital assets through blockchain systems, with a particular focus on their adjustment to contemporary challenges and technological trends. An endeavor is undertaken to systematize major cryptographic algorithms, their effective appraisal in data protection, and development prospects under quantum computing threats. The study is relevant because centralized systems increasingly depend on cryptography due to greater regulatory pressures and, above all, a need for security through secrecy. The scientific novelty lies in the detailed comparative analysis of the said methodology (hashing, digital signatures, zero-knowledge proofs) for cases relating to major blockchain platforms (Bitcoin, Ethereum, Zcash), which hence demonstrate varied approaches towards security provision. The study's methodological foundation consists of analyzing 13 sources, merging a qualitative examination of algorithms and ECDSA with zk-SNARKs with a quantitative assessment of their effectiveness. Hash functions and Merkle trees ensure data integrity while reducing the computational costs of verification; asymmetric cryptography and Zero-Knowledge Proofs guarantee authenticity and confidentiality for the function of the transaction. Main findings support that cryptography is the cornerstone technology for blockchain security, but it has to be tailored to meet new challenges. Development in post-quantum algorithms and the infusion of homomorphic encryption will soon become imperative for quantum threats. This paper strongly advocates hybrid solutions that would bring traditional ways merged with novelties, which will provide sustainability over time for digital assets. Thus, this article will be useful for Developers of Blockchain Systems, Cryptographers, Cybersecurity Experts, & Regulators willing to know how protection methods for digital assets evolve.</p>2025-05-12T00:00:00+00:00Copyright (c) 2025 Poltavskyi Dmytrohttps://theamericanjournals.com/index.php/tajet/article/view/6168Heat exchange of granular-fibrous materials in a fluidized bed with superimposition of hot coolant jets2025-05-17T05:43:37+00:00Sheraliyeva Ozoda Anvarovnasheraliyeva@theamericanjournals.comNigmatjonov Samugjon Karimjononovichnigmatjonov@theamericanjournals.comNurmuhamesov Khabibulla Sadulayevichnurmuhamesov@theamericanjournals.com<p>In this article, the process of heat exchange between granular-fibrous materials in a pseudo-liquefied layer formed by the flow of liquid or gas is scientifically and technically covered. Based on the temperature difference between heat carriers (hot water, steam, gas) and materials, the efficiency of this process is ensured by the free movement of the heat carrier in the layer, the expansion of surfaces, as well as intensive convection. The focus is on parameters such as heat transfer coefficient, temperature gradient, heat capacity of the material and flow rate. The possibilities of process analysis through mathematical modeling (Fourier, Navy-Stokes equations) and experimental methods are also considered.</p>2025-05-16T00:00:00+00:00Copyright (c) 2025 Sheraliyeva Ozoda Anvarovna, Nigmatjonov Samugjon Karimjononovich, Nurmuhamesov Khabibulla Sadulayevichhttps://theamericanjournals.com/index.php/tajet/article/view/6123Redefining IT Operations: How AI Computing Racks Are Powering Autonomous IT Infrastructure and Intelligent Service Management2025-05-07T03:14:54+00:00Kirtibhai Desaidesai@theamericanjournals.comMD Sheam Arafatarafat@theamericanjournals.comMohammad Majharul Islamislam@theamericanjournals.comAyesha Islam Ashaasha@theamericanjournals.comSharmin Akterakter@theamericanjournals.com<p>New advancements in artificial intelligence technology have driven fundamental changes in IT operations by making possible self-governing infrastructure along with intelligent service administration. IT frameworks of a traditional nature present several performance-limiting issues because they depend on humans while only addressing problems after they occur which leads to both poor operational outcomes and elevated operational expenses. AI computing racks bring revolutionary changes to IT systems through their integration of machine learning (ML) algorithms and predictive analytics which enables real-time automation along with self-healing capabilities and intelligent service management decisions. The research evaluates how AI-powered computing racks affect IT infrastructure and demonstrates their ability to improve resource management while boosting security resistance and enhancing operational delivery capabilities. The research tracks real-world deployments through empirical methods while it evaluates how AI computing racks modify workload management systems and decrease system failure frequency and boost prognostic maintenance performance. AI-driven automation delivers substantial cost savings along with increased operational efficiency through selected industry-specific examples that the research analyzes. AI-powered IT operations achieve dual goals of producing automated systems which scale up operations while creating sustainable IT networks. The research delivers direct recommendations to companies that aim to implement AI-driven infrastructure systems through a deployment path which solves infrastructure adoption hurdles including execution expenses together with privacy protection matters and worker skill adaptations. The next-generation enterprise IT framework will establish AI computing racks as its core foundation because they apply intelligent automation to revamp IT operations for enhanced efficiency and security alongside innovation capabilities.</p>2025-05-06T00:00:00+00:00Copyright (c) 2025 Kirtibhai Desai, MD Sheam Arafat, Mohammad Majharul Islam, Ayesha Islam Asha, Sharmin Akterhttps://theamericanjournals.com/index.php/tajet/article/view/6159Experimental study of kinematics of raw cotton roller of saw gin with shelling chamber2025-05-15T09:22:56+00:00D.M. Mukhammadievmukhammadiev@theamericanjournals.comKh.A. Akhmedovakhmedov@theamericanjournals.comB.Kh. Primovprimov@theamericanjournals.com<p>The article presents the results of an experimental study of the rotation frequency of the raw roller of the saw gin with huller roll box depending on the performance of the saw gin, the distance from the top of the grate to the horizontal axis of the saw cylinder and the position of the comb.</p> <p>Setting the location of the bat in the video, determine the angle and time of recording the video frame. Knowing the time difference and the angle of motion of the bat, determine the angular velocity of the raw roller. To do this, use the program "Windows Movie Maker" for time-lapse recording of drawings in the format "*.png", and to determine the angle of finding the bat use the program "COMPASS".</p> <p>To study the kinematics of the raw roller of saw gin with a peeling chamber, experimental studies were carried out using a full factorial experiment of type 23 depending on the performance of the gin (X1), the distance from the top of the grate to the horizontal axis of the saw cylinder (X2) and the position of the comb (X3), since these parameters affect the rotation frequency of the raw roller.</p> <p>In the pilot study used a cotton variety With 6524 grade I, class 2, 8.19% humidity and 3.68% of the debris according to the scheme: double-drum peg line feeder the working chamber 30 of the saw gin mill chamber (working chamber Volume is reduced by 30% relative to the serial Gina 5DP-130).</p> <p>As a result, it was found that with increasing angle of the comb and the distance from the top of the grate to the horizontal axis of the saw cylinder, the rotational speed of the raw roller increases, and decreases with increasing gin productivity.</p>2025-05-14T00:00:00+00:00Copyright (c) 2025 D.M. Mukhammadiev, Kh.A. Akhmedov, B.Kh. Primov