Cloud-Native Software Development and Interpretability in Oracle EBS and SAP: AI-Driven Optimization with Safety-Oriented Redundancy Using Markov Decision Processes

Authors

  • Georgios Alexandros Papadopoulos Senior Software Architect, Greece Author

DOI:

https://doi.org/10.15662/IJRAI.2023.0606008

Keywords:

Cloud-Native Software Development, Oracle E-Business Suite (EBS), SAP Integration, AI-Driven Optimization, Markov Decision Processes (MDPs), Safety-Oriented Redundancy, Interpretable AI, Predictive Maintenance, Enterprise Software Resilience, Fault-Tolerant Systems

Abstract

Modern enterprise applications demand scalable, resilient, and interpretable software ecosystems capable of handling complex workflows and dynamic operational requirements. This paper presents a cloud-native software development framework for Oracle E-Business Suite (EBS) and SAP systems that leverages AI-driven optimization and Markov Decision Processes (MDPs) to enhance performance, reliability, and decision-making transparency. The framework integrates safety-oriented redundancy mechanisms to mitigate risks associated with system failures, ensuring continuous availability and fault tolerance. Through interpretable AI models, the system provides insights into automated decision-making processes, facilitating compliance, auditability, and stakeholder trust. Experimental validation demonstrates improved resource allocation, predictive maintenance, and operational efficiency across heterogeneous cloud and on-premise environments. The proposed methodology establishes a foundation for intelligent, adaptive, and resilient enterprise software ecosystems that combine cloud-native design principles with rigorous AI-driven optimization.

References

1. Avancha, S., Baxi, A., & Kothari, A. (2016). Privacy in mobile technology for personal healthcare. IEEE Security & Privacy, 14(3), 10–18.

2. Sugumar, R. (2016). An effective encryption algorithm for multi-keyword-based top-K retrieval on cloud data. Indian Journal of Science and Technology 9 (48):1-5.

3. Gosangi, S. R. (2022). SECURITY BY DESIGN: BUILDING A COMPLIANCE-READY ORACLE EBS IDENTITY ECOSYSTEM WITH FEDERATED ACCESS AND ROLE-BASED CONTROLS. International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 5(3), 6802-6807.

4. Amuda, K. K., Kumbum, P. K., Adari, V. K., Chunduru, V. K., & Gonepally, S. (2020). Applying design methodology to software development using WPM method. Journal ofComputer Science Applications and Information Technology, 5(1), 1-8.

5. Chen, T., He, T., & Li, H. (2019). Interpretable machine learning for security operations: methods and practice. Proceedings of the Applied Security Conference, 112–127.

6. Balaji, K. V., & Sugumar, R. (2022, December). A Comprehensive Review of Diabetes Mellitus Exposure and Prediction using Deep Learning Techniques. In 2022 International Conference on Data Science, Agents & Artificial Intelligence (ICDSAAI) (Vol. 1, pp. 1-6). IEEE.

7. Cox, M., & Ramaswamy, R. (2018). Network policy optimization using flow analysis. IEEE Transactions on Network and Service Management, 15(4), 1420–1432.

8. Nallamothu, T. K. (2023). Enhance Cross-Device Experiences Using Smart Connect Ecosystem. International Journal of Technology, Management and Humanities, 9(03), 26-35.

9. Doshi-Velez, F., & Kim, B. (2017). Towards a rigorous science of interpretable machine learning. arXiv preprint arXiv:1702.08608.

10. Pimpale, S(2022). Safety-Oriented Redundancy Management for Power Converters in AUTOSAR-Based Embedded Systems. https://www.researchgate.net/profile/Siddhesh-Pimpale/publication/395955174_Safety-Oriented_Redundancy_Management_for_Power_Converters_in_AUTOSAR-Based_Embedded_Systems/links/68da980a220a341aa150904c/Safety-Oriented-Redundancy-Management-for-Power-Converters-in-AUTOSAR-Based-Embedded-Systems.pdf

11. Hinton, G., & Weinberger, K. (2018). Model governance and lifecycle for enterprise ML. Journal of Machine Learning Operations, 1(2), 34–49.

12. Johnson, A. E. W., Pollard, T. J., & Mark, R. G. (2020). MIMIC-IV clinical database: enabling reproducible critical care research. Scientific Data, 7, 132. (Used here as an exemplar of rich enterprise/operational datasets and provenance practices.)

13. Sangannagari, S. R. (2021). Modernizing mortgage loan servicing: A study of Capital One’s divestiture to Rushmore. International Journal of Research and Applied Innovations, 4(4), 5520-5532.

14. Kairouz, P., McMahan, H. B., Avent, B., Bellet, A., Bennis, M., Bhagoji, A. N., ... & Zhao, S. (2021). Advances and open problems in federated learning. Foundations and Trends® in Machine Learning, 14(1–2), 1–210.

15. Shaffi, S. M. (2021). Strengthening data security and privacy compliance at organizations: A Strategic Approach to CCPA and beyond. International Journal of Science and Research(IJSR), 10(5), 1364-1371.

16. Li, F., & Chen, Y. (2019). Mining firewall rules from historical flows using constraint solvers. Proceedings of the Network and Distributed Systems Security Symposium, 2019.

17. Lipton, Z. C. (2018). The mythos of model interpretability. Communications of the ACM, 61(10), 36–43.

18. Kiran Nittur, Srinivas Chippagiri, Mikhail Zhidko, “Evolving Web Application Development Frameworks: A Survey of Ruby on Rails, Python, and Cloud-Based Architectures”, International Journal of New Media Studies (IJNMS), 7 (1), 28-34, 2020.

19. Raj, A. A., & Sugumar, R. (2023, May). Multi-Modal Fusion of Deep Learning with CNN based COVID-19 Detection and Classification Combining Chest X-ray Images. In 2023 7th International Conference on Intelligent Computing and Control Systems (ICICCS) (pp. 569-575). IEEE.

20. Lundberg, S. M., & Lee, S.-I. (2017). A unified approach to interpreting model predictions. NeurIPS Proceedings.

21. NIST. (2018). Framework for Improving Critical Infrastructure Cybersecurity. National Institute of Standards and Technology.

22. Kumbum, P. K., Adari, V. K., Chunduru, V. K., Gonepally, S., & Amuda, K. K. (2020). Artificial intelligence using TOPSIS method. International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 3(6), 4305-4311.

23. O’Dwyer, P., & Connolly, S. (2020). Secure control of power-electronic converters: approaches and challenges. IEEE Transactions on Power Electronics, 35(2), 1216–1228.

24. AZMI, S. K. (2021). Markov Decision Processes with Formal Verification: Mathematical Guarantees for Safe Reinforcement Learning.

25. Alwar Rengarajan, Rajendran Sugumar (2016). Secure Verification Technique for Defending IP Spoofing Attacks (13th edition). International Arab Journal of Information Technology 13 (2):302-309.

26. Sweeney, L., & Malin, B. (2019). Data minimization and retention strategies for secure auditing. Journal of Privacy and Confidentiality, 9(1), Article 3.

Downloads

Published

2023-11-20

How to Cite

Cloud-Native Software Development and Interpretability in Oracle EBS and SAP: AI-Driven Optimization with Safety-Oriented Redundancy Using Markov Decision Processes. (2023). International Journal of Research and Applied Innovations, 6(6), 9850-9855. https://doi.org/10.15662/IJRAI.2023.0606008