Volume 6 Issue 12 2024

Serial: 1

IMPLEMENTATION OF LOW POWER AND HIGH ACCURACY 2D FIR FILTER USING APPROXIMATE MULTIPLIER FOR IMAGE PROCESSING APPLICATIONS

Authors: Merfeena, Shanubha Mari Jero, Dyana Christilda
Page No: 1-18
Merfeena, Shanubha Mari Jero, Dyana Christilda. IMPLEMENTATION OF LOW POWER AND HIGH ACCURACY 2D FIR FILTER USING APPROXIMATE MULTIPLIER FOR IMAGE PROCESSING APPLICATIONS. 1-18. http://journalcybersecurity.com/wp-content/uploads/1-Dec-2024.pdf
Serial: 2

Automatic Medicine Dispatcher Using Tele-Monitoring System

Authors: SOFIA R
Page No: 1-5
SOFIA R. Automatic Medicine Dispatcher Using Tele-Monitoring System. 1-5. http://journalcybersecurity.com/wp-content/uploads/2-Dec-2024.pdf
Serial: 3

PV –STATCOM –A SMART INVERTER IN DISTRIBUTION SYSTEM USING PARKS TRANSFORMATION

Authors: Mr.D.Muruganandhan, Mr.J.Vijayaraghavan
Page No: 1-7
Mr.D.Muruganandhan, Mr.J.Vijayaraghavan. PV –STATCOM –A SMART INVERTER IN DISTRIBUTION SYSTEM USING PARKS TRANSFORMATION. 1-7. http://journalcybersecurity.com/wp-content/uploads/3-Dec-2024.pdf
Serial: 4

Visualizing Sorting Algorithms with ReactJS: Merge Sort and Quick Sort Demystified

Authors: Dr. Neha Gupta, Prateet Mishra, Khyati Patel, Palak Gandhi, Mustafa Panjiwala
Page No: 1-9
Dr. Neha Gupta, Prateet Mishra, Khyati Patel, Palak Gandhi, Mustafa Panjiwala. Visualizing Sorting Algorithms with ReactJS: Merge Sort and Quick Sort Demystified. 1-9. http://journalcybersecurity.com/wp-content/uploads/4-Dec-2024.pdf
Serial: 5

AUTOMATIC MEDICAL DISPATCHER WITH DYNAMIC TELE-MONITORING SYSTEM

Authors: S. Rajkumar, Dr.K.Sedhuraman, S.Kamali, S.Sowjanya, C.Hemalatha
Page No: 1-7
S. Rajkumar, Dr.K.Sedhuraman, S.Kamali, S.Sowjanya, C.Hemalatha. AUTOMATIC MEDICAL DISPATCHER WITH DYNAMIC TELE-MONITORING SYSTEM. 1-7. http://journalcybersecurity.com/wp-content/uploads/5-Dec-2024.pdf
Serial: 6

An Improved Boost Charge Inverter Circuit for PV Application without Static Device

Authors: R.Muthunagai
Page No: 1-12
R.Muthunagai. An Improved Boost Charge Inverter Circuit for PV Application without Static Device. 1-12. http://journalcybersecurity.com/wp-content/uploads/6-Dec-2024.pdf
Serial: 7

Multi-Purpose Potential of RFID Technology for Access Control, Asset Tracking, and SOS Messaging Integration

Authors: BASKARAN.A, VISHNU.S, ARUNMOZHI.S
Page No: 1-7
BASKARAN.A, VISHNU.S, ARUNMOZHI.S. Multi-Purpose Potential of RFID Technology for Access Control, Asset Tracking, and SOS Messaging Integration. 1-7. http://journalcybersecurity.com/wp-content/uploads/7-Dec-2024.pdf
Serial: 8

Advanced Dual Boost Inverter with High Voltage Gain DC to DC topology for PV Applications

Authors: Priya.R, Mr.N.Amarabalan, R.Revathy
Page No: 1-13
Priya.R, Mr.N.Amarabalan, R.Revathy. Advanced Dual Boost Inverter with High Voltage Gain DC to DC topology for PV Applications. 1-13. http://journalcybersecurity.com/wp-content/uploads/8-Dec-2024.pdf
Serial: 9

Exploring the Power of BART and BERT: Context Similarity and Extraction in NLP

Authors: Hitakshi Chellani, Saurav Singh, Saurav Singh, Devendra Chouhan
Page No: 1-9
Hitakshi Chellani, Saurav Singh, Saurav Singh, Devendra Chouhan. Exploring the Power of BART and BERT: Context Similarity and Extraction in NLP. 1-9. http://journalcybersecurity.com/wp-content/uploads/9-Dec-2024.pdf
Serial: 10

Comparison of Similarity Measure Using Density Peak Clustering For Collaborative Filtering Techniques

Authors: Dr. S. Shajun Nisha, B.Rajeswari
Page No: 1-10
Dr. S. Shajun Nisha, B.Rajeswari. Comparison of Similarity Measure Using Density Peak Clustering For Collaborative Filtering Techniques. 1-10. http://journalcybersecurity.com/wp-content/uploads/10-Dec-2024.pdf
Serial: 11

IoT and ML Based VM Scheduling Mechanism for Mitigating DDoS Attacks in Cloud Environments

Authors: Dr. Rethishkumar S, Dr.R.Vijayakumar
Page No: 1-9
View Abstract
The increasing adoption of Internet of Things (IoT) devices has transformed the landscape of cloud computing while simultaneously introducing serious cybersecurity challenges, especially Distributed Denial-of-Service (DDoS) attacks. Traditional Virtual Machine (VM) scheduling algorithms in cloud infrastructures are not designed to handle the dynamic and unpredictable nature of such attacks. This research introduces an IoT-based hybrid Machine Learning (ML) scheduling mechanism combining Random Forest (RF) and Long Short-Term Memory (LSTM) networks to detect, predict, and mitigate DDoS attacks proactively. The model leverages the classification efficiency of RF with the temporal prediction capability of LSTM, enabling adaptive VM resource allocation. Theoretical evaluation demonstrates enhanced detection accuracy, reduced latency, and optimal resource utilization compared to conventional scheduling mechanisms, establishing the framework’s potential for resilient IoT-cloud ecosystems.
Year: 2024
Journal: Research paper
Vol/Issue: 6 (12)
Dr. Rethishkumar S, Dr.R.Vijayakumar (2024). IoT and ML Based VM Scheduling Mechanism for Mitigating DDoS Attacks in Cloud Environments. Research paper, 6(12), 1-9. http://journalcybersecurity.com/wp-content/uploads/11-Dec-2024.pdf
Serial: 12

Implications of the Russia-Ukraine War on the Emergence of the Second Cold War

Authors: Emmanuel Chukwuma Okwara PhD, Roberts Anya Nkata PhD
Page No: 1-27
View Abstract
Russia's invasion of Ukraine in February 2022 marks the most violent interstate conflict since the US invasions of Iraq and Afghanistan in 2001 and 2003, respectively. This study seeks to examine the implications of the Russian-Ukraine War on the emergence of the Second Cold War. The data for this study were obtained from secondary sources, namely textbooks, journals, and internet sources. Moreover, qualitative content analysis was used to analyse data collected. This study revealed that the Second Cold War brought turmoil and created an atmosphere of fear and uncertainty among the weak and insecure countries of the world. Again, the Russia-Ukraine War is likewise a proxy war for the Western alliance. The study further revealed that if Russia wins, it would destabilise the rules-based global order and send a signal that revisionist countries—or any power—may attack another sovereign state or violate international law with little repercussions. Also, a Russian victory would let Putin continue his expansionist agenda into Georgia, Moldova, Poland, and Belarus, presumably leading to the expansion of European and global defence capabilities. It might potentially spark a second arms race, incentivising non-nuclear governments to develop their own programs. In sum, a Russian triumph would destroy the rules-based order and usher in an unpredictable future. Finally, this study recommended that the United Nations General Assembly should put more pressure on both Russia and Ukraine for a permanent cease-fire.
Year: 2024
Journal: Research Paper
Vol/Issue: 6 (12)
Emmanuel Chukwuma Okwara PhD, Roberts Anya Nkata PhD (2024). Implications of the Russia-Ukraine War on the Emergence of the Second Cold War. Research Paper, 6(12), 1-27. https://doi.org/10.5281/zenodo.19145419
Serial: 13

From Import Dependency to Strategic Autonomy: A Critical Appraisal of Nigeria’s Defence Industrialisation (DICON) and Local Content Policy

Authors: Emmanuel Chukwuma Okwara PhD, Roberts Anya Nkata PhD
Page No: 1-13
View Abstract
For decades, the national security architecture in Nigeria has been characterized by debilitating over-reliance on foreign military equipment, a factor which has had significant implications for the nation’s strategic autonomy and financial stability. It is within this context that the Defence Industries Corporation of Nigeria (DICON) was founded in 1964 to address the over-reliance on foreign equipment, since its inception, the organization has been struggling to evolve into a vibrant industrial base to address the complex security needs of the nation. This study is a critical appraisal of the defense industrialization efforts in Nigeria, with particular emphasis on the operational capabilities of DICON and the effectiveness of the Local Content Policy in the defense sector. The study identified the major hurdles, including technology, bureaucracy, and funding, which have hindered the nation’s progress towards self-reliance. This study is premised on the dependency theory. The study asserts that the legislative framework, including the Local Content Policy, is critical in providing the roadmap towards self-reliance, but its implementation has been hindered by the absence of political will to drive the process, coupled with the failure to engage the private sector. The study asserts that the key to self-reliance is the paradigm shift from mere assembling to intrinsic manufacturing, which requires significant investments in research and development, coupled with strategic foreign collaborations to access technology. Overall, the study finds that defense industrialization is not only critical to the security of the nation but also to its sovereignty, given the geopolitics of the contemporary world.
Year: 2024
Journal: Research Paper
Vol/Issue: 6 (12)
Emmanuel Chukwuma Okwara PhD, Roberts Anya Nkata PhD (2024). From Import Dependency to Strategic Autonomy: A Critical Appraisal of Nigeria’s Defence Industrialisation (DICON) and Local Content Policy. Research Paper, 6(12), 1-13. https://doi.org/10.5281/zenodo.19145522
Serial: 14

Global Military Expenditure and Development Trade-offs, 2000-2023

Authors: Innocent Jooji
Page No: 1-14
View Abstract
As geopolitical tensions escalate, global military expenditure has climbed to staggering new heights, reshaping national priorities worldwide. However, this surge in defense spending carries a profound human cost that extends far beyond the battlefield. This paper examines the critical trade-offs between massive investment in warfare and the essential needs of human development. At its heart, this analysis addresses the classic "guns versus butter" dilemma: the reality that every dollar diverted to weaponry is a dollar withheld from healthcare, education, and climate resilience. While the imperative of national security is undeniable, the opportunity costs of this arms race are becoming unsustainable. For developing nations, heavy militarization often cannibalizes resources desperately needed for infrastructure and social safety nets, trapping populations in cycles of poverty and inequality. Yet, even in wealthy economies, bloated defense budgets stifle the investment required to tackle modern existential threats, such as pandemics and ecological collapse. This study argues that the relentless pursuit of military supremacy often creates a false sense of security at the expense of long-term stability. By prioritizing state power over human well-being, governments risk eroding the very foundations of the societies they aim to protect. On the whole, fostering genuine peace requires a paradigm shift that is redefining security not by the size of our arsenals, but by the health, education, and dignity of the people living within them.
Year: 2024
Journal: Research Paper
Vol/Issue: 6 (12)
Innocent Jooji (2024). Global Military Expenditure and Development Trade-offs, 2000-2023. Research Paper, 6(12), 1-14. https://doi.org/10.5281/zenodo.19394400
Scroll to Top