IMPLEMENTATION OF LOW POWER AND HIGH ACCURACY 2D FIR FILTER USING APPROXIMATE MULTIPLIER FOR IMAGE PROCESSING APPLICATIONS
Merfeena, Shanubha Mari Jero, Dyana Christilda. IMPLEMENTATION OF LOW POWER AND HIGH ACCURACY 2D FIR FILTER USING APPROXIMATE MULTIPLIER FOR IMAGE PROCESSING APPLICATIONS. 1-18. http://journalcybersecurity.com/wp-content/uploads/1-Dec-2024.pdf
Automatic Medicine Dispatcher Using Tele-Monitoring System
SOFIA R. Automatic Medicine Dispatcher Using Tele-Monitoring System. 1-5. http://journalcybersecurity.com/wp-content/uploads/2-Dec-2024.pdf
PV –STATCOM –A SMART INVERTER IN DISTRIBUTION SYSTEM USING PARKS TRANSFORMATION
Mr.D.Muruganandhan, Mr.J.Vijayaraghavan. PV –STATCOM –A SMART INVERTER IN DISTRIBUTION SYSTEM USING PARKS TRANSFORMATION. 1-7. http://journalcybersecurity.com/wp-content/uploads/3-Dec-2024.pdf
Visualizing Sorting Algorithms with ReactJS: Merge Sort and Quick Sort Demystified
Dr. Neha Gupta, Prateet Mishra, Khyati Patel, Palak Gandhi, Mustafa Panjiwala. Visualizing Sorting Algorithms with ReactJS: Merge Sort and Quick Sort Demystified. 1-9. http://journalcybersecurity.com/wp-content/uploads/4-Dec-2024.pdf
AUTOMATIC MEDICAL DISPATCHER WITH DYNAMIC TELE-MONITORING SYSTEM
S. Rajkumar, Dr.K.Sedhuraman, S.Kamali, S.Sowjanya, C.Hemalatha. AUTOMATIC MEDICAL DISPATCHER WITH DYNAMIC TELE-MONITORING SYSTEM. 1-7. http://journalcybersecurity.com/wp-content/uploads/5-Dec-2024.pdf
An Improved Boost Charge Inverter Circuit for PV Application without Static Device
R.Muthunagai. An Improved Boost Charge Inverter Circuit for PV Application without Static Device. 1-12. http://journalcybersecurity.com/wp-content/uploads/6-Dec-2024.pdf
Multi-Purpose Potential of RFID Technology for Access Control, Asset Tracking, and SOS Messaging Integration
BASKARAN.A, VISHNU.S, ARUNMOZHI.S. Multi-Purpose Potential of RFID Technology for Access Control, Asset Tracking, and SOS Messaging Integration. 1-7. http://journalcybersecurity.com/wp-content/uploads/7-Dec-2024.pdf
Advanced Dual Boost Inverter with High Voltage Gain DC to DC topology for PV Applications
Priya.R, Mr.N.Amarabalan, R.Revathy. Advanced Dual Boost Inverter with High Voltage Gain DC to DC topology for PV Applications. 1-13. http://journalcybersecurity.com/wp-content/uploads/8-Dec-2024.pdf
Exploring the Power of BART and BERT: Context Similarity and Extraction in NLP
Hitakshi Chellani, Saurav Singh, Saurav Singh, Devendra Chouhan. Exploring the Power of BART and BERT: Context Similarity and Extraction in NLP. 1-9. http://journalcybersecurity.com/wp-content/uploads/9-Dec-2024.pdf
Comparison of Similarity Measure Using Density Peak Clustering For Collaborative Filtering Techniques
Dr. S. Shajun Nisha, B.Rajeswari. Comparison of Similarity Measure Using Density Peak Clustering For Collaborative Filtering Techniques. 1-10. http://journalcybersecurity.com/wp-content/uploads/10-Dec-2024.pdf
IoT and ML Based VM Scheduling Mechanism for Mitigating DDoS Attacks in Cloud Environments
The increasing adoption of Internet of Things (IoT) devices has transformed the landscape of cloud computing while simultaneously introducing serious cybersecurity challenges, especially Distributed Denial-of-Service (DDoS) attacks. Traditional Virtual Machine (VM) scheduling algorithms in cloud infrastructures are not designed to handle the dynamic and unpredictable nature of such attacks. This research introduces an IoT-based hybrid Machine Learning (ML) scheduling mechanism combining Random Forest (RF) and Long Short-Term Memory (LSTM) networks to detect, predict, and mitigate DDoS attacks proactively. The model leverages the classification efficiency of RF with the temporal prediction capability of LSTM, enabling adaptive VM resource allocation. Theoretical evaluation demonstrates enhanced detection accuracy, reduced latency, and optimal resource utilization compared to conventional scheduling mechanisms, establishing the framework’s potential for resilient IoT-cloud ecosystems.
Dr. Rethishkumar S, Dr.R.Vijayakumar (2024). IoT and ML Based VM Scheduling Mechanism for Mitigating DDoS Attacks in Cloud Environments. Research paper, 6(12), 1-9. http://journalcybersecurity.com/wp-content/uploads/11-Dec-2024.pdf

