Category Archives: Uncategorized

Identity-Aware Network Segmentation Using NSX And Next-Generation Firewalls

Uncategorized

Authors: Naveen Reddy Burramukku

Abstract: Modern enterprise networks are increasingly dynamic, driven by virtualization, cloud adoption, and the proliferation of distributed workloads. Traditional network segmentation approaches, which rely primarily on IP addresses, VLANs, and perimeter-based firewalls, are no longer sufficient to protect against sophisticated cyber threats, particularly those involving lateral movement within the data center. As attackers increasingly exploit compromised credentials and trusted internal access, there is a growing need for security models that are both granular and identity-centric.This research explores the concept of identity-aware network segmentation by integrating VMware NSX microsegmentation with Next-Generation Firewalls (NGFWs) to enforce security policies based on user, application, and workload identities rather than static network parameters. The proposed approach aligns with Zero Trust principles by assuming no implicit trust within the network and enforcing continuous verification of identity and context for every communication flow.The study presents an architectural framework that combines NSX’s distributed firewall capabilities with advanced NGFW features such as deep packet inspection, application identification, and user-based policy enforcement. A controlled virtual testbed is used to evaluate the effectiveness of the proposed model in mitigating east-west traffic threats, reducing attack surfaces, and limiting lateral movement within a virtualized data center environment. Performance impacts, scalability considerations, and operational complexity are also assessed to determine the feasibility of large-scale deployment.Results indicate that identity-aware segmentation significantly enhances internal network security by enabling fine-grained, context-aware policy enforcement without introducing substantial performance degradation. The integration of NSX and NGFW technologies provides improved visibility, simplified policy management, and stronger alignment with modern Zero Trust architectures. This research contributes to the growing body of work on software-defined security by demonstrating how identity-driven controls can be practically implemented to strengthen enterprise network defenses in hybrid and cloud-based environments.

Published by:

SunVolt: A Sustainable Solar-Powered Battery Charger In Rural Off-Grid Communities

Uncategorized

Authors: Rodolfo L. Rabia, Ashley Nicole L. Tizon, Arvey Faith B. Paquibot, Ritchen G. Ibañez, Samuel P. Tabuena, Regine R. Ruallo

Abstract: The objectives of this project were to design and develop SunVolt, a solar-powered battery charging system using an Arduino Uno R3, to address energy shortages and high electricity costs in rural off-grid areas. SunVolt enables efficient solar-powered battery charging to support household and agricultural activities in locations with limited or unstable electricity access. The system integrated a solar panel, lead-acid battery, MPPT charge controller, and sensors that monitor light, temperature, and voltage, managed by the microcontroller. SunVolt independently finds an optimal energy conversion rate, prevents overcharging, and displays visual notifications with performance in real time to the user. Performance testing evaluated daily energy output, charging efficiency, and long-term reliability under real-world conditions. The results demonstrate that SunVolt effectively stores solar energy, meets residential and agricultural energy needs, and remains durable under varying environmental conditions. Overall, SunVolt offers a practical solution for improving energy self-sufficiency, reducing reliance on fossil fuels, and promoting sustainable development in undeserved communities.

DOI: https://doi.org/10.5281/zenodo.18454945

Published by:

Proportional Odds Modelling Of Hiv Infection Among Pregnant Women (A Case Study Of Federal Medical Centre, Owerri).

Uncategorized

Authors: Nwagwu, Glory C, Obasi, Chinedu K, Nduka, Modestus U

Abstract: The HIV virus is a cankerworm that is bedeviling human-kind, with sequel advancement to Acquired Immuno-deficiency Syndrome (AIDS), if not properly managed can have effect on the socio-demographic factors. The study aimed at determining the impact of socio-demographic factors that affects HIV status of pregnant women in Imo state using a Proportional Odds Model. It was discovered that single women within the Age (15-19) years and resident in the rural area were the factors that contributed to the reason why these pregnant women are prone to contacting HIV/AIDS infection in Imo State.

DOI: https://doi.org/10.5281/zenodo.18454133

Published by:

Identity And Access Management In Cloud And On-Prem Infrastructure Environments

Uncategorized

Authors: Naveen Reddy Burramukku

Abstract: Identity and Access Management has become a foundational pillar of modern information security, governing how users, devices, and applications authenticate and gain access to organizational resources. As enterprises increasingly operate across hybrid environments that combine on-prem infrastructure with cloud platforms, the complexity of managing identities and enforcing access controls has grown substantially. Traditional identity models designed for centralized, perimeter-based systems are often inadequate in distributed environments where users access resources from diverse locations and devices. In this context, IAM serves as a critical mechanism for enforcing security policies, maintaining accountability, and reducing the risk of unauthorized access. Cloud computing has introduced new identity paradigms that emphasize federated authentication, dynamic authorization, and service-based identities. These paradigms differ significantly from on-prem identity systems, which typically rely on directory services, static roles, and network-based trust assumptions. Integrating these two models presents both opportunities and challenges, requiring careful alignment of identity lifecycles, access policies, and governance frameworks. Misconfigurations or inconsistencies across environments can lead to privilege escalation, data exposure, and compliance failures. This review examines Identity and Access Management in cloud and on-prem infrastructure environments, focusing on architectural models, authentication mechanisms, authorization strategies, and operational considerations. It explores how IAM technologies have evolved to support hybrid deployments and analyzes common risks associated with identity sprawl, excessive privileges, and fragmented policy enforcement. The article also highlights the role of IAM in enabling modern security approaches such as Zero Trust and least privilege access. By synthesizing established research and industry practices, this review provides a comprehensive understanding of IAM’s role in securing hybrid infrastructures. The discussion aims to assist practitioners, researchers, and decision-makers in designing IAM strategies that balance security, usability, and scalability across diverse deployment models.

 

 

Published by:

Artificial Intelligence In Cybersecurity: A Comprehensive Survey

Uncategorized

Authors: Hansikaa M

Abstract: The rapid growth of digital technologies and interconnected systems has greatly increased the complexity and scale of cyber threats. Traditional cybersecurity methods, which depend on predefined rules and signature-based detection, often have difficulty identifying advanced, dynamic, and new attacks. In this situation, artificial intelligence has emerged as a powerful tool for improving cybersecurity by enabling smart, flexible, and automated defence systems. This research offers a thorough look at how artificial intelligence is used in cybersecurity, focusing on machine learning, deep learning, and anomaly detection techniques for identifying and responding to threats. The study reviews current security methods, examines their weaknesses, and discusses how AI-driven approaches enhance detection accuracy, lower false positives, and support proactive security management. An AI-based cybersecurity framework is also presented to show how smart models can work with security monitoring, data processing, and automated response features. The effectiveness of AI-based cybersecurity solutions is assessed through performance analysis and discussions of experimental results, highlighting improvements in real-time threat detection and system efficiency. Additionally, the research explores important application areas, challenges, and future directions, including explainable artificial intelligence, privacy-preserving learning, and autonomous security operations. Overall, this study emphasizes the important role of artificial intelligence in strengthening modern cybersecurity systems and underscores its potential to tackle evolving cyber threats through ongoing learning and smart decision-making.

Published by:

AI–Powered Interview System Based On Resume Analysiss

Uncategorized

Authors: Ms. Nirzhara Suryawanshi, Ms. Manasi Patange, Ms. Pallavi Thakare, Ms. Harshada Sonar, Mrs Samiksha Gawali

Abstract: The AI-Powered Interview System Based on Resume Analysis is an intelligent and interactive platform designed to enhance students’ interview preparation through automation and personalized evaluation. The system enables users to upload their resumes, which are then processed using Natural Language Processing (NLP) techniques to extract key skills, academic achievements, and relevant experience. Based on this analysis, the system dynamically generates field-specific interview questions tailored to the candidate’s profile. To simulate a realistic interview environment, the platform incorporates voice-based interaction using speech-to-text and text-to-speech technologies. Users respond to questions through audio, and the system evaluates their answers in real time using NLP- based answer analysis. The system further provides performance ratings, personalized feedback, and improvement suggestions, helping candidates identify their strengths and areas of development.

DOI: https://doi.org/10.5281/zenodo.18448371

Published by:

An Empirical And Analytical Study Of Risk–Return Relationship In Equity Investments.

Uncategorized

Authors: P. Vijetha, Sk Maqbool basha

Abstract: The risk–return relationship is a fundamental concept in finance, guiding investment decisions and portfolio management. This study empirically examines the relationship between risk and return among 10 actively traded equity stocks over a five-year period (2019–2024). Both systematic risk (beta) and total risk measures (standard deviation and variance) are analyzed to determine their influence on equity returns. Secondary data from NSE, BSE, and financial databases were used, and statistical techniques including descriptive statistics, correlation analysis, regression analysis, and t-tests were employed. The findings reveal a positive and statistically significant relationship between risk and return, with beta emerging as the strongest predictor. Regression results indicate that risk measures collectively explain over 50% of the variance in returns. The study validates the traditional risk–return tradeoff and highlights the importance of incorporating multiple risk metrics for informed investment decisions. Implications for investors, portfolio managers, and policymakers are discussed, emphasizing strategies for optimizing returns while managing risk in dynamic equity markets.

Published by:

The “How Much” Vs. “How Bad”: Impact Of Quantitative,Hyper-Personalized Moderation Advice On User Comprehension And Dietary Intent

Uncategorized

Authors: Vishal Singh, Hemant Singh, Ajay Rawat, Shivam Kumar Jha

Abstract: Nutrition-analysis applications traditionally provide qualitative, binary guidance such as “healthy,” “unhealthy,” or “avoid.” However, recent advances in generative artificial intelligence (AI) enable hyper-personalized, quantitative moderation advice that recommends specific serving sizes, risk thresholds, and actionable alternatives. This paper investigates whether quantitative, personalized recommendations enhance user comprehension, confidence, and dietary intent compared to generic, qualitative warnings. We conduct a randomized controlled A/B user study with 100 participants and compare a qualitative control interface against a quantitative, generative-AI- powered interface offering explicit serving guidance and alternatives. Results show that quantitative moderation advice significantly improves comprehension accuracy, user confidence, trust, and positive dietary intent. These findings provide strong HCI evidence supporting the integration of precise, personalized guidance in digital nutrition applications.

Published by:

Early Detection Of Unrecoverable Loans Using Machine Learning On Nepal Rastra Bank N002 Regulatory Data

Uncategorized

Authors: Krishna Prisad Bajgai, Dr. Bhoj Raj Ghimire

Abstract: Early identification of unrecoverable loans is a critical requirement for financial institutions to maintain portfolio quality, comply with regulatory provisioning standards, and minimize credit losses. In Nepal, microfinance institutions and banks are mandated to report loan performance using the Nepal Rastra Bank (NRB) N002 monitoring framework, which contains borrower demographics, loan characteristics, delinquency behavior, and provisioning information. Despite the availability of structured regulatory data, most institutions continue to rely on rule-based aging mechanisms that fail to capture complex nonlinear risk patterns. This study proposes a machine learning-based framework for predicting unrecoverable loans using NRB N002-compliant datasets. A supervised classification problem is formulated, where loans are labeled as unrecoverable based on regulatory delinquency thresholds (Days Past Due >180 or Provision ≥50%). Three models—Logistic Regression, Random Forest, and Extreme Gradient Boosting (XGBoost)—are implemented and evaluated using recall, precision, F1-score, and ROC-AUC metrics, with special emphasis on recall to minimize false negatives in high-risk loan identification. Experimental results demonstrate that XGBoost achieves superior performance with near-perfect recall for unrecoverable loans and an ROC-AUC exceeding 0.97, significantly outperforming traditional statistical approaches. Explainability is ensured using SHAP-based feature attribution. highlighting delinquency duration, overdue principal, outstanding exposure, and provisioning ratios as dominant predictors. The findings confirm that machine learning models can substantially enhance early warning credit risk systems within Nepalese financial institutions while maintaining regulatory transparency and operational interpretability.

DOI: https://doi.org/10.5281/zenodo.18440690

 

Published by:

RfID Door Lock Using Arduino

Uncategorized

Authors: Sahil Shinde, Pushkar Rahane, Sudarshan Suryavanshi, Krishna Tayde, Prof. Bhagawat S. Mohite

Abstract: This research Security is a major concern in homes, offices, and restricted areas. Traditional lock systems using mechanical keys have limitations such as key loss, duplication, and lack of access control. To overcome these issu es, this project presents the design and implementation of an RFID Door Lock using Arduino. The proposed system uses Radio Frequency Identification (RFID) technology to allow only authorized users to access the door. An RFID reader reads the unique ID of the RFID card or tag and sends it to the Arduino microco ntroller. The Arduino compares the scanned ID with the pre-stored authorized IDs. If the ID matches, the system.

 

 

Published by:
× How can I help you?