QUANTUM-INFUSED BLOCKCHAIN: A REVIEW OF CHALLENGES, OPPORTUNITIES, AND EMERGING ARCHITECTURES

ABSTRACT The union of blockchain technology and quantum computing represents a break from secure and decentralised digital platforms. Blockchain provides transparency, immutability, and distributed trust but is increasingly exposed to quantum attacks, especially those aimed at classical cryptographic systems. This review consolidates current advances and challenges where these two paradigms intersect and discusses how quantum

MICO ARTEFACT: DEVELOPMENT OF COMPONENTS FOR THE MACHINE INTELLIGENCE SUITE

ABSTRACT This paper delineates the framework of Machine Intelligence Cyber Operations (MICO), which synthesises elements of cybersecurity with advancements in machine intelligence to augment Offensive Cyber Operations (OCO) substantially. The convergence of these two domains seeks to enhance cyber operations’ effectiveness and strategic capacities, thereby contributing to a more resilient defence against contemporary cyber threats.

PERFORMANCE EVALUATION OF THE SECURE AND INTEGRATED ENCRYPTION MODEL (SHIELD)

ABSTRACT The rise of cloud computing has highlighted the need for strong data security and privacy. This study evaluates the Secure and Integrated Encryption Model (SHIELD), designed to enhance public cloud security. SHIELD uses optimized hybrid encryption (256-bit AES and 2048-bit RSA), real-time OTP authentication, Role-Based Access Control (RBAC), and auditing tools. Developed in Python

NELA: AN AI-POWERED RAG-BASED HEALTH ADVISORY SYSTEM FOR REAL-TIME DIAGNOSTICS AND PERSONALIZED HEALTHCARE

ABSTRACT Current healthcare systems struggle with delayed diagnostics and generic treatment plans. This paper introduces NELA, a Retrieval-Augmented Generation (RAG)-based AI system designed for real-time, evidence-driven health advisory services. Our system integrates diverse datasets by combining synthetic data from ChatGPT GenMedGPT-5k and HealthCareMagic.com with real-world patient interactions to enhance diagnostic accuracy and relevance. NELA generates

PERFORMANCE EVALUATION OF ROUTING TABLE OVERLOAD ATTACK IN RPL-BASED IOT NETWORK

ABSTRACT The IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL), which is widely used in IoT networks, is vulnerable to Routing Table Overload Attacks (RTOA) in storage mode. These attacks exploit memory constraints by inserting bogus DAO messages, resulting in routing table saturation and performance deterioration. This study runs extensive simulations with a Python-based

TWO-STAGE FINE-TUNING OF PRETRAINED CNN MODELS FOR MULTICLASS LUNG CANCER CLASSIFICATION USING CT SCANS

ABSTRACT Detection of lung cancer at its early stage using CT images can significantly enhance diagnosis and treatment outcomes. This study implements a two-phase approach to fine-tune five pretrained CNN models – VGG19, ResNet50, InceptionV3, DenseNet121, and EfficientNetB0 – for the classification of lung CT scans into benign, malignant, and normal categories. In Stage 1,

THE ROLE OF CYBER THREAT INTELLIGENCE SHARING IN PREVENTING ATTACKS: CHALLENGES AND BEST PRACTICES

ABSTRACT Cyber threats are evolving at a very rapid pace, with hackers using more sophisticated methods that have a penchant to bypass conventional security mechanisms. The financial burden of cybercrime will be $10.5 trillion annually in 2025, and hence, proactive cybersecurity is the need of the hour. Cyber Threat Intelligence (CTI) sharing is currently an

THE RIGHT TO BE FORGOTTEN IN THE AGE OF AI: ADDRESSING DATA PRIVACY COMPLIANCE IN AI-INTEGRATED IT SYSTEMS

ABSTRACT The Right to be Forgotten (RTBF) is an important right of data subjects enshrined in data privacy laws. However, the integration of Artificial Intelligence (AI) into different applications raises concerns about enforcement. AI-integrated systems collect and retain personal data for continuous improvement. This study analyzed provisions in the GDPR and Nigeria Data Protection Act

SECURE DECENTRALIZED APPLICATIONS CRYPTOSYSTEM WITH SOONER-LIGHTWEIGHT CRYPTOGRAPHIC SCHEMES

ABSTRACT Blockchain technology is a disruptive technology, and renowned for their strong cryptography and encryption algorithms but, susceptible to Quantum Computing (QS). Several improvements (such as block hash size, encryption/decryption time, key generation sizes, and transaction delays) are to be performed on its traditional cryptography to support decentralized applications (DAPPs) and overcome threats of QS.

REINFORCEMENT LEARNING-BASED FRAMEWORK FOR EVALUATING AND ENHANCING TEACHER PERFORMANCE

ABSTRACT Artificial Intelligence (AI) transforms education by enabling intelligent systems that support personalized learning, streamline administrative tasks, and enhance instructional delivery. Teacher performance, which is central to effective learning, is often evaluated through static and subjective methods that lack adaptability to classroom dynamics. The study proposes a reinforcement learning based framework for evaluating and enhancing