Archive

CLOUD-BASED SECURITY APPROACHES FOR SAFEGUARDING IOT ENVIRONMENTS AND DEVICES

Authors:

M. Hafiz Yusoff, Belal alifan, Waheed Ali H. M. Ghanem, Syarilla Iryani Ahmad Saany, Julaily Aida Jusoh, Yousef A. Baker El-Ebiary

DOI NO:

https://doi.org/10.26782/jmcms.2026.01.00001

Abstract:

Introduction: The widespread adoption of Internet of Things (IoT) devices has transformed multiple industries, enhancing operational efficiency and convenience. However, the rapid expansion of IoT ecosystems also brings forth significant security challenges. Traditional security frameworks often fail to adequately protect these systems due to their large scale, diversity, and limited resources. In response, cloud-based security solutions have emerged as a promising alternative, offering centralized management, advanced authentication techniques, and real-time threat monitoring. Problem Statement: IoT environments are vulnerable to various security risks, including unauthorized access, data breaches, and device manipulation. Existing security mechanisms often fall short when it comes to defending against sophisticated cyber-attacks targeting IoT devices and networks. The resource-constrained nature of many IoT devices further limits the implementation of robust local security measures. As a result, there is an urgent need for effective, cloud-based security solutions designed specifically for the unique demands of IoT systems. Objective: This research aims to explore the effectiveness of cloud-based security solutions in mitigating the security challenges faced by IoT environments and devices. The study focuses on evaluating the performance of cloud-based authentication mechanisms, intrusion detection systems, and encryption techniques in strengthening the security and privacy of IoT ecosystems. Methodology: A comprehensive approach is employed, combining a literature review, case studies, and empirical research to assess the current landscape of IoT security in smart environments. Data collection includes unstructured interviews with industry experts and stakeholders, offering insights into current practices and emerging security trends. The research framework incorporates threat modeling, risk assessments, and the development of proactive security strategies. Results: Initial findings indicate that cloud-based security solutions offer several benefits for protecting IoT environments and devices. Centralized management enhances integration and scalability, while advanced authentication methods, such as multi-factor and biometric authentication, improve access control. Real-time threat detection and response capabilities further bolster security by enabling timely interventions to prevent breaches and attacks. Conclusion: Cloud-based security solutions present a highly effective approach to addressing the unique security concerns of IoT environments and devices. By leveraging the scalability, flexibility, and computational power of cloud platforms, organizations can enhance the resilience of their IoT deployments against evolving cyber threats. However, further research is needed to optimize cloud-based security tools to better serve diverse IoT applications and use cases.

Keywords:

Internet of Things (IoT),Security Solutions,Authentication,Intrusion Detection,Data Encryption,Cloud Computing,

References:

I. A. Greeni, et al. “BrainLang DL: A Deep Learning Approach to FMRI for Unveiling Neural Correlates of Language across Cultures” International Journal of Advanced Computer Science and Applications (IJACSA), 15(6), 2024. 10.14569/IJACSA.2024.01506114
II. Ahmad Saany, S. I., et al. “Exploitation of a Technique in Arranging an Islamic Funeral.” Proceedings of the 2nd International Conference on Smart Computing and Electronic Enterprise (ICSCEE), IEEE, 2021, pp. 1–8. 10.1109/ICSCEE50312.2021.9498224
III. Ali, M. A., and M. S. Hossain. “Cloud-Assisted Privacy-Preserving Data Integrity Verification Scheme for IoT Devices.” IEEE Internet of Things Journal, vol. 8, no. 12, 2021, pp. 10177–10186. 10.1109/JIOT.2021.3113780
IV. Ali, S. A., M. Ansari, and M. Alam. “Resource Management Techniques for Cloud-Based IoT Environment.” Internet of Things (IoT) Concepts and Applications, Springer, 2020, pp. 63–87. 10.1007/978-3-030-33596-0_4
V. Alrawais, A., A. Alhothaily, and C. Hu. “Secure and Lightweight Data Sharing Scheme for IoT Devices in Cloud Computing Environments.” IEEE Internet of Things Journal, vol. 10, no. 1, 2023, pp. 580–587. 10.1109/JIOT.2022.3147475
VI. Al-Sammarraie, N. A., Y. M. H. Al-Mayali, and Y. A. Baker El-Ebiary. “Classification and Diagnosis Using Back Propagation Artificial Neural Networks (ANN).” Proceedings of the International Conference on Smart Computing and Electronic Enterprise (ICSCEE), IEEE, 2018, pp. 1–5. 10.1109/ICSCEE.2018.8538383
VII. Altrad, et al. “Amazon in Business to Customers and Overcoming Obstacles.” Proceedings of the 2nd International Conference on Smart Computing and Electronic Enterprise (ICSCEE), IEEE, 2021, pp. 175–179. 10.1109/ICSCEE50312.2021.9498129
VIII. Anna Gustina Zainal, et al. “Cross-Cultural Language Proficiency Scaling using Transformer and Attention Mechanism Hybrid Model” International Journal of Advanced Computer Science and Applications (IJACSA), 15(6), 2024. 10.14569/IJACSA.2024.01506116
IX. Anushree A., et al. “Real-time Air Quality Monitoring in Smart Cities using IoT-enabled Advanced Optical Sensors” International Journal of Advanced Computer Science and Applications (IJACSA), 15(4), 2024. 10.14569/IJACSA.2024.0150487
X. Antonius, Franciskus, et al. “Incorporating Natural Language Processing into Virtual Assistants: An Intelligent Assessment Strategy for Enhancing Language Comprehension.” International Journal of Advanced Computer Science and Applications, vol. 14, no. 10, 2023. 10.14569/IJACSA.2023.0141079
XI. Araddhana Arvind Deshmukh, et al. “Event-based Smart Contracts for Automated Claims Processing and Payouts in Smart Insurance” International Journal of Advanced Computer Science and Applications (IJACSA), 15(4), 2024. 10.14569/IJACSA.2024.0150486
XII. Aradhana Sahu, et al. “Federated LSTM Model for Enhanced Anomaly Detection in Cyber Security: A Novel Approach for Distributed Threat” International Journal of Advanced Computer Science and Applications (IJACSA), 15(6), 2024. 10.14569/IJACSA.2024.01506125
XIII. Arifuzzaman, M., M. Alazab, and J. Bailey. “Security and Privacy Issues in IoT-Based Healthcare Clouds: A Comprehensive Survey.” IEEE Access, vol. 5, 2017, pp. 18414–18431. 10.1109/ACCESS.2017.2753445
XIV. Babu, S. M., A. J. Lakshmi, and B. T. Rao. “A Study on Cloud Based Internet of Things: CloudIoT.” Proceedings of the Global Conference on Communication Technologies (GCCT), IEEE, 2015, pp. 60–65. 10.1109/GCCT.2015.7342681
XV. Baker El-Ebiary, Y. A. “The Effect of Organizational Factors, Technology, and Social Influences on E-Government Adoption in Jordan.” Proceedings of the International Conference on Smart Computing and Electronic Enterprise (ICSCEE), IEEE, 2018, pp. 1–4. 10.1109/ICSCEE.2018.8538394
XVI. Baker El-Ebiary, Y. A., et al. “Blockchain as a Decentralized Communication Tool for Sustainable Development.” Proceedings of ICSCEE 2021, IEEE, 2021, pp. 127–133. 10.1109/ICSCEE50312.2021.9497910
XVII. Baker El-Ebiary, Y. A., et al. “Determinants of Customer Purchase Intention Using Zalora Mobile Commerce Application.” Proceedings of ICSCEE 2021, IEEE, 2021, pp. 159–163. 10.1109/ICSCEE50312.2021.9497995
XVIII. Baker El-Ebiary, Y. A., et al. “E-Government and E-Commerce Issues in Malaysia.” Proceedings of ICSCEE 2021, IEEE, 2021, pp. 153–158. https://doi.org/10.1109/ICSCEE50312.2021.9498092
XIX. Baker El-Ebiary, Y. A., et al. “Mobile Commerce and Its Apps: Opportunities and Threats in Malaysia.” Proceedings of ICSCEE 2021, IEEE, 2021, pp. 180–185. 10.1109/ICSCEE50312.2021.9498228
XX. Baker El-Ebiary, Y. A., et al. “Track Home Maintenance Business Centers with GPS Technology in the IR 4.0 Era.” Proceedings of ICSCEE 2021, IEEE, 2021, pp. 134–138. 10.1109/ICSCEE50312.2021.9498070
XXI. Bamansoor, S., et al. “Efficient Online Shopping Platforms in Southeast Asia.” Proceedings of ICSCEE 2021, IEEE, 2021, pp. 164–168. 10.1109/ICSCEE50312.2021.9497901
XXII. Bamansoor, S., et al. “Evaluation of Chinese Electronic Enterprise from Business and Customers Perspectives.” Proceedings of ICSCEE 2021, IEEE, 2021, pp. 169–174. 10.1109/ICSCEE50312.2021.9498093
XXIII. Choo, K. K. R., P. Vinod, and E. Rokon. “Security and Privacy in Cloud-Assisted Internet of Things (IoT): A Survey.” IEEE Communications Surveys & Tutorials, vol. 22, no. 1, 2020, pp. 447–469. 10.1109/COMST.2019.2935802
XXIV. Deeba, K., et al. “Optimizing Crop Yield Prediction in Precision Agriculture with Hyperspectral Imaging-Unmixing and Deep Learning.” International Journal of Advanced Computer Science and Applications, vol. 14, no. 12, 2023. 10.14569/IJACSA.2023.0141261
XXV. Farooq, M. O., F. K. Hussain, and M. B. Amin. “Cloud-Based Security and Privacy Preserving Mechanisms for IoT Systems: A Survey.” IEEE Access, vol. 6, 2018, pp. 16592–16629. 10.1109/ACCESS.2018.2814178
XXVI. Ganesh Khekare, et al. “Optimizing Network Security and Performance Through the Integration of Hybrid GAN-RNN Models in SDN-Based Access Control.” International Journal of Advanced Computer Science and Applications, vol. 14, no. 12, 2023. 10.14569/IJACSA.2023.0141262
XXVII. Gharaibeh, A., A. Khreishah, and I. Khalil. “A Survey of Techniques for IoT Communication, Security, and Privacy.” IEEE Communications Surveys & Tutorials, vol. 22, no. 3, 2020, pp. 2034–2068. 10.1109/COMST.2020.2975875
XXVIII. Ghanem, W. A. H. M., et al. “Metaheuristic Based IDS Using Multi-Objective Wrapper Feature Selection.” Advances in Cyber Security, Springer, 2021. 10.1007/978-981-33-6835-4_26
XXIX. Hasan, Mohammad Kamrul, et al. “Lightweight Cryptographic Algorithms for Guessing Attack Protection in Complex IoT Applications.” Complexity, 2021, Article ID 5540296. 10.1155/2021/5540296
XXX. Hilles, S. M. S., et al. “Adaptive Latent Fingerprint Image Segmentation and Matching Using Chan-Vese Technique.” Proceedings of ICSCEE 2021, IEEE, 2021, pp. 2–7. 10.1109/ICSCEE50312.2021.9497996
XXXI. Hilles, S. M. S., et al. “Latent Fingerprint Enhancement and Segmentation Technique Based on Hybrid Edge Adaptive DTV Model.” Proceedings of ICSCEE 2021, IEEE, 2021, pp. 8–13. 10.1109/ICSCEE50312.2021.9498025
XXXII. Hong, H. G., and Y. Kim. “A Lightweight and Secure Authentication Scheme for IoT Devices in Cloud Environments.” IEEE Internet of Things Journal, vol. 10, no. 5, 2023, pp. 4280–4289. 10.1109/JIOT.2022.3196429
XXXIII. Islam, S. M. R., and S. Nuzhat. “A Blockchain-Based Security Framework for IoT and Cloud Integration.” Proceedings of ICIoT 2020, IEEE, 2020. 10.1109/ICIoT49017.2020.9259799
XXXIV. Jang, W., and J. Jang. “Security Architecture for IoT and Cloud Integration Using Blockchain.” Proceedings of CloudCom 2019, IEEE, 2019. 10.1109/CloudCom2019.00057
XXXV. Jukić, O., I. Špeh, and I. Heđi. “Cloud-Based Services for the Internet of Things.” Proceedings of MIPRO 2018, IEEE, 2018, pp. 372–377. 10.23919/MIPRO.2018.8400114
XXXVI. Jusoh, J. A., et al. “Track Student Attendance at a Time of the COVID-19 Pandemic Using Location-Finding Technology.” Proceedings of ICSCEE 2021, IEEE, 2021, pp. 147–152. 10.1109/ICSCEE50312.2021.9498043
XXXVII. Khan, S. U., and S. Hassan. “A Comprehensive Survey of Security and Privacy in Internet-of-Things (IoT) Devices.” IEEE Communications Surveys & Tutorials, vol. 21, no. 3, 2019, pp. 2791–2835. 10.1109/COMST.2019.2905611
XXXVIII. Khodaei, M., and H. R. Rabiee. “Cloud-IoT Integration: A Survey.” IEEE Internet of Things Journal, vol. 6, no. 6, 2019, pp. 11289–11313. 10.1109/JIOT.2019.2923475
XXXIX. Koo, J., et al. “Security Architecture for Cloud-Based Command and Control System in IoT Environment.” Applied Sciences, vol. 10, no. 3, 2020, p. 1035. 10.3390/app10031035
XL. Lakshmi, K., et al. “Efficiency Analysis of Firefly Optimization-Enhanced GAN-Driven Model for Melanoma Classification.” International Journal of Advanced Computer Science and Applications, vol. 14, no. 11, 2023. 10.14569/IJACSA.2023.0141175
XLI. Meraj, S. T., et al. “A Diamond Shaped Multilevel Inverter with Dual Mode of Operation.” IEEE Access, vol. 9, 2021, pp. 59873–59887. 10.1109/ACCESS.2021.3067139
XLII. Mohamad, M. B., et al. “Enterprise Problems and Proposed Solutions Using the Concept of E-Commerce.” Proceedings of the 2nd International Conference on Smart Computing and Electronic Enterprise (ICSCEE), IEEE, 2021, pp. 186–192. 10.1109/ICSCEE50312.2021.9498197
XLIII. Mukhedkar, Moresh, et al. “Enhanced Land Use and Land Cover Classification Through Human Group-Based Particle Swarm Optimization–Ant Colony Optimization Integration with Convolutional Neural Network.” International Journal of Advanced Computer Science and Applications, vol. 14, no. 11, 2023. 10.14569/IJACSA.2023.0141142
XLIV. Mukhedkar, Moresh, et al. “Feline Wolf Net: A Hybrid Lion–Grey Wolf Optimization Deep Learning Model for Ovarian Cancer Detection.” International Journal of Advanced Computer Science and Applications, vol. 14, no. 9, 2023. 10.14569/IJACSA.2023.0140962
XLV. Narayan Das, Nripendra, et al. “Utilizing Deep Convolutional Neural Networks and Non-Negative Matrix Factorization for Multi-Modal Image Fusion.” International Journal of Advanced Computer Science and Applications, vol. 14, no. 9, 2023. 10.14569/IJACSA.2023.0140963
XLVI. Naramala, Venkateswara Rao, et al. “Enhancing Diabetic Retinopathy Detection Through Machine Learning with Restricted Boltzmann Machines.” International Journal of Advanced Computer Science and Applications, vol. 14, no. 9, 2023. 10.14569/IJACSA.2023.0140961
XLVII. Pathmanathan, P. R., et al. “The Benefit and Impact of E-Commerce in Tourism Enterprises.” Proceedings of the 2nd International Conference on Smart Computing and Electronic Enterprise (ICSCEE), IEEE, 2021, pp. 193–198. 10.1109/ICSCEE50312.2021.9497947
XLVIII. Pawar, B., et al. “Multi-Scale Deep Learning-Based Recurrent Neural Network for Improved Medical Image Restoration and Enhancement.” International Journal of Advanced Computer Science and Applications, vol. 14, no. 10, 2023. 10.14569/IJACSA.2023.0141088
XLIX. Preethi, K. N., et al. “Enhancing Startup Efficiency: Multivariate DEA for Performance Recognition and Resource Optimization in a Dynamic Business Landscape.” International Journal of Advanced Computer Science and Applications, vol. 14, no. 8, 2023. 10.14569/IJACSA.2023.0140869
L. Rahman, M. A., and M. S. Hossain. “Towards Cloud-Based Framework for Security and Privacy of IoT Systems.” Proceedings of the IEEE HPCC/SmartCity/DSS Conference, IEEE, 2017, pp. 800–807. 10.1109/HPCC-SmartCity-DSS.2017.119
LI. Raj, R. S., and H. K. D. Sarma. “A Survey on Security and Privacy Issues in IoT Integrated Cloud Environment.” Proceedings of the International Conference on Communication and Electronics Systems (ICCES), IEEE, 2018, pp. 442–446. 10.1109/CESYS.2018.8627207

LII. Ravi Prasad, et al. “Forecasting Electricity Consumption Through a Fusion of Hybrid Random Forest Regression and Linear Regression Models Utilizing Smart Meter Data.” Journal of Theoretical and Applied Information Technology, vol. 101, no. 21, 2023. https://www.jatit.org/volumes/Vol101No21/6Vol101No21.pdf
LIII. Sengupta, S., and S. Chakraborty. “A Survey on Security and Privacy Issues of Internet of Things (IoT) and Cloud Computing.” Proceedings of the International Conference on Computing, Communication and Automation (ICCCA), IEEE, 2017, pp. 708–713. 10.1109/CCAA.2017.8229871
LIV. Sundaramoorthy, K., et al. “Hybrid Optimization with Recurrent Neural Network-Based Medical Image Processing for Predicting Interstitial Lung Disease.” International Journal of Advanced Computer Science and Applications, vol. 14, no. 4, 2023. 10.14569/IJACSA.2023.0140462
LV. Suresh Babu Jugunta, et al. “Exploring the Insights of Bat Algorithm-Driven XGB-RNN (BARXG) for Optimal Fetal Health Classification in Pregnancy Monitoring.” International Journal of Advanced Computer Science and Applications, vol. 14, no. 11, 2023. 10.14569/IJACSA.2023.0141174
LVI. Suresh Babu Jugunta, et al. “Unleashing the Potential of Artificial Bee Colony Optimized RNN–Bi-LSTM for Autism Spectrum Disorder Diagnosis.” International Journal of Advanced Computer Science and Applications, vol. 14, no. 11, 2023. 10.14569/IJACSA.2023.0141173
LVII. Sweety Bakyarani, E., et al. “Optimizing Network Intrusion Detection with a Hybrid Adaptive Neuro-Fuzzy Inference System.” International Journal of Advanced Computer Science and Applications, vol. 14, no. 11, 2023. 10.14569/IJACSA.2023.0141131
LVIII. Tanwar, S., R. U. Khan, and A. Kaur. “A Trustworthy and Efficient Data Fusion Framework for Secure IoT in Cloud Environment.” IEEE Internet of Things Journal, vol. 8, no. 16, 2021, pp. 12964–12974. 10.1109/JIOT.2021.3106535
LIX. Tarshany, Y. M. A., Y. Al Moaiad, and Y. A. Baker El-Ebiary. “Legal Maxims Artificial Intelligence Application for Sustainable Architecture and Interior Design.” Proceedings of ETSAIDE 2022, IEEE, 2022, pp. 1–4. 10.1109/ETSAIDE53569.2022.9906357
LX. Tiwari, Atul, et al. “Optimized Ensemble of Hybrid RNN–GAN Models for Accurate and Automated Lung Tumour Detection from CT Images.” International Journal of Advanced Computer Science and Applications, vol. 14, no. 7, 2023 10.14569/IJACSA.2023.0140769
LXI. Wahsheh, F. R., et al. “E-Commerce Product Retrieval Using Knowledge from GPT-4.” Proceedings of the International Conference on Computer Science and Emerging Technologies (CSET), IEEE, 2023, pp. 1–8. 10.1109/CSET58993.2023.10346860
LXII. Wahsheh, F. R., et al. “An Evaluation and Annotation Methodology for Product Category Matching in E-Commerce Using GPT.” Proceedings of CSET 2023, IEEE, 2023, pp. 1–6. 10.1109/CSET58993.2023.10346684
LXIII. Wang, H., Q. Zhang, and J. Wang. “A Lightweight Cloud-Based Data Integrity Verification Scheme for IoT Devices.” IEEE Internet of Things Journal, vol. 10, no. 2, 2023, pp. 1315–1323. 10.1109/JIOT.2022.3147475
LXIV. Wang, S., and L. D. Xu. “A Survey on the Internet of Things Security.” Proceedings of the IEEE GreenCom Conference, IEEE, 2018, pp. 21–27. 10.1109/GreenCom-CPSCom.2018.00010
LXV. Wazid, M., et al. “Authentication in Cloud-Driven IoT-Based Big Data Environment: Survey and Outlook.” Journal of Systems Architecture, vol. 97, 2019, pp. 185–196. 10.1016/j.sysarc.2018.12.005
LXVI. Zawaideh, F. H., et al. “Blockchain Solution for SMEs Cybersecurity Threats in E-Commerce.” Proceedings of CSET 2023, IEEE, 2023, pp. 1–7. 10.1109/CSET58993.2023.10346628
LXVII. Zawaideh, F. H., et al. “E-Commerce Supply Chains with Considerations of Cyber-Security.” Proceedings of CSET 2023, IEEE, 2023, pp. 1–8. 10.1109/CSET58993.2023.10346738
LXVIII. Zhang, Y., et al. “Secure and Lightweight Cloud-Based Key Management Scheme for IoT Devices.” IEEE Internet of Things Journal, vol. 10, no. 3, 2023, pp. 2497–2506. 10.1109/JIOT.2022.3131279
LXIX. Zhang, H., Q. Wang, and J. Wang. “A Lightweight Cloud-Based Data Integrity Verification Scheme for IoT Devices.” IEEE Internet of Things Journal, vol. 10, no. 2, 2023, pp. 1315–1323. 10.1109/JIOT.2022.3147475
LXX. Hasan, M. K., et al. “Lightweight Cryptographic Algorithms for Guessing Attack Protection in Complex Internet of Things Applications.” Complexity, 2021, Article ID 5540296. 10.1155/2021/5540296

View Download

ADVANCED PREDICTION MODEL FOR EARLY DETECTION OF LUMPY SKIN DISEASE USING DEEP LEARNING AND IMAGE PROCESSING

Authors:

Sandeep Sharma, Kapil Joshi, Saruchi, Ashish Rayal, Prashant Kumar Choudhary, Anupam Bonkra, Vipin Kumar, Gopal Ghosh

DOI NO:

https://doi.org/10.26782/jmcms.2026.01.00002

Abstract:

The comprehensive study investigates the application of cutting-edge machine learning algorithms and advanced image processing techniques for the early detection of lumpy skin disease in cattle. The proposed robust analytical framework that evaluates multiple predictive models using comprehensive performance metrics, including F1 scores ranging from 0.87 to 0.97, precision up to 0.984, recall up to 0.963, and accuracy peaking at 97.77%. The novel approach incorporates pixel-level analysis to quantify disease severity through the ratio of affected to healthy tissue, complemented by processing speed delays between 5.54ms and 20.95ms. The research demonstrates significant improvements over traditional diagnostic methods, with particular emphasis on the model's ability to identify high-risk cases requiring immediate intervention. These findings have substantial implications for veterinary medicine, agricultural technology development, and livestock management policies, potentially revolutionizing disease surveillance systems in the agricultural sector.

Keywords:

Artificial Intelligence,Convolutional neural network,Deep Learning,Lumpy skin disease,Lumpy Pixel Ratio,Machine Learning,Precision livestock farming,

References:

I. Bonazzola, R., et al. “Unsupervised Ensemble-Based Phenotyping Enhances Discoverability of Genes Related to Left-Ventricular Morphology.” Nature Machine Intelligence, vol. 6, no. 3, 2024, pp. 291–306. 10.1038/s42256-024-00628-5
II. Chen, C., et al. “An Automatic Inspection System for Pest Detection in Granaries Using YOLOv4.” Computers and Electronics in Agriculture, vol. 201, 2022, 107302. 10.1016/j.compag.2022.107302
III. Chen, K., et al. “Twofold Rigidity Activates Ultralong Organic High-Temperature Phosphorescence.” Nature Communications, vol. 15, no. 1, 2024, 1269. 10.1038/s41467-024-37527-6
IV. Cheng, B., et al. “Active Disturbance Rejection Control in Magnetic Bearing Rotor Systems with Redundant Structures.” Sensors, vol. 22, no. 8, 2022, 3012. 10.3390/s22083012
V. Deborne, J., et al. “Implantable Theranostic Device for In Vivo Real-Time NMR Evaluation of Drug Impact in Brain Tumors.” Scientific Reports, vol. 14, no. 1, 2024, 4541. 10.1038/s41598-024-39571-8
VI. Degenfellner, J., and M. Templ. “Modeling Bee Hive Dynamics: Assessing Colony Health Using Hive Weight and Environmental Parameters.” Computers and Electronics in Agriculture, vol. 218, 2024, 108742. 10.1016/j.compag.2024.108742
VII. Dragoni, M., et al. “Supporting Patients and Clinicians during the Breast Cancer Care Path with AI: The Arianna Solution.” Artificial Intelligence in Medicine, vol. 138, 2023, 102514. 10.1016/j.artmed.2023.102514
VIII. Jo, W. K., et al. “Potential Zoonotic Sources of SARS-CoV-2 Infections.” Transboundary and Emerging Diseases, vol. 68, no. 4, 2021, pp. 1824–1834. 10.1111/tbed.13872
IX. Kim, K., et al. “Prevalence of Asthma in Preterm and Associated Risk Factors Based on Prescription Data from the Korean National Health Insurance Database.” Scientific Reports, vol. 13, no. 1, 2023, 4484. 10.1038/s41598-023-31558-z
X. Li, X., et al. “Forecasting Greenhouse Air and Soil Temperatures: A Multi-Step Time Series Approach Employing Attention-Based LSTM Network.” Computers and Electronics in Agriculture, vol. 217, 2024, 108602. 10.1016/j.compag.2023.108602
XI. Belke, Christoph H., et al. “Morphological flexibility in robotic systems through physical polygon meshing.” Nature Machine Intelligence 5.6 (2023): 669-675. https://www.nature.com/articles/s42256-023-00676-8
XII. Stigall, A. R., et al. “A Formalized Method to Acclimate Dogs to Voluntary Treadmill Locomotion at Various Speeds and Inclines.” Animals, vol. 12, no. 5, 2022, 567. 10.3390/ani12050567
XIII. Su, W. J., et al. “Acute Reactions After a Homologous Primary COVID-19 Vaccination Series: Analysis of Taiwan V-Watch Data.” Vaccine, vol. 41, no. 17, 2023, pp. 2853–2859. 10.1016/j.vaccine.2023.04.038
XIV. van den Heever, M. J. J., et al. “The Economic Impact of Heartwater on the South African Livestock Industry and the Need for a New Vaccine.” Preventive Veterinary Medicine, vol. 203, 2022, 105634. 10.1016/j.prevetmed.2022.105634
XV. Vanegas, E., et al. “Sensing Systems for Respiration Monitoring: A Technical Systematic Review.” Sensors, vol. 20, no. 18, 2020, 5446. 10.3390/s20185446
XVI. Wang, B., et al. “Machine Learning Optimization Model for Reducing the Electricity Loads in Residential Energy Forecasting.” Sustainable Computing: Informatics and Systems, vol. 38, 2023, 100876. 10.1016/j.suscom.2023.100876
XVII. Yu, Z., et al. “Parameter Optimization and Simulation Analysis of Floating Root Cutting Mechanism for Garlic Harvester.” Computers and Electronics in Agriculture, vol. 204, 2023, 107521. 10.1016/j.compag.2023.107521

View Download

ENERGY AND PERFORMANCE EVALUATION OF PVT-POROUS SOLAR DRYER

Authors:

E. Boonthum, U. Teeboonma, A. Namkhet, A. Janyalertadun, P. Somsila, K. Komanee

DOI NO:

https://doi.org/10.26782/jmcms.2026.01.00003

Abstract:

Drying is a critical post-harvest operation for agricultural and herbal products, but remains energy-intensive and performance-limited under humid tropical conditions. This study experimentally investigates the energy performance and drying kinetics of a photovoltaic–thermal (PVT) solar dryer integrated with porous absorber materials to enhance heat and mass transfer. The developed system consists of a 150 W PVT panel, a double-pass solar collector, and porous steel mesh absorbers with porosities of 0.98, 0.97, and 0.96. Experiments were conducted under tropical climatic conditions in Thailand at a low air velocity of 0.07 m/s using kaffir lime leaves as a representative leafy material. The results show that drying occurred entirely in the falling-rate period and was governed by internal moisture diffusion. Porous integration improved thermal uniformity and airflow turbulence, increasing the drying rate by 43.73–56.01% and reducing specific energy consumption (SEC) by 30.44–36.01% compared with the non-porous configuration. Optimal performance was achieved at a porosity of 0.96, yielding the highest Deff (8.59x10-13 m²/s) and the lowest SEC of 21.84 MJ/kg. Thin-layer analysis confirmed that the Page model best described the drying kinetics (R2 = 0.980–0.999). Statistical analysis (ANOVA) verified that porosity is a dominant factor influencing performance (p < 0.01). Overall, the integration of porous materials into a PVT solar dryer significantly enhances drying performance and represents an energy-efficient approach for drying leafy agricultural products in humid tropical regions.

Keywords:

PVT-porous dryer,photovoltaic-thermal,porous material,solar drying,energy efficiency,

References:

I. Al-Jethelah, M., Deyab, H., & Yaseen, T. “Thermal performance of novel indirect passive solar dryer.” Scientific Review Engineering and Environmental Sciences, vol. 30, no. 2, 2021, pp. 293–303. 10.22630/PNIK
S.2021.30.2.25.

II. Ankur, G., Agnimitra, B., Biplab, D., & Bale, V.R. “Development and testing of novel photovoltaic-thermal collector-based solar dryer for green tea drying application,” Solar Energy, vol. 231, 2022, pp. 1072-1091. 10.1016/j.solener.2021.12.030.
III. Ankur, G., Biplab, D., Erhan, A., Mehmet, D., Meltem, K., & Omer, F. C. “Artificial neural networks based computational and experimental evaluation of thermal and drying performance of partially covered PVT solar dryer,” Process Safety and Environmental Protection, vol. 183, 2024, pp. 1170-1185. 10.1016/j.psep.2024.01.068.
IV. AOAC International, Official Methods of Analysis of AOAC International. Virginia, USA: Association of Official Analytical Chemists, 2019.
V. Boonthum, E., Sirichana, S., Namkhet, A., & Teeboonma, U. “Comparative study on performance of passive and active solar dryer.” Key Engineering Materials, vol. 978, 2024, pp. 97-103. 10.4028/p-2GFc9W.
VI. Coban, S., Selimefendigil, F., & Oztop, H. “Convective drying performance of porous moist objects under turbulent flow conditions: effects of object shape and material.” International Journal of Numerical Methods for Heat & Fluid Flow, vol. 32, no. 7, 2021, pp. 2454–2475. 10.1108/hff-06-2021-0408.
VII. Das, M., Alic, E., & Akpinar, E. “Numerical and experimental analysis of heat and mass transfer in the drying process of the solar drying system.” Engineering Science and Technology, an International Journal, vol. 24, no. 1, 2020, pp. 236-246. 10.1016/j.jestch.2020.10.003.
VIII. Elwakeel, A. E., Villagran, E., Rodriguez, J., Aguilar, C. E., & Ahmed, A. F. “Development, Thermodynamic Evaluation, and Economic Analysis of a PVT-Based Automated Indirect Solar Dryer for Date Fruits.” Sustainability, vol. 17, no. 10, 2025, article 4571. 10.3390/su17104571.
IX. Erdem, Ç., Ataollah, K., Adnan, S.,, İpek, A., Azim, D.T. “Energy and exergy analysis of a photovoltaic thermal (PVT) system used in solar dryer: A numerical and experimental investigation,” Renewable Energy, vol. 180, 2021, pp. 410-423. 10.1016/j.renene.2021.08.081.
X. Fterich, M., Chouikhi, H., Bentaher, H., & Maalej, A. “Experimental parametric study of a mixed-mode forced convection solar dryer equipped with a PV/T air collector,” Solar Energy, vol. 171, 2018, pp. 751–760. 10.1016/j.solener.2018.06.051.
XI. Jasinta E. and Muthukumar P. “Determination of heat transfer coefficients and drying kinetics of red chilli dried in forced convection mixed mode solar dryer.” Thermal Science and Engineering Progress, vol. 19, 2020, pp. 1-7. 10.1016/j.tsep.2020.100607.
XII. Jha, P., Das, B., & Gupta, R. “Performance of air-based photovoltaic thermal collector with fully and partially covered photovoltaic module.” Applied Thermal Engineering, vol. 180, 2020, article 115838. 10.1016/j. applthermaleng.2020.115838
XIII. Kumar, C., Karim, M. A., & Joardder, M. U. H. “Intermittent drying of food products: a critical review.” Journal of Food Engineering, vol. 278, 2020, article 109930. 10.1016/j.jfoodeng.2020.109930.
XIV. Messai, S., Chrusciel, L., Al-Hagan, O., Almuadi, M., & Sghaier, J. “Study and comparison of different drying processes of porous particle at high temperature.” High Temperatures-High Pressures, vol. 51, no. 1, 2022, pp. 27-38. 10.32908/hthp.v51.1103.
XV. Mirzaei, S., Ameri, M., & Mortezapour, H. “Comparative energy-exergy and economic-environmental analyses of recently advanced solar photovoltaic and photovoltaic thermal hybrid dryers: a review.” Drying Technology, vol. 41, 2022, pp. 1-52. 10.1080/07373937.2022.2113793.
XVI. Moghimi, P., Rahimzadeh, H., & Ahmadpour, A. “Experimental and numerical optimal design of a household solar fruit and vegetable dryer.” Solar Energy, vol. 214, 2021, pp. 575–587. 10.1016/j.solener.2020.12.023.
XVII. Mohammad S. B. J., Vali K., & Hadi S. “Design and performance analysis of a new flat solar heating porous collector equipped with vertical copper pipe and porous medium for medicinal plant drying,” Energy, vol. 334, 2025, article 137653. 10.1016/j.energy.2025.137653.
XVIII. Nima F. J., & Steffan T. L. “Performance improvement of a solar air heater by covering the absorber plate with porous material,” Energy, vol. 190, 2020, article 116437. 10.1016/j.energy.2019.116437.
XIX. Rajarajeswari K., & Alok P., Sreekumar A. “Simulation and experimental investigation of fluid flow in porous and non-porous solar heaters,” Solar Energy, vol. 171, 2018, pp. 258-270. 10.1016/j.solener.2018.06.079.
XX. Thamkaew, G., Sjoholm, I., & Galindo, F.G. “A review of drying methods for improving the quality of dried herbs,” Critical Reviews in Food Science and Nutrition, vol. 61, no. 11, 2021, pp. 1763–1786. 10.1080/10408398.2020.1765309.
XXI. Teeboonma U.,& Boonthum E. “Thermal performance of solar heater with porous material,” Journal of Mechanics of Continua and Mathematical Sciences, Special Issue 1, 2019, pp. 723-733. 10.26782/jmcms.2019.03.00072.

View Download

EFFICIENT FPGA REALIZATION OF LIGHTWEIGHT AES FOR LOW-POWER IOT SECURITY SYSTEMS

Authors:

Keshav Kumar, Dr Chinnaiyan Ramasubramanian, Bishwajeet Pandey

DOI NO:

https://doi.org/10.26782/jmcms.2026.01.00004

Abstract:

Background: The growing need for secure communication on resource-constrained systems, such as those in the Internet of Things (IoT), has led to a significant increase in demand for lightweight symmetric ciphers. Nevertheless, different techniques and implementations exist, making the selection of the optimal security solution for a particular application challenging. Objective: This study primarily focuses on implementing an optimised Lightweight Advanced Encryption Standard (LAES) algorithm in hardware to address the critical need for energy-efficient security solutions for IoT devices. Methods: This study implements LAES to meet the security requirements for IoT devices. The Kintex 7 and Spartan 7 FPGAs (Field Programmable Gate Arrays) are utilised for implementation, with critical performance metrics such as hardware area utilisation used to evaluate performance. The algorithm eliminates the computationally expensive MixColumns operation from standard AES while maintaining essential security transformations. Performance evaluation focused on hardware resource utilisation (LUTs, FFs, IO) and power consumption across clock frequencies ranging from 1 ns to 20 ns. Results: The results indicate significant advancements in achieving area and power-efficient designs. Our findings show that the reduction in power consumption is by 95.29% and 92.07% as compared to existing models. The area consumption, such as LUTs, FFs, and IO, has also been significantly decreased compared to existing models. Conclusions: The proposed LAES architecture demonstrates that strategic algorithm optimisation can yield substantial improvements in both power efficiency and hardware utilisation without compromising security, making it highly suitable for IoT deployment.

Keywords:

FPGA,Lightweight Cryptography,IoT Security,Power Optimisation,LAES Algorithm,Area,Data Privacy,VIVADO,

References:

I. Aditya, Yashwant, and Keshav Kumar. “Implementation of High-Performance AES Crypto Processor for Green Communication.” Telematique, vol. 21, no. 1, 2022, pp. 6808-6816.
II. Aditya, Yashwant, and Keshav Kumar. “Implementation of Novel Power Efficient AES Design on High Performance FPGA.” NeuroQuantology, vol. 20, no. 10, 2022, p. 5815.
III. Ahmed, Salman, et al. “Lightweight AES Design for IoT Applications: Optimizations in FPGA and ASIC with DFA Countermeasure Strategies.” IEEE Access, 2025.
IV. Balaji Naik, Bhukya, et al. “Implementation of the AES Algorithm on FPGA.” International Conference on Emerging Research in Computing, Information, Communication and Applications, Springer Nature Singapore, 2023, pp. 89-99.
V. Bisht, Neeraj, Bishwajeet Pandey, and Sandeep Kumar Budhani. “Comparative Performance Analysis of AES Encryption Algorithm for Various LVCMOS on Different FPGAs.” World Journal of Engineering, vol. 20, no. 4, 2023, pp. 669-680.
VI. Çavuşoğlu, Ü., et al. “A Novel Hybrid Encryption Algorithm Based on Chaos and S-AES Algorithm.” Nonlinear Dynamics, vol. 92, no. 4, 2018, pp. 1745-1757.
VII. Equihua, Christian, et al. “A Low-Cost and Highly Compact FPGA-Based Encryption/Decryption Architecture for AES Algorithm.” IEEE Latin America Transactions, vol. 19, no. 9, 2021, pp. 1443-1450.
VIII. Guillén-Fernández, O., et al. “On the Synchronization Techniques of Chaotic Oscillators and Their FPGA-Based Implementation for Secure Image Transmission.” PloS One, vol. 14, no. 2, 2019, p. e0209618.
IX. Kumar, Keshav, et al. “A Design of Power-Efficient AES Algorithm on Artix-7 FPGA for Green Communication.” 2021 International Conference on Technological Advancements and Innovations (ICTAI), IEEE, 2021, pp. 561-564.
X. Kumar, Keshav, K. R. Ramkumar, and Amanpreet Kaur. “A Design Implementation and Comparative Analysis of Advanced Encryption Standard (AES) Algorithm on FPGA.” 2020 8th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), IEEE, 2020, pp. 182-185.
XI. Kumar, Keshav, K. R. Ramkumar, and Amanpreet Kaur. “A Lightweight AES Algorithm Implementation for Encrypting Voice Messages Using Field Programmable Gate Arrays.” Journal of King Saud University-Computer and Information Sciences, vol. 34, no. 6, 2022, pp. 3878-3885.
XII. Kumar, Keshav, Chinnaiyan Ramasubramanian, and Bishwajeet Pandey. “Low Area Design and Implementation of Lightweight Encryption Algorithm on FPGA for IoT Devices.” 2025 IEEE 4th International Conference on AI in Cybersecurity (ICAIC), IEEE, 2025, pp. 1-4.
XIII. Kumar, Thanikodi Manoj, et al. “A Low Area High Speed FPGA Implementation of AES Architecture for Cryptography Application.” Electronics, vol. 10, no. 16, 2021, p. 2023.

XIV. Lara-Nino, Carlos Andres, Miguel Morales-Sandoval, and Arturo Diaz-Perez. “Novel FPGA- based low-cost hardware architecture for the PRESENT block cipher.” In 2016 Euromicro Conference on Digital System Design (DSD), pp. 646-650. IEEE, 2016.
XV. Maazouz, Mohamed, et al. “FPGA Implementation of a Chaos-Based Image Encryption Algorithm.” Journal of King Saud University-Computer and Information Sciences, vol. 34, no. 10, 2022, pp. 9926-9941.
XVI. Pandey, Bishwajeet, et al. “Energy-Efficient Implementation of AES Algorithm on 16nm FPGA.” 2021 10th IEEE International Conference on Communication Systems and Network Technologies (CSNT), IEEE, 2021, pp. 740-744.
XVII. Prakash, Brahm, and Vrinda Gupta. “An Improved Unified AES Implementation Using FPGA.” International Journal of Embedded and Real-Time Communication Systems (IJERTCS), vol. 13, no. 1, 2022, pp. 1-12.
XVIII. Priya, I., et al. “FPGA Implementation of AES Algorithm for High Speed Applications.” Analog Integrated Circuits and Signal Processing, 2022, pp. 1-11.
XIX. Priyanka Brahmaiah, V., et al. “Implementation of AES Algorithm.” International Conference on Information and Communication Technology for Intelligent Systems, Springer Nature Singapore, 2023, pp. 161-171
XX. Sawant, A. G., V. N. Nitnaware, and A. A. Deshpande. “Spartan-6 FPGA Implementation of AES Algorithm.” ICCCE 2019, Springer, Singapore, 2020, pp. 205-211.
XXI. Siva Balan, N., and B. S. Murugan. “Low Area FPGA Implementation of AES Architecture with EPRNG for IoT Application.” Journal of Electronic Testing, vol. 38, no. 2, 2022, pp. 181-193.
XXII. Sornalatha, R., et al. “FPGA Implementation of Protected Compact AES S–Box Using CQCG for Embedded Applications.” Smart Intelligent Computing and Communication Technology, IOS Press, 2021, pp. 396-401.
XXIII. Sreekanth, Muttuluru, and R. K. Jeyachitra. “Implementation of Area-Efficient AES Using FPGA for IOT Applications.” International Journal of Embedded Systems, vol. 15, no. 4, 2022, pp. 354-362.
XXIV. Yang, Cheng-Hsiung, and Yu-Sheng Chien. “FPGA Implementation and Design of a Hybrid Chaos-AES Color Image Encryption Algorithm.” Symmetry, vol. 12, no. 2, 2020, p. 189.
XXV. Yazdeen, Abdulmajeed Adil, et al. “FPGA Implementations for Data Encryption and Decryption via Concurrent and Parallel Computation: A Review.” Qubahan Academic Journal, vol. 1, no. 2, 2021, pp. 8-16

View Download

ENHANCING INTEROPERABILITY AND STANDARDIZATION IN IOT AND CLOUD INTEGRATION

Authors:

Julaily Aida Jusoh, Najla Al-Qawasmeh, Belal alifan, Syarilla Iryani Ahmad Saany, M Hafiz Yusoff, Yousef A. Baker El-Ebiary

DOI NO:

https://doi.org/10.26782/jmcms.2026.01.00005

Abstract:

Introduction: The rapid expansion of Internet of Things (IoT) devices, combined with the widespread adoption of cloud computing, has led to an interconnected digital environment. However, the lack of interoperability and standardization between IoT and cloud systems presents significant challenges. This study explores the importance of addressing interoperability issues and establishing standardized practices to facilitate smoother integration between these technologies. Problem Statement: The diverse range of IoT devices and cloud platforms has created a fragmented ecosystem where interoperability challenges impede the seamless exchange of data and functionality. The absence of universally accepted protocols further complicates compatibility, leading to performance inefficiencies, increased development complexity, and potential security risks. Resolving these issues is essential for unlocking the full capabilities of IoT and cloud integration. Objective: The goal of this research is to examine the current state of interoperability and standardization in IoT and cloud integration. The study aims to identify existing challenges, evaluate current standards and protocols, and propose solutions to enhance interoperability and standardization, fostering a more cohesive and efficient integration between these technologies. Methodology: This study uses a multi-method approach, including a thorough literature review, case studies of existing IoT and cloud integration efforts, and unstructured interviews with industry experts. The analysis focuses on identifying recurring interoperability challenges, evaluating the effectiveness of existing standards, and reviewing successful integration strategies. This comprehensive approach provides a detailed understanding of the complexities surrounding IoT and cloud interoperability. Results: The research identifies key challenges affecting the interoperability of IoT and cloud systems. Through detailed analysis of current standards and successful integration cases, the study offers insights into effective strategies for overcoming these barriers. The results provide actionable recommendations for enhancing interoperability and achieving smoother integration across various IoT and cloud environments. Conclusion: This study emphasizes the urgent need for improved interoperability and standardization in IoT and cloud integration. The research findings, along with proposed solutions, offer valuable direction for industry professionals, policymakers, and researchers working towards creating a more interconnected and efficient digital ecosystem. As IoT and cloud technologies continue to advance, establishing strong, standardized frameworks is crucial to realizing the full potential of these transformative technologies.

Keywords:

IoT integration,Interoperability,Standardization,Cloud computing,Digital ecosystem,Connectivity protocols,

References:

I. A. Greeni, et al., “BrainLang DL: A Deep Learning Approach to FMRI for Unveiling Neural Correlates of Language across Cultures” International Journal of Advanced Computer Science and Applications(IJACSA), 15(6), 2024. 10.14569/IJACSA.2024.01506114.
II. Al-Sammarraie, N. A., Y. M. H. Al-Mayali, and Yousef A. Baker El-Ebiary.“Classification and Diagnosis Using Back Propagation Artificial Neural Networks (ANN).” Proceedings of the International Conference on Smart Computing and Electronic Enterprise (ICSCEE), IEEE, 2018, pp. 1–5. 10.1109/ICSCEE.2018.8538383
III. Anna Gustina Zainal, M. et al. “Cross-Cultural Language Proficiency Scaling using Transformer and Attention Mechanism Hybrid Model” International Journal of Advanced Computer Science and Applications(IJACSA), 15(6), 2024. 10.14569/IJACSA.2024.01506116.
IV. Antonius, Franciskus, et al.“Incorporating Natural Language Processing into Virtual Assistants: An Intelligent Assessment Strategy for Enhancing Language Comprehension.” International Journal of Advanced Computer Science and Applications, vol. 14, no. 10, 2023. 10.14569/IJACSA.2023.0141079
V. Anushree A. et al. “Real-time Air Quality Monitoring in Smart Cities using IoT-enabled Advanced Optical Sensors” International Journal of Advanced Computer Science and Applications(IJACSA), 15(4), 2024. 10.14569/IJACSA.2024.0150487.
VI. Araddhana Arvind Deshmukh, et al. “Event-based Smart Contracts for Automated Claims Processing and Payouts in Smart Insurance” International Journal of Advanced Computer Science and Applications(IJACSA), 15(4), 2024. 10.14569/IJACSA.2024.0150486.
VII. Aradhana Sahu, et al. “Federated LSTM Model for Enhanced Anomaly Detection in Cyber Security: A Novel Approach for Distributed Threat” International Journal of Advanced Computer Science and Applications(IJACSA), 15(6), 2024. 10.14569/IJACSA.2024.01506125.
VIII. Artika Farhana, et al.“Efficient Deep Reinforcement Learning for Smart Buildings: Integrating Energy Storage Systems Through Advanced Energy Management Strategies.” International Journal of Advanced Computer Science and Applications, vol. 14, no. 12, 2023. 10.14569/IJACSA.2023.0141257
IX. Atul Tiwari, et al.“Optimized Ensemble of Hybrid RNN–GAN Models for Accurate and Automated Lung Tumour Detection from CT Images.” International Journal of Advanced Computer Science and Applications, vol. 14, no. 7, 2023. 10.14569/IJACSA.2023.0140769
X. Atzori, Luigi, Antonio Iera, and Giacomo Morabito.“The Internet of Things: A Survey.” Computer Networks, vol. 54, no. 15, 2022, pp. 2787–2805. 10.1016/j.comnet.2010.05.010
XI. Baker El-Ebiary, Yousef A., et al.“Blockchain as a Decentralized Communication Tool for Sustainable Development.” Proceedings of the International Conference on Smart Computing and Electronic Enterprise (ICSCEE), IEEE, 2021, pp. 127–133. 10.1109/ICSCEE50312.2021.9497910
XII. Baker El-Ebiary, Yousef A., et al.“Determinants of Customer Purchase Intention Using Zalora Mobile Commerce Application.” Proceedings of the International Conference on Smart Computing and Electronic Enterprise (ICSCEE), IEEE, 2021, pp. 159–163. 10.1109/ICSCEE50312.2021.9497995
XIII. Baker El-Ebiary, Yousef A., et al.“E-Government and E-Commerce Issues in Malaysia.” Proceedings of the International Conference on Smart Computing and Electronic Enterprise (ICSCEE), IEEE, 2021, pp. 153–158. 10.1109/ICSCEE50312.2021.9498092
XIV. Baker El-Ebiary, Yousef A., et al.“Mobile Commerce and Its Apps: Opportunities and Threats in Malaysia.” Proceedings of the International Conference on Smart Computing and Electronic Enterprise (ICSCEE), IEEE, 2021, pp. 180–185. 10.1109/ICSCEE50312.2021.9498228
XV. Bamansoor, S., et al.“Efficient Online Shopping Platforms in Southeast Asia.” Proceedings of the International Conference on Smart Computing and Electronic Enterprise (ICSCEE), IEEE, 2021, pp. 164–168. 10.1109/ICSCEE50312.2021.9497901
XVI. Bamansoor, S., et al.“Evaluation of Chinese Electronic Enterprise from Business and Customers Perspectives.” Proceedings of the International Conference on Smart Computing and Electronic Enterprise (ICSCEE), IEEE, 2021, pp. 169–174. 10.1109/ICSCEE50312.2021.9498093
XVII. Borgia, Eleonora.“The Internet of Things Vision: Key Features, Applications and Open Issues.” Computer Communications, vol. 54, 2014, pp. 1–31. 10.1016/j.comcom.2014.09.008
XVIII. Botta, Alessio, et al.“Integration of Cloud Computing and Internet of Things: A Survey.” Future Generation Computer Systems, vol. 56, 2016, pp. 684–700. 10.1016/j.future.2015.09.021
XIX. Deeba, K., et al.“Optimizing Crop Yield Prediction in Precision Agriculture with Hyperspectral Imaging-Unmixing and Deep Learning.” International Journal of Advanced Computer Science and Applications, vol. 14, no. 12, 2023. 10.14569/IJACSA.2023.0141261
XX. Ghanem, W. A. H. M., et al.“Metaheuristic-Based IDS Using Multi-Objective Wrapper Feature Selection and Neural Network Classification.” Advances in Cyber Security, Springer, 2021. 10.1007/978-981-33-6835-4_26
XXI. Gubbi, Jayavardhana, et al.“Internet of Things (IoT): A Vision, Architectural Elements, and Future Directions.” Future Generation Computer Systems, vol. 29, no. 7, 2019, pp. 1645–1660. 10.1016/j.future.2013.01.010
XXII. Gunnam Rama Devi, et al. “COOT-Optimized Real-Time Drowsiness Detection using GRU and Enhanced Deep Belief Networks for Advanced Driver Safety” International Journal of Advanced Computer Science and Applications(IJACSA), 15(4), 2024. 10.14569/IJACSA.2024.0150483.
XXIII. Hasan, Mohammad Kamrul, et al.“Lightweight Cryptographic Algorithms for Guessing Attack Protection in Complex IoT Applications.” Complexity, 2021. 10.1155/2021/5540296
XXIV. Hilles, S. M. S., et al.“Adaptive Latent Fingerprint Image Segmentation and Matching Using Chan–Vese Technique.” Proceedings of the International Conference on Smart Computing and Electronic Enterprise (ICSCEE), IEEE, 2021, pp. 2–7. 10.1109/ICSCEE50312.2021.9497996
XXV. Hilles, S. M. S., et al.“Latent Fingerprint Enhancement and Segmentation Technique Based on Hybrid Edge Adaptive DTV Model.” Proceedings of the International Conference on Smart Computing and Electronic Enterprise (ICSCEE), IEEE, 2021, pp. 8–13. 10.1109/ICSCEE50312.2021.9498025
XXVI. Jazdi, Nasser.“Cyber Physical Systems in the Context of Industry 4.0.” Proceedings of the IEEE International Conference on Automation, Quality and Testing, Robotics, IEEE, 2014, pp. 1–4. 10.1109/AQTR.2014.6857843
XXVII. Jin, Jing, et al.“An Information Framework for Creating a Smart City through Internet of Things.” IEEE Internet of Things Journal, vol. 1, no. 2, 2019, pp. 112–121. 10.1109/JIOT.2013.2296516
XXVIII. Jara, Antonio J., et al.“Interconnection Framework for mHealth and Remote Monitoring Based on the Internet of Things.” IEEE Journal on Selected Areas in Communications, vol. 31, no. 9, 2018, pp. 47–65. 10.1109/JSAC.2013.130905
XXIX. Jugunta, Suresh Babu, et al.“Exploring the Insights of Bat Algorithm-Driven XGB-RNN for Optimal Fetal Health Classification.” International Journal of Advanced Computer Science and Applications, vol. 14, no. 11, 2023. 10.14569/IJACSA.2023.0141174
XXX. Kamilaris, Andreas, et al.“The Rise of Blockchain Technology in Agriculture and Food Supply Chains.” Trends in Food Science & Technology, vol. 91, 2022, pp. 640–652. 10.1016/j.tifs.2019.07.034
XXXI. Lakshmi, K., et al.“Efficiency Analysis of Firefly Optimization-Enhanced GAN-Driven Convolutional Model for Cost-Effective Melanoma Classification.” International Journal of Advanced Computer Science and Applications, vol. 14, no. 11, 2023. 10.14569/IJACSA.2023.0141175
XXXII. Li, Shancang, Li Da Xu, and Shanshan Zhao.“The Internet of Things: A Survey.” Information Systems Frontiers, vol. 17, no. 2, 2022, pp. 243–259. 10.1007/s10796-014-9492-7
XXXIII. M Hafiz Yusoff, et al., “The Influence Of Knowledge Management Strategies On Decision-Making In Enterprises”. Journal Of Mechanics of Continua and Mathematical Sciences. Vol – 20 No – 9, September 2025. 10.26782/jmcms.2025.09.00009
XXXIV. M. Madhavi, et al. “Elevating Offensive Language Detection: CNN-GRU and BERT for Enhanced Hate Speech Identification” International Journal of Advanced Computer Science and Applications(IJACSA), 15(5), 2024. 10.14569/IJACSA.2024.01505118.
XXXV. Meraj, S. T., et al.“A Diamond Shaped Multilevel Inverter with Dual Mode of Operation.” IEEE Access, vol. 9, 2021, pp. 59873–59887. 10.1109/ACCESS.2021.3067139
XXXVI. Mohamad, M. B., et al.“Enterprise Problems and Proposed Solutions Using the Concept of E-Commerce.” Proceedings of the 2nd International Conference on Smart Computing and Electronic Enterprise (ICSCEE), IEEE, 2021, pp. 186–192. 10.1109/ICSCEE50312.2021.9498197
XXXVII. Mukhedkar, Moresh, et al.“Enhanced Land Use and Land Cover Classification Through Human Group-Based Particle Swarm Optimization–Ant Colony Optimization Integration with Convolutional Neural Network.” International Journal of Advanced Computer Science and Applications, vol. 14, no. 11, 2023. 10.14569/IJACSA.2023.0141142
XXXVIII. Mukhedkar, Moresh, et al.“Feline Wolf Net: A Hybrid Lion–Grey Wolf Optimization Deep Learning Model for Ovarian Cancer Detection.” International Journal of Advanced Computer Science and Applications, vol. 14, no. 9, 2023. 10.14569/IJACSA.2023.0140962
XXXIX. Myagmarsuren Orosoo, et al. “Analysing Code-Mixed Text in Programming Instruction Through Machine Learning for Feature Extraction” International Journal of Advanced Computer Science and Applications(IJACSA), 15(7), 2024. 10.14569/IJACSA.2024.0150788.
XL. Naramala, Venkateswara Rao, et al. “Enhancing Diabetic Retinopathy Detection Through Machine Learning with Restricted Boltzmann Machines.” International Journal of Advanced Computer Science and Applications, vol. 14, no. 9, 2023. 10.14569/IJACSA.2023.0140961
XLI. Nastic, Stefan, Sanjin Sehic, and Schahram Dustdar. “Cloud-of-Things: Unified Interoperability Framework for IoT Platforms.” IEEE Cloud Computing, vol. 4, no. 2, 2020, pp. 20–28. 10.1109/MCC.2017.27
XLII. Palattella, Maria Rita, et al. “Internet of Things in the 5G Era: Enablers, Architecture, and Business Models.” IEEE Journal on Selected Areas in Communications, vol. 34, no. 3, 2016, pp. 510–527. 10.1109/JSAC.2016.2525418
XLIII. Pathmanathan, P. R., et al. “The Benefit and Impact of E-Commerce in Tourism Enterprises.” Proceedings of the 2nd International Conference on Smart Computing and Electronic Enterprise (ICSCEE), IEEE, 2021, pp. 193–198. 10.1109/ICSCEE50312.2021.9497947
XLIV. Pawar, B., et al. “Multi-Scale Deep Learning-Based Recurrent Neural Network for Improved Medical Image Restoration and Enhancement.” International Journal of Advanced Computer Science and Applications, vol. 14, no. 10, 2023. 10.14569/IJACSA.2023.0141088
XLV. Perera, Charith, et al. “A Survey on Internet of Things from Industrial Market Perspective.” IEEE Access, vol. 4, 2021, pp. 6787–6795. 10.1109/ACCESS.2016.2619379
XLVI. Preethi, K. N., et al. “Enhancing Startup Efficiency: Multivariate DEA for Performance Recognition and Resource Optimization in a Dynamic Business Landscape.” International Journal of Advanced Computer Science and Applications, vol. 14, no. 8, 2023. 10.14569/IJACSA.2023.0140869
XLVII. Rajina R. et al., “Comprehensive Security Frameworks For Safeguarding IoT Devices In Smart Cities: Addressing Authentication, Encryption, Access Control, And Anomaly Detection”. Journal Of Mechanics of Continua and Mathematical Sciences. Vol – 20 No – 9, September 2025. 10.26782/jmcms.2025.09.00005.

XLVIII. Rajasekhar Reddy, N. V., et al. “Enhancing Skin Cancer Detection Through an AI-Powered Framework by Integrating African Vulture Optimization with GAN-Based Bi-LSTM Architecture.” International Journal of Advanced Computer Science and Applications, vol. 14, no. 9, 2023. 10.14569/IJACSA.2023.0140960
XLIX. Ranjan, R., and M. Paprzycki. “Internet of Things (IoT): A Vision, Architectural Elements, and Future Directions.” Future Generation Computer Systems, vol. 49, 2020, pp. 173–190. 10.1016/j.future.2015.12.027
L. Shaista Khan, et al. “A Hybrid DBN-GRU Model for Enhanced Sentiment Analysis in Product Reviews” International Journal of Advanced Computer Science and Applications(IJACSA), 15(7), 2024. 10.14569/IJACSA.2024.0150789.
LI. Shi, Weisong, et al. “Edge Computing: Vision and Challenges.” IEEE Internet of Things Journal, vol. 3, no. 5, 2019, pp. 637–646. 10.1109/JIOT.2016.2579198
LII. Sundaramoorthy, K., et al. “Hybrid Optimization with Recurrent Neural Network-Based Medical Image Processing for Predicting Interstitial Lung Disease.” International Journal of Advanced Computer Science and Applications, vol. 14, no. 4, 2023. 10.14569/IJACSA.2023.0140462
LIII. T M Swathy, et al., Shobana Gorintla and Elangovan Muniyandy, “Game Theory-Optimized Attention-Based Temporal Graph Convolutional Network for Spatiotemporal Forecasting of Sea Level Rise” International Journal of Advanced Computer Science and Applications(IJACSA), 16(8), 2025. 10.14569/IJACSA.2025.0160857.
LIV. Tarshany, Y. M. A., Y. Al Moaiad, and Y. A. Baker El-Ebiary. “Legal Maxims Artificial Intelligence Application for Sustainable Architecture and Interior Design to Achieve the Maqasid of Preserving the Life and Money.” 2022 Engineering and Technology for Sustainable Architectural and Interior Design Environments (ETSAIDE), 2022, pp. 1–4. 10.1109/ETSAIDE53569.2022.9906357
LV. Taviti Naidu Gongada, et al. “Optimizing Resource Allocation in Cloud Environments using Fruit Fly Optimization and Convolutional Neural Networks” International Journal of Advanced Computer Science and Applications(IJACSA), 15(5), 2024. 10.14569/IJACSA.2024.01505119.
LVI. Thakkalapally Preethi, et al. “Advancing Healthcare Anomaly Detection: Integrating GANs with Attention Mechanisms” International Journal of Advanced Computer Science and Applications(IJACSA), 15(6), 2024. 10.14569/IJACSA.2024.01506113.
LVII. Tiwari, Atul, et al. “Optimized Ensemble of Hybrid RNN-GAN Models for Accurate and Automated Lung Tumour Detection from CT Images.” International Journal of Advanced Computer Science and Applications, vol. 14, no. 7, 2023. 10.14569/IJACSA.2023.0140769
LVIII. Vögler, M., et al. “A Fog-Based Platform for End-to-End IoT-Cloud Interoperability.” 2017 IEEE International Conference on Edge Computing (EDGE), IEEE, 2019, pp. 1–8. 10.1109/EDGE.2017.7961733
LIX. Wahsheh, F. R., et al. “E-Commerce Product Retrieval Using Knowledge from GPT-4.” 2023 International Conference on Computer Science and Emerging Technologies (CSET), IEEE, 2023, pp. 1–8. 10.1109/CSET58993.2023.10346860
LX. Wahsheh, F. R., et al. “An Evaluation and Annotation Methodology for Product Category Matching in E-Commerce Using GPT.” 2023 International Conference on Computer Science and Emerging Technologies (CSET), IEEE, 2023, pp. 1–6. 10.1109/CSET58993.2023.10346684
LXI. W.A.H.M. Ghanem, et al. “Metaheuristic Based IDS Using Multi-Objective Wrapper Feature Selection and Neural Network Classification.” In: Anbar M., Abdullah N., Manickam S., editors. Advances in Cyber Security. ACeS 2020. Communications in Computer and Information Science, vol 1347. Springer, Singapore, 2021. 10.1007/978-981-33-6835-4_26
LXII. Xiang, Yi, et al. “Fog Computing: Platform and Applications.” Proceedings of the 2015 Workshop on Mobile Big Data, ACM, 2019, pp. 37–42. 10.1145/2791928.2791932
LXIII. Zhou, J., et al. “Security and Privacy for Cloud-Based IoT: Challenges.” IEEE Communications Magazine, vol. 56, no. 3, 2018, pp. 52–57. 10.1109/MCOM.2018.1700237

View Download

DOUBLE ELZAKI TRANSFORM AND ADOMIAN POLYNOMIALS FOR SOLVING BENJAMIN ONO AND BUCKMASTER EQUATIONS

Authors:

Inderdeep Singh, Parvinder Kaur

DOI NO:

https://doi.org/10.26782/jmcms.2026.01.00006

Abstract:

In this research paper, we have proposed a new technique for resolving the Benjamin-Ono and Buckmaster equations that come up in many engineering and science applications. The double Elzaki transform and the Adomian polynomials are coupled in the suggested hybrid approach. Experiments have been carried out to verify the correctness and simplicity of the suggested scheme. To assess the effectiveness of the suggested scheme, the outcomes so obtained are compared with the results obtained by the variational iteration method.

Keywords:

Double Elzaki Transform,Adomian Decomposition method,Benjamin-Ono Equation,Buckmaster Equations,Variational Iteration Method (VIM),Test examples,

References:

I. Abbaoui, K., and Y. Cherruault. “Convergence of Adomian’s Method Applied to Differential Equations.” Computers & Mathematics with Applications, vol. 28, no. 5, 1994, pp. 103–109. 10.1016/0898-1221(94)00144-8.
II. Ahmed, S. “Application of Sumudu Decomposition Method for Solving Burger’s Equation.” Advances in Theoretical and Applied Mathematics, vol. 9, 2014, pp. 23–26.
III. Alderremy, A. A., and T. M. Elzaki. “On the New Double Integral Transform for Solving Singular System of Hyperbolic Equations.” Journal of Nonlinear Sciences and Applications, vol. 11, 2018, pp. 1207–1214.
IV. Eltayeb, H., and A. Kilicman. “A Note on Double Laplace Transform and Telegraphic Equations.” Abstract and Applied Analysis, vol. 2013, 2013, Article ID 932578. 10.1155/2013/932578.
V. Elzaki, T. “The New Integral Transform: Elzaki Transform.” Global Journal of Pure and Applied Mathematics, vol. 7, 2011, pp. 57–64.
VI. Elzaki, T. M., and E. M. A. Hilal. “Solution of Linear and Non-Linear Partial Differential Equations Using Mixture of Elzaki Transform and the Projected Differential Transform Method.” Mathematical Theory and Modeling, vol. 2, 2012, pp. 1–12.
VII. Elzaki, T. M., and E. M. A. Hilal. “Solution of Telegraph Equation by Modified Double Sumudu Transform ‘Elzaki Transform.’” Mathematical Theory and Modeling, vol. 2, 2012, pp. 95–103.
VIII. Elzaki, T. M., and S. M. Elzaki. “On the Connections between Laplace and Elzaki Transforms.” Advances in Theoretical and Applied Mathematics, vol. 6, 2011, pp. 1–10.
IX. Elzaki, T. M., and S. M. Elzaki. “On the Elzaki Transform and Ordinary Differential Equations with Variable Coefficients.” Advances in Theoretical and Applied Mathematics, vol. 6, 2011, pp. 41–46.
X. Elzaki, T. M., S. M. Elzaki, and E. M. A. Hilal. “Elzaki and Sumudu Transforms for Solving Some Differential Equations.” Global Journal of Pure and Applied Mathematics, vol. 8, 2012, pp. 167–173.
XI. Hassaballa, A. A., and Y. A. Salih. “On Double Elzaki Transform and Double Laplace Transform.” IOSR Journal of Mathematics, vol. 11, 2015, pp. 35–41.
XII. Hassan, M. A., and T. M. Elzaki. “Double Elzaki Transform Decomposition Method for Solving Non-Linear Partial Differential Equations.” Journal of Applied Mathematics and Physics, vol. 8, 2020, pp. 1463–1471.
XIII. Hassan, M. A., and T. M. Elzaki. “Double Elzaki Transform Decomposition Method for Solving Third Order Korteweg–De Vries Equations.” Journal of Applied Mathematics and Physics, vol. 9, 2021, pp. 21–30. 10.4236/jamp.2021.91003.
XIV. Hussain, E. A., and Z. M. Alwan. “The Finite Volume Method for Solving Buckmaster’s Equation, Fisher’s Equation, and Sine-Gordon Equation for PDEs.” International Mathematical Forum, vol. 8, 2013, pp. 599–617.
XV. Idowu, K. O., et al. “A Semi-Analytic Hybrid Approach for Solving the Buckmaster Equation: Application of the Elzaki Projected Differential Transform Method.” Engineering Reports, vol. 7, no. 3, 2025, pp. 1–15. 10.1002/eng2.70044.
XVI. Idrees, M. I., et al. “On the Convergence of Double Elzaki Transform.” International Journal of Advanced and Applied Sciences, vol. 5, no. 6, 2018, pp. 19–24. 10.21833/ijaas.2018.06.003.
XVII. Ige, O. E., et al. “Adomian Polynomial and Elzaki Transform Method of Solving Third Order Korteweg–De Vries Equations.” Global Journal of Pure and Applied Mathematics, vol. 15, no. 3, 2019, pp. 261–277.
XVIII. Kenig, C. E., and K. D. Koenig. “On the Local Well-Posedness of the Benjamin–Ono and Modified Benjamin–Ono Equations.” Mathematical Research Letters, vol. 10, 2003, pp. 879–895.
XIX. Koch, H., and N. Tzvetkov. “On the Local Well-Posedness of the Benjamin–Ono Equation in H^s(R).” International Mathematics Research Notices, no. 26, 2003, pp. 1449–1464. 10.1155/S1073792803211260
XX. Kumari, U., and I. Singh. “Homotopy Perturbation Technique for Solving Higher Dimensional Time Fractional Burger–Huxley Equations.” American Journal of Applied Mathematics, vol. 13, no. 4, 2025, pp. 245–255.
XXI. Kumari, U., and I. Singh. “Two Accurate Semi-Analytical Techniques for Solving (2+1)-D and (3+1)-D Schrödinger Equations.” IAENG International Journal of Applied Mathematics, vol. 55, no. 2, 2025, pp. 348–355.
XXII. Ponce, G. “On the Global Well-Posedness of the Benjamin–Ono Equation.” Differential and Integral Equations, vol. 4, 1991, pp. 527–542.
XXIII. Singh, I., and P. Kaur. “Double Elzaki Decomposition Method for Solving PDEs Arising during Liquid Drop Formations.” Journal of Mechanics of Continua and Mathematical Sciences, vol. 19, no. 11, 2024, pp. 44–55. DOI: 10.26782/jmcms.2024.11.00004.
XXIV. Singh, I., and U. Kumari. “Elzaki Transform Homotopy Perturbation Method for Solving Two-Dimensional Time-Fractional Rosenau–Hyman Equation.” MATHEMATIKA, MJIM, vol. 39, no. 2, 2023, pp. 159–171.
XXV. Taghizadeh, N., M. Mirzazadeh, and F. Farahrooz. “Exact Soliton Solutions for Second-Order Benjamin–Ono Equation.” Applications and Applied Mathematics: An International Journal, vol. 6, 2011, pp. 384–395.
XXVI. Wazwaz, A. M. “A Reliable Modification of Adomian Decomposition Method.” Applied Mathematics and Computation, vol. 102, no. 1, 1999, pp. 77–86. 10.1016/S0096-3003(98)10024-3.

View Download