Archive

CLOUD-BASED SECURITY APPROACHES FOR SAFEGUARDING IOT ENVIRONMENTS AND DEVICES

Authors:

M. Hafiz Yusoff, Belal alifan, Waheed Ali H. M. Ghanem, Syarilla Iryani Ahmad Saany, Julaily Aida Jusoh, Yousef A. Baker El-Ebiary

DOI NO:

https://doi.org/10.26782/jmcms.2026.01.00001

Abstract:

Introduction: The widespread adoption of Internet of Things (IoT) devices has transformed multiple industries, enhancing operational efficiency and convenience. However, the rapid expansion of IoT ecosystems also brings forth significant security challenges. Traditional security frameworks often fail to adequately protect these systems due to their large scale, diversity, and limited resources. In response, cloud-based security solutions have emerged as a promising alternative, offering centralized management, advanced authentication techniques, and real-time threat monitoring. Problem Statement: IoT environments are vulnerable to various security risks, including unauthorized access, data breaches, and device manipulation. Existing security mechanisms often fall short when it comes to defending against sophisticated cyber-attacks targeting IoT devices and networks. The resource-constrained nature of many IoT devices further limits the implementation of robust local security measures. As a result, there is an urgent need for effective, cloud-based security solutions designed specifically for the unique demands of IoT systems. Objective: This research aims to explore the effectiveness of cloud-based security solutions in mitigating the security challenges faced by IoT environments and devices. The study focuses on evaluating the performance of cloud-based authentication mechanisms, intrusion detection systems, and encryption techniques in strengthening the security and privacy of IoT ecosystems. Methodology: A comprehensive approach is employed, combining a literature review, case studies, and empirical research to assess the current landscape of IoT security in smart environments. Data collection includes unstructured interviews with industry experts and stakeholders, offering insights into current practices and emerging security trends. The research framework incorporates threat modeling, risk assessments, and the development of proactive security strategies. Results: Initial findings indicate that cloud-based security solutions offer several benefits for protecting IoT environments and devices. Centralized management enhances integration and scalability, while advanced authentication methods, such as multi-factor and biometric authentication, improve access control. Real-time threat detection and response capabilities further bolster security by enabling timely interventions to prevent breaches and attacks. Conclusion: Cloud-based security solutions present a highly effective approach to addressing the unique security concerns of IoT environments and devices. By leveraging the scalability, flexibility, and computational power of cloud platforms, organizations can enhance the resilience of their IoT deployments against evolving cyber threats. However, further research is needed to optimize cloud-based security tools to better serve diverse IoT applications and use cases.

Keywords:

Internet of Things (IoT),Security Solutions,Authentication,Intrusion Detection,Data Encryption,Cloud Computing,

References:

I. A. Greeni, et al. “BrainLang DL: A Deep Learning Approach to FMRI for Unveiling Neural Correlates of Language across Cultures” International Journal of Advanced Computer Science and Applications (IJACSA), 15(6), 2024. 10.14569/IJACSA.2024.01506114
II. Ahmad Saany, S. I., et al. “Exploitation of a Technique in Arranging an Islamic Funeral.” Proceedings of the 2nd International Conference on Smart Computing and Electronic Enterprise (ICSCEE), IEEE, 2021, pp. 1–8. 10.1109/ICSCEE50312.2021.9498224
III. Ali, M. A., and M. S. Hossain. “Cloud-Assisted Privacy-Preserving Data Integrity Verification Scheme for IoT Devices.” IEEE Internet of Things Journal, vol. 8, no. 12, 2021, pp. 10177–10186. 10.1109/JIOT.2021.3113780
IV. Ali, S. A., M. Ansari, and M. Alam. “Resource Management Techniques for Cloud-Based IoT Environment.” Internet of Things (IoT) Concepts and Applications, Springer, 2020, pp. 63–87. 10.1007/978-3-030-33596-0_4
V. Alrawais, A., A. Alhothaily, and C. Hu. “Secure and Lightweight Data Sharing Scheme for IoT Devices in Cloud Computing Environments.” IEEE Internet of Things Journal, vol. 10, no. 1, 2023, pp. 580–587. 10.1109/JIOT.2022.3147475
VI. Al-Sammarraie, N. A., Y. M. H. Al-Mayali, and Y. A. Baker El-Ebiary. “Classification and Diagnosis Using Back Propagation Artificial Neural Networks (ANN).” Proceedings of the International Conference on Smart Computing and Electronic Enterprise (ICSCEE), IEEE, 2018, pp. 1–5. 10.1109/ICSCEE.2018.8538383
VII. Altrad, et al. “Amazon in Business to Customers and Overcoming Obstacles.” Proceedings of the 2nd International Conference on Smart Computing and Electronic Enterprise (ICSCEE), IEEE, 2021, pp. 175–179. 10.1109/ICSCEE50312.2021.9498129
VIII. Anna Gustina Zainal, et al. “Cross-Cultural Language Proficiency Scaling using Transformer and Attention Mechanism Hybrid Model” International Journal of Advanced Computer Science and Applications (IJACSA), 15(6), 2024. 10.14569/IJACSA.2024.01506116
IX. Anushree A., et al. “Real-time Air Quality Monitoring in Smart Cities using IoT-enabled Advanced Optical Sensors” International Journal of Advanced Computer Science and Applications (IJACSA), 15(4), 2024. 10.14569/IJACSA.2024.0150487
X. Antonius, Franciskus, et al. “Incorporating Natural Language Processing into Virtual Assistants: An Intelligent Assessment Strategy for Enhancing Language Comprehension.” International Journal of Advanced Computer Science and Applications, vol. 14, no. 10, 2023. 10.14569/IJACSA.2023.0141079
XI. Araddhana Arvind Deshmukh, et al. “Event-based Smart Contracts for Automated Claims Processing and Payouts in Smart Insurance” International Journal of Advanced Computer Science and Applications (IJACSA), 15(4), 2024. 10.14569/IJACSA.2024.0150486
XII. Aradhana Sahu, et al. “Federated LSTM Model for Enhanced Anomaly Detection in Cyber Security: A Novel Approach for Distributed Threat” International Journal of Advanced Computer Science and Applications (IJACSA), 15(6), 2024. 10.14569/IJACSA.2024.01506125
XIII. Arifuzzaman, M., M. Alazab, and J. Bailey. “Security and Privacy Issues in IoT-Based Healthcare Clouds: A Comprehensive Survey.” IEEE Access, vol. 5, 2017, pp. 18414–18431. 10.1109/ACCESS.2017.2753445
XIV. Babu, S. M., A. J. Lakshmi, and B. T. Rao. “A Study on Cloud Based Internet of Things: CloudIoT.” Proceedings of the Global Conference on Communication Technologies (GCCT), IEEE, 2015, pp. 60–65. 10.1109/GCCT.2015.7342681
XV. Baker El-Ebiary, Y. A. “The Effect of Organizational Factors, Technology, and Social Influences on E-Government Adoption in Jordan.” Proceedings of the International Conference on Smart Computing and Electronic Enterprise (ICSCEE), IEEE, 2018, pp. 1–4. 10.1109/ICSCEE.2018.8538394
XVI. Baker El-Ebiary, Y. A., et al. “Blockchain as a Decentralized Communication Tool for Sustainable Development.” Proceedings of ICSCEE 2021, IEEE, 2021, pp. 127–133. 10.1109/ICSCEE50312.2021.9497910
XVII. Baker El-Ebiary, Y. A., et al. “Determinants of Customer Purchase Intention Using Zalora Mobile Commerce Application.” Proceedings of ICSCEE 2021, IEEE, 2021, pp. 159–163. 10.1109/ICSCEE50312.2021.9497995
XVIII. Baker El-Ebiary, Y. A., et al. “E-Government and E-Commerce Issues in Malaysia.” Proceedings of ICSCEE 2021, IEEE, 2021, pp. 153–158. https://doi.org/10.1109/ICSCEE50312.2021.9498092
XIX. Baker El-Ebiary, Y. A., et al. “Mobile Commerce and Its Apps: Opportunities and Threats in Malaysia.” Proceedings of ICSCEE 2021, IEEE, 2021, pp. 180–185. 10.1109/ICSCEE50312.2021.9498228
XX. Baker El-Ebiary, Y. A., et al. “Track Home Maintenance Business Centers with GPS Technology in the IR 4.0 Era.” Proceedings of ICSCEE 2021, IEEE, 2021, pp. 134–138. 10.1109/ICSCEE50312.2021.9498070
XXI. Bamansoor, S., et al. “Efficient Online Shopping Platforms in Southeast Asia.” Proceedings of ICSCEE 2021, IEEE, 2021, pp. 164–168. 10.1109/ICSCEE50312.2021.9497901
XXII. Bamansoor, S., et al. “Evaluation of Chinese Electronic Enterprise from Business and Customers Perspectives.” Proceedings of ICSCEE 2021, IEEE, 2021, pp. 169–174. 10.1109/ICSCEE50312.2021.9498093
XXIII. Choo, K. K. R., P. Vinod, and E. Rokon. “Security and Privacy in Cloud-Assisted Internet of Things (IoT): A Survey.” IEEE Communications Surveys & Tutorials, vol. 22, no. 1, 2020, pp. 447–469. 10.1109/COMST.2019.2935802
XXIV. Deeba, K., et al. “Optimizing Crop Yield Prediction in Precision Agriculture with Hyperspectral Imaging-Unmixing and Deep Learning.” International Journal of Advanced Computer Science and Applications, vol. 14, no. 12, 2023. 10.14569/IJACSA.2023.0141261
XXV. Farooq, M. O., F. K. Hussain, and M. B. Amin. “Cloud-Based Security and Privacy Preserving Mechanisms for IoT Systems: A Survey.” IEEE Access, vol. 6, 2018, pp. 16592–16629. 10.1109/ACCESS.2018.2814178
XXVI. Ganesh Khekare, et al. “Optimizing Network Security and Performance Through the Integration of Hybrid GAN-RNN Models in SDN-Based Access Control.” International Journal of Advanced Computer Science and Applications, vol. 14, no. 12, 2023. 10.14569/IJACSA.2023.0141262
XXVII. Gharaibeh, A., A. Khreishah, and I. Khalil. “A Survey of Techniques for IoT Communication, Security, and Privacy.” IEEE Communications Surveys & Tutorials, vol. 22, no. 3, 2020, pp. 2034–2068. 10.1109/COMST.2020.2975875
XXVIII. Ghanem, W. A. H. M., et al. “Metaheuristic Based IDS Using Multi-Objective Wrapper Feature Selection.” Advances in Cyber Security, Springer, 2021. 10.1007/978-981-33-6835-4_26
XXIX. Hasan, Mohammad Kamrul, et al. “Lightweight Cryptographic Algorithms for Guessing Attack Protection in Complex IoT Applications.” Complexity, 2021, Article ID 5540296. 10.1155/2021/5540296
XXX. Hilles, S. M. S., et al. “Adaptive Latent Fingerprint Image Segmentation and Matching Using Chan-Vese Technique.” Proceedings of ICSCEE 2021, IEEE, 2021, pp. 2–7. 10.1109/ICSCEE50312.2021.9497996
XXXI. Hilles, S. M. S., et al. “Latent Fingerprint Enhancement and Segmentation Technique Based on Hybrid Edge Adaptive DTV Model.” Proceedings of ICSCEE 2021, IEEE, 2021, pp. 8–13. 10.1109/ICSCEE50312.2021.9498025
XXXII. Hong, H. G., and Y. Kim. “A Lightweight and Secure Authentication Scheme for IoT Devices in Cloud Environments.” IEEE Internet of Things Journal, vol. 10, no. 5, 2023, pp. 4280–4289. 10.1109/JIOT.2022.3196429
XXXIII. Islam, S. M. R., and S. Nuzhat. “A Blockchain-Based Security Framework for IoT and Cloud Integration.” Proceedings of ICIoT 2020, IEEE, 2020. 10.1109/ICIoT49017.2020.9259799
XXXIV. Jang, W., and J. Jang. “Security Architecture for IoT and Cloud Integration Using Blockchain.” Proceedings of CloudCom 2019, IEEE, 2019. 10.1109/CloudCom2019.00057
XXXV. Jukić, O., I. Špeh, and I. Heđi. “Cloud-Based Services for the Internet of Things.” Proceedings of MIPRO 2018, IEEE, 2018, pp. 372–377. 10.23919/MIPRO.2018.8400114
XXXVI. Jusoh, J. A., et al. “Track Student Attendance at a Time of the COVID-19 Pandemic Using Location-Finding Technology.” Proceedings of ICSCEE 2021, IEEE, 2021, pp. 147–152. 10.1109/ICSCEE50312.2021.9498043
XXXVII. Khan, S. U., and S. Hassan. “A Comprehensive Survey of Security and Privacy in Internet-of-Things (IoT) Devices.” IEEE Communications Surveys & Tutorials, vol. 21, no. 3, 2019, pp. 2791–2835. 10.1109/COMST.2019.2905611
XXXVIII. Khodaei, M., and H. R. Rabiee. “Cloud-IoT Integration: A Survey.” IEEE Internet of Things Journal, vol. 6, no. 6, 2019, pp. 11289–11313. 10.1109/JIOT.2019.2923475
XXXIX. Koo, J., et al. “Security Architecture for Cloud-Based Command and Control System in IoT Environment.” Applied Sciences, vol. 10, no. 3, 2020, p. 1035. 10.3390/app10031035
XL. Lakshmi, K., et al. “Efficiency Analysis of Firefly Optimization-Enhanced GAN-Driven Model for Melanoma Classification.” International Journal of Advanced Computer Science and Applications, vol. 14, no. 11, 2023. 10.14569/IJACSA.2023.0141175
XLI. Meraj, S. T., et al. “A Diamond Shaped Multilevel Inverter with Dual Mode of Operation.” IEEE Access, vol. 9, 2021, pp. 59873–59887. 10.1109/ACCESS.2021.3067139
XLII. Mohamad, M. B., et al. “Enterprise Problems and Proposed Solutions Using the Concept of E-Commerce.” Proceedings of the 2nd International Conference on Smart Computing and Electronic Enterprise (ICSCEE), IEEE, 2021, pp. 186–192. 10.1109/ICSCEE50312.2021.9498197
XLIII. Mukhedkar, Moresh, et al. “Enhanced Land Use and Land Cover Classification Through Human Group-Based Particle Swarm Optimization–Ant Colony Optimization Integration with Convolutional Neural Network.” International Journal of Advanced Computer Science and Applications, vol. 14, no. 11, 2023. 10.14569/IJACSA.2023.0141142
XLIV. Mukhedkar, Moresh, et al. “Feline Wolf Net: A Hybrid Lion–Grey Wolf Optimization Deep Learning Model for Ovarian Cancer Detection.” International Journal of Advanced Computer Science and Applications, vol. 14, no. 9, 2023. 10.14569/IJACSA.2023.0140962
XLV. Narayan Das, Nripendra, et al. “Utilizing Deep Convolutional Neural Networks and Non-Negative Matrix Factorization for Multi-Modal Image Fusion.” International Journal of Advanced Computer Science and Applications, vol. 14, no. 9, 2023. 10.14569/IJACSA.2023.0140963
XLVI. Naramala, Venkateswara Rao, et al. “Enhancing Diabetic Retinopathy Detection Through Machine Learning with Restricted Boltzmann Machines.” International Journal of Advanced Computer Science and Applications, vol. 14, no. 9, 2023. 10.14569/IJACSA.2023.0140961
XLVII. Pathmanathan, P. R., et al. “The Benefit and Impact of E-Commerce in Tourism Enterprises.” Proceedings of the 2nd International Conference on Smart Computing and Electronic Enterprise (ICSCEE), IEEE, 2021, pp. 193–198. 10.1109/ICSCEE50312.2021.9497947
XLVIII. Pawar, B., et al. “Multi-Scale Deep Learning-Based Recurrent Neural Network for Improved Medical Image Restoration and Enhancement.” International Journal of Advanced Computer Science and Applications, vol. 14, no. 10, 2023. 10.14569/IJACSA.2023.0141088
XLIX. Preethi, K. N., et al. “Enhancing Startup Efficiency: Multivariate DEA for Performance Recognition and Resource Optimization in a Dynamic Business Landscape.” International Journal of Advanced Computer Science and Applications, vol. 14, no. 8, 2023. 10.14569/IJACSA.2023.0140869
L. Rahman, M. A., and M. S. Hossain. “Towards Cloud-Based Framework for Security and Privacy of IoT Systems.” Proceedings of the IEEE HPCC/SmartCity/DSS Conference, IEEE, 2017, pp. 800–807. 10.1109/HPCC-SmartCity-DSS.2017.119
LI. Raj, R. S., and H. K. D. Sarma. “A Survey on Security and Privacy Issues in IoT Integrated Cloud Environment.” Proceedings of the International Conference on Communication and Electronics Systems (ICCES), IEEE, 2018, pp. 442–446. 10.1109/CESYS.2018.8627207

LII. Ravi Prasad, et al. “Forecasting Electricity Consumption Through a Fusion of Hybrid Random Forest Regression and Linear Regression Models Utilizing Smart Meter Data.” Journal of Theoretical and Applied Information Technology, vol. 101, no. 21, 2023. https://www.jatit.org/volumes/Vol101No21/6Vol101No21.pdf
LIII. Sengupta, S., and S. Chakraborty. “A Survey on Security and Privacy Issues of Internet of Things (IoT) and Cloud Computing.” Proceedings of the International Conference on Computing, Communication and Automation (ICCCA), IEEE, 2017, pp. 708–713. 10.1109/CCAA.2017.8229871
LIV. Sundaramoorthy, K., et al. “Hybrid Optimization with Recurrent Neural Network-Based Medical Image Processing for Predicting Interstitial Lung Disease.” International Journal of Advanced Computer Science and Applications, vol. 14, no. 4, 2023. 10.14569/IJACSA.2023.0140462
LV. Suresh Babu Jugunta, et al. “Exploring the Insights of Bat Algorithm-Driven XGB-RNN (BARXG) for Optimal Fetal Health Classification in Pregnancy Monitoring.” International Journal of Advanced Computer Science and Applications, vol. 14, no. 11, 2023. 10.14569/IJACSA.2023.0141174
LVI. Suresh Babu Jugunta, et al. “Unleashing the Potential of Artificial Bee Colony Optimized RNN–Bi-LSTM for Autism Spectrum Disorder Diagnosis.” International Journal of Advanced Computer Science and Applications, vol. 14, no. 11, 2023. 10.14569/IJACSA.2023.0141173
LVII. Sweety Bakyarani, E., et al. “Optimizing Network Intrusion Detection with a Hybrid Adaptive Neuro-Fuzzy Inference System.” International Journal of Advanced Computer Science and Applications, vol. 14, no. 11, 2023. 10.14569/IJACSA.2023.0141131
LVIII. Tanwar, S., R. U. Khan, and A. Kaur. “A Trustworthy and Efficient Data Fusion Framework for Secure IoT in Cloud Environment.” IEEE Internet of Things Journal, vol. 8, no. 16, 2021, pp. 12964–12974. 10.1109/JIOT.2021.3106535
LIX. Tarshany, Y. M. A., Y. Al Moaiad, and Y. A. Baker El-Ebiary. “Legal Maxims Artificial Intelligence Application for Sustainable Architecture and Interior Design.” Proceedings of ETSAIDE 2022, IEEE, 2022, pp. 1–4. 10.1109/ETSAIDE53569.2022.9906357
LX. Tiwari, Atul, et al. “Optimized Ensemble of Hybrid RNN–GAN Models for Accurate and Automated Lung Tumour Detection from CT Images.” International Journal of Advanced Computer Science and Applications, vol. 14, no. 7, 2023 10.14569/IJACSA.2023.0140769
LXI. Wahsheh, F. R., et al. “E-Commerce Product Retrieval Using Knowledge from GPT-4.” Proceedings of the International Conference on Computer Science and Emerging Technologies (CSET), IEEE, 2023, pp. 1–8. 10.1109/CSET58993.2023.10346860
LXII. Wahsheh, F. R., et al. “An Evaluation and Annotation Methodology for Product Category Matching in E-Commerce Using GPT.” Proceedings of CSET 2023, IEEE, 2023, pp. 1–6. 10.1109/CSET58993.2023.10346684
LXIII. Wang, H., Q. Zhang, and J. Wang. “A Lightweight Cloud-Based Data Integrity Verification Scheme for IoT Devices.” IEEE Internet of Things Journal, vol. 10, no. 2, 2023, pp. 1315–1323. 10.1109/JIOT.2022.3147475
LXIV. Wang, S., and L. D. Xu. “A Survey on the Internet of Things Security.” Proceedings of the IEEE GreenCom Conference, IEEE, 2018, pp. 21–27. 10.1109/GreenCom-CPSCom.2018.00010
LXV. Wazid, M., et al. “Authentication in Cloud-Driven IoT-Based Big Data Environment: Survey and Outlook.” Journal of Systems Architecture, vol. 97, 2019, pp. 185–196. 10.1016/j.sysarc.2018.12.005
LXVI. Zawaideh, F. H., et al. “Blockchain Solution for SMEs Cybersecurity Threats in E-Commerce.” Proceedings of CSET 2023, IEEE, 2023, pp. 1–7. 10.1109/CSET58993.2023.10346628
LXVII. Zawaideh, F. H., et al. “E-Commerce Supply Chains with Considerations of Cyber-Security.” Proceedings of CSET 2023, IEEE, 2023, pp. 1–8. 10.1109/CSET58993.2023.10346738
LXVIII. Zhang, Y., et al. “Secure and Lightweight Cloud-Based Key Management Scheme for IoT Devices.” IEEE Internet of Things Journal, vol. 10, no. 3, 2023, pp. 2497–2506. 10.1109/JIOT.2022.3131279
LXIX. Zhang, H., Q. Wang, and J. Wang. “A Lightweight Cloud-Based Data Integrity Verification Scheme for IoT Devices.” IEEE Internet of Things Journal, vol. 10, no. 2, 2023, pp. 1315–1323. 10.1109/JIOT.2022.3147475
LXX. Hasan, M. K., et al. “Lightweight Cryptographic Algorithms for Guessing Attack Protection in Complex Internet of Things Applications.” Complexity, 2021, Article ID 5540296. 10.1155/2021/5540296

View Download

ADVANCED PREDICTION MODEL FOR EARLY DETECTION OF LUMPY SKIN DISEASE USING DEEP LEARNING AND IMAGE PROCESSING

Authors:

Sandeep Sharma, Kapil Joshi, Saruchi, Ashish Rayal, Prashant Kumar Choudhary, Anupam Bonkra, Vipin Kumar, Gopal Ghosh

DOI NO:

https://doi.org/10.26782/jmcms.2026.01.00002

Abstract:

The comprehensive study investigates the application of cutting-edge machine learning algorithms and advanced image processing techniques for the early detection of lumpy skin disease in cattle. The proposed robust analytical framework that evaluates multiple predictive models using comprehensive performance metrics, including F1 scores ranging from 0.87 to 0.97, precision up to 0.984, recall up to 0.963, and accuracy peaking at 97.77%. The novel approach incorporates pixel-level analysis to quantify disease severity through the ratio of affected to healthy tissue, complemented by processing speed delays between 5.54ms and 20.95ms. The research demonstrates significant improvements over traditional diagnostic methods, with particular emphasis on the model's ability to identify high-risk cases requiring immediate intervention. These findings have substantial implications for veterinary medicine, agricultural technology development, and livestock management policies, potentially revolutionizing disease surveillance systems in the agricultural sector.

Keywords:

Artificial Intelligence,Convolutional neural network,Deep Learning,Lumpy skin disease,Lumpy Pixel Ratio,Machine Learning,Precision livestock farming,

References:

I. Bonazzola, R., et al. “Unsupervised Ensemble-Based Phenotyping Enhances Discoverability of Genes Related to Left-Ventricular Morphology.” Nature Machine Intelligence, vol. 6, no. 3, 2024, pp. 291–306. 10.1038/s42256-024-00628-5
II. Chen, C., et al. “An Automatic Inspection System for Pest Detection in Granaries Using YOLOv4.” Computers and Electronics in Agriculture, vol. 201, 2022, 107302. 10.1016/j.compag.2022.107302
III. Chen, K., et al. “Twofold Rigidity Activates Ultralong Organic High-Temperature Phosphorescence.” Nature Communications, vol. 15, no. 1, 2024, 1269. 10.1038/s41467-024-37527-6
IV. Cheng, B., et al. “Active Disturbance Rejection Control in Magnetic Bearing Rotor Systems with Redundant Structures.” Sensors, vol. 22, no. 8, 2022, 3012. 10.3390/s22083012
V. Deborne, J., et al. “Implantable Theranostic Device for In Vivo Real-Time NMR Evaluation of Drug Impact in Brain Tumors.” Scientific Reports, vol. 14, no. 1, 2024, 4541. 10.1038/s41598-024-39571-8
VI. Degenfellner, J., and M. Templ. “Modeling Bee Hive Dynamics: Assessing Colony Health Using Hive Weight and Environmental Parameters.” Computers and Electronics in Agriculture, vol. 218, 2024, 108742. 10.1016/j.compag.2024.108742
VII. Dragoni, M., et al. “Supporting Patients and Clinicians during the Breast Cancer Care Path with AI: The Arianna Solution.” Artificial Intelligence in Medicine, vol. 138, 2023, 102514. 10.1016/j.artmed.2023.102514
VIII. Jo, W. K., et al. “Potential Zoonotic Sources of SARS-CoV-2 Infections.” Transboundary and Emerging Diseases, vol. 68, no. 4, 2021, pp. 1824–1834. 10.1111/tbed.13872
IX. Kim, K., et al. “Prevalence of Asthma in Preterm and Associated Risk Factors Based on Prescription Data from the Korean National Health Insurance Database.” Scientific Reports, vol. 13, no. 1, 2023, 4484. 10.1038/s41598-023-31558-z
X. Li, X., et al. “Forecasting Greenhouse Air and Soil Temperatures: A Multi-Step Time Series Approach Employing Attention-Based LSTM Network.” Computers and Electronics in Agriculture, vol. 217, 2024, 108602. 10.1016/j.compag.2023.108602
XI. Belke, Christoph H., et al. “Morphological flexibility in robotic systems through physical polygon meshing.” Nature Machine Intelligence 5.6 (2023): 669-675. https://www.nature.com/articles/s42256-023-00676-8
XII. Stigall, A. R., et al. “A Formalized Method to Acclimate Dogs to Voluntary Treadmill Locomotion at Various Speeds and Inclines.” Animals, vol. 12, no. 5, 2022, 567. 10.3390/ani12050567
XIII. Su, W. J., et al. “Acute Reactions After a Homologous Primary COVID-19 Vaccination Series: Analysis of Taiwan V-Watch Data.” Vaccine, vol. 41, no. 17, 2023, pp. 2853–2859. 10.1016/j.vaccine.2023.04.038
XIV. van den Heever, M. J. J., et al. “The Economic Impact of Heartwater on the South African Livestock Industry and the Need for a New Vaccine.” Preventive Veterinary Medicine, vol. 203, 2022, 105634. 10.1016/j.prevetmed.2022.105634
XV. Vanegas, E., et al. “Sensing Systems for Respiration Monitoring: A Technical Systematic Review.” Sensors, vol. 20, no. 18, 2020, 5446. 10.3390/s20185446
XVI. Wang, B., et al. “Machine Learning Optimization Model for Reducing the Electricity Loads in Residential Energy Forecasting.” Sustainable Computing: Informatics and Systems, vol. 38, 2023, 100876. 10.1016/j.suscom.2023.100876
XVII. Yu, Z., et al. “Parameter Optimization and Simulation Analysis of Floating Root Cutting Mechanism for Garlic Harvester.” Computers and Electronics in Agriculture, vol. 204, 2023, 107521. 10.1016/j.compag.2023.107521

View Download

ENERGY AND PERFORMANCE EVALUATION OF PVT-POROUS SOLAR DRYER

Authors:

E. Boonthum, U. Teeboonma, A. Namkhet, A. Janyalertadun, P. Somsila, K. Komanee

DOI NO:

https://doi.org/10.26782/jmcms.2026.01.00003

Abstract:

Drying is a critical post-harvest operation for agricultural and herbal products, but remains energy-intensive and performance-limited under humid tropical conditions. This study experimentally investigates the energy performance and drying kinetics of a photovoltaic–thermal (PVT) solar dryer integrated with porous absorber materials to enhance heat and mass transfer. The developed system consists of a 150 W PVT panel, a double-pass solar collector, and porous steel mesh absorbers with porosities of 0.98, 0.97, and 0.96. Experiments were conducted under tropical climatic conditions in Thailand at a low air velocity of 0.07 m/s using kaffir lime leaves as a representative leafy material. The results show that drying occurred entirely in the falling-rate period and was governed by internal moisture diffusion. Porous integration improved thermal uniformity and airflow turbulence, increasing the drying rate by 43.73–56.01% and reducing specific energy consumption (SEC) by 30.44–36.01% compared with the non-porous configuration. Optimal performance was achieved at a porosity of 0.96, yielding the highest Deff (8.59x10-13 m²/s) and the lowest SEC of 21.84 MJ/kg. Thin-layer analysis confirmed that the Page model best described the drying kinetics (R2 = 0.980–0.999). Statistical analysis (ANOVA) verified that porosity is a dominant factor influencing performance (p < 0.01). Overall, the integration of porous materials into a PVT solar dryer significantly enhances drying performance and represents an energy-efficient approach for drying leafy agricultural products in humid tropical regions.

Keywords:

PVT-porous dryer,photovoltaic-thermal,porous material,solar drying,energy efficiency,

References:

I. Al-Jethelah, M., Deyab, H., & Yaseen, T. “Thermal performance of novel indirect passive solar dryer.” Scientific Review Engineering and Environmental Sciences, vol. 30, no. 2, 2021, pp. 293–303. 10.22630/PNIK
S.2021.30.2.25.

II. Ankur, G., Agnimitra, B., Biplab, D., & Bale, V.R. “Development and testing of novel photovoltaic-thermal collector-based solar dryer for green tea drying application,” Solar Energy, vol. 231, 2022, pp. 1072-1091. 10.1016/j.solener.2021.12.030.
III. Ankur, G., Biplab, D., Erhan, A., Mehmet, D., Meltem, K., & Omer, F. C. “Artificial neural networks based computational and experimental evaluation of thermal and drying performance of partially covered PVT solar dryer,” Process Safety and Environmental Protection, vol. 183, 2024, pp. 1170-1185. 10.1016/j.psep.2024.01.068.
IV. AOAC International, Official Methods of Analysis of AOAC International. Virginia, USA: Association of Official Analytical Chemists, 2019.
V. Boonthum, E., Sirichana, S., Namkhet, A., & Teeboonma, U. “Comparative study on performance of passive and active solar dryer.” Key Engineering Materials, vol. 978, 2024, pp. 97-103. 10.4028/p-2GFc9W.
VI. Coban, S., Selimefendigil, F., & Oztop, H. “Convective drying performance of porous moist objects under turbulent flow conditions: effects of object shape and material.” International Journal of Numerical Methods for Heat & Fluid Flow, vol. 32, no. 7, 2021, pp. 2454–2475. 10.1108/hff-06-2021-0408.
VII. Das, M., Alic, E., & Akpinar, E. “Numerical and experimental analysis of heat and mass transfer in the drying process of the solar drying system.” Engineering Science and Technology, an International Journal, vol. 24, no. 1, 2020, pp. 236-246. 10.1016/j.jestch.2020.10.003.
VIII. Elwakeel, A. E., Villagran, E., Rodriguez, J., Aguilar, C. E., & Ahmed, A. F. “Development, Thermodynamic Evaluation, and Economic Analysis of a PVT-Based Automated Indirect Solar Dryer for Date Fruits.” Sustainability, vol. 17, no. 10, 2025, article 4571. 10.3390/su17104571.
IX. Erdem, Ç., Ataollah, K., Adnan, S.,, İpek, A., Azim, D.T. “Energy and exergy analysis of a photovoltaic thermal (PVT) system used in solar dryer: A numerical and experimental investigation,” Renewable Energy, vol. 180, 2021, pp. 410-423. 10.1016/j.renene.2021.08.081.
X. Fterich, M., Chouikhi, H., Bentaher, H., & Maalej, A. “Experimental parametric study of a mixed-mode forced convection solar dryer equipped with a PV/T air collector,” Solar Energy, vol. 171, 2018, pp. 751–760. 10.1016/j.solener.2018.06.051.
XI. Jasinta E. and Muthukumar P. “Determination of heat transfer coefficients and drying kinetics of red chilli dried in forced convection mixed mode solar dryer.” Thermal Science and Engineering Progress, vol. 19, 2020, pp. 1-7. 10.1016/j.tsep.2020.100607.
XII. Jha, P., Das, B., & Gupta, R. “Performance of air-based photovoltaic thermal collector with fully and partially covered photovoltaic module.” Applied Thermal Engineering, vol. 180, 2020, article 115838. 10.1016/j. applthermaleng.2020.115838
XIII. Kumar, C., Karim, M. A., & Joardder, M. U. H. “Intermittent drying of food products: a critical review.” Journal of Food Engineering, vol. 278, 2020, article 109930. 10.1016/j.jfoodeng.2020.109930.
XIV. Messai, S., Chrusciel, L., Al-Hagan, O., Almuadi, M., & Sghaier, J. “Study and comparison of different drying processes of porous particle at high temperature.” High Temperatures-High Pressures, vol. 51, no. 1, 2022, pp. 27-38. 10.32908/hthp.v51.1103.
XV. Mirzaei, S., Ameri, M., & Mortezapour, H. “Comparative energy-exergy and economic-environmental analyses of recently advanced solar photovoltaic and photovoltaic thermal hybrid dryers: a review.” Drying Technology, vol. 41, 2022, pp. 1-52. 10.1080/07373937.2022.2113793.
XVI. Moghimi, P., Rahimzadeh, H., & Ahmadpour, A. “Experimental and numerical optimal design of a household solar fruit and vegetable dryer.” Solar Energy, vol. 214, 2021, pp. 575–587. 10.1016/j.solener.2020.12.023.
XVII. Mohammad S. B. J., Vali K., & Hadi S. “Design and performance analysis of a new flat solar heating porous collector equipped with vertical copper pipe and porous medium for medicinal plant drying,” Energy, vol. 334, 2025, article 137653. 10.1016/j.energy.2025.137653.
XVIII. Nima F. J., & Steffan T. L. “Performance improvement of a solar air heater by covering the absorber plate with porous material,” Energy, vol. 190, 2020, article 116437. 10.1016/j.energy.2019.116437.
XIX. Rajarajeswari K., & Alok P., Sreekumar A. “Simulation and experimental investigation of fluid flow in porous and non-porous solar heaters,” Solar Energy, vol. 171, 2018, pp. 258-270. 10.1016/j.solener.2018.06.079.
XX. Thamkaew, G., Sjoholm, I., & Galindo, F.G. “A review of drying methods for improving the quality of dried herbs,” Critical Reviews in Food Science and Nutrition, vol. 61, no. 11, 2021, pp. 1763–1786. 10.1080/10408398.2020.1765309.
XXI. Teeboonma U.,& Boonthum E. “Thermal performance of solar heater with porous material,” Journal of Mechanics of Continua and Mathematical Sciences, Special Issue 1, 2019, pp. 723-733. 10.26782/jmcms.2019.03.00072.

View Download

EFFICIENT FPGA REALIZATION OF LIGHTWEIGHT AES FOR LOW-POWER IOT SECURITY SYSTEMS

Authors:

Keshav Kumar, Dr Chinnaiyan Ramasubramanian, Bishwajeet Pandey

DOI NO:

https://doi.org/10.26782/jmcms.2026.01.00004

Abstract:

Background: The growing need for secure communication on resource-constrained systems, such as those in the Internet of Things (IoT), has led to a significant increase in demand for lightweight symmetric ciphers. Nevertheless, different techniques and implementations exist, making the selection of the optimal security solution for a particular application challenging. Objective: This study primarily focuses on implementing an optimised Lightweight Advanced Encryption Standard (LAES) algorithm in hardware to address the critical need for energy-efficient security solutions for IoT devices. Methods: This study implements LAES to meet the security requirements for IoT devices. The Kintex 7 and Spartan 7 FPGAs (Field Programmable Gate Arrays) are utilised for implementation, with critical performance metrics such as hardware area utilisation used to evaluate performance. The algorithm eliminates the computationally expensive MixColumns operation from standard AES while maintaining essential security transformations. Performance evaluation focused on hardware resource utilisation (LUTs, FFs, IO) and power consumption across clock frequencies ranging from 1 ns to 20 ns. Results: The results indicate significant advancements in achieving area and power-efficient designs. Our findings show that the reduction in power consumption is by 95.29% and 92.07% as compared to existing models. The area consumption, such as LUTs, FFs, and IO, has also been significantly decreased compared to existing models. Conclusions: The proposed LAES architecture demonstrates that strategic algorithm optimisation can yield substantial improvements in both power efficiency and hardware utilisation without compromising security, making it highly suitable for IoT deployment.

Keywords:

FPGA,Lightweight Cryptography,IoT Security,Power Optimisation,LAES Algorithm,Area,Data Privacy,VIVADO,

References:

I. Aditya, Yashwant, and Keshav Kumar. “Implementation of High-Performance AES Crypto Processor for Green Communication.” Telematique, vol. 21, no. 1, 2022, pp. 6808-6816.
II. Aditya, Yashwant, and Keshav Kumar. “Implementation of Novel Power Efficient AES Design on High Performance FPGA.” NeuroQuantology, vol. 20, no. 10, 2022, p. 5815.
III. Ahmed, Salman, et al. “Lightweight AES Design for IoT Applications: Optimizations in FPGA and ASIC with DFA Countermeasure Strategies.” IEEE Access, 2025.
IV. Balaji Naik, Bhukya, et al. “Implementation of the AES Algorithm on FPGA.” International Conference on Emerging Research in Computing, Information, Communication and Applications, Springer Nature Singapore, 2023, pp. 89-99.
V. Bisht, Neeraj, Bishwajeet Pandey, and Sandeep Kumar Budhani. “Comparative Performance Analysis of AES Encryption Algorithm for Various LVCMOS on Different FPGAs.” World Journal of Engineering, vol. 20, no. 4, 2023, pp. 669-680.
VI. Çavuşoğlu, Ü., et al. “A Novel Hybrid Encryption Algorithm Based on Chaos and S-AES Algorithm.” Nonlinear Dynamics, vol. 92, no. 4, 2018, pp. 1745-1757.
VII. Equihua, Christian, et al. “A Low-Cost and Highly Compact FPGA-Based Encryption/Decryption Architecture for AES Algorithm.” IEEE Latin America Transactions, vol. 19, no. 9, 2021, pp. 1443-1450.
VIII. Guillén-Fernández, O., et al. “On the Synchronization Techniques of Chaotic Oscillators and Their FPGA-Based Implementation for Secure Image Transmission.” PloS One, vol. 14, no. 2, 2019, p. e0209618.
IX. Kumar, Keshav, et al. “A Design of Power-Efficient AES Algorithm on Artix-7 FPGA for Green Communication.” 2021 International Conference on Technological Advancements and Innovations (ICTAI), IEEE, 2021, pp. 561-564.
X. Kumar, Keshav, K. R. Ramkumar, and Amanpreet Kaur. “A Design Implementation and Comparative Analysis of Advanced Encryption Standard (AES) Algorithm on FPGA.” 2020 8th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), IEEE, 2020, pp. 182-185.
XI. Kumar, Keshav, K. R. Ramkumar, and Amanpreet Kaur. “A Lightweight AES Algorithm Implementation for Encrypting Voice Messages Using Field Programmable Gate Arrays.” Journal of King Saud University-Computer and Information Sciences, vol. 34, no. 6, 2022, pp. 3878-3885.
XII. Kumar, Keshav, Chinnaiyan Ramasubramanian, and Bishwajeet Pandey. “Low Area Design and Implementation of Lightweight Encryption Algorithm on FPGA for IoT Devices.” 2025 IEEE 4th International Conference on AI in Cybersecurity (ICAIC), IEEE, 2025, pp. 1-4.
XIII. Kumar, Thanikodi Manoj, et al. “A Low Area High Speed FPGA Implementation of AES Architecture for Cryptography Application.” Electronics, vol. 10, no. 16, 2021, p. 2023.

XIV. Lara-Nino, Carlos Andres, Miguel Morales-Sandoval, and Arturo Diaz-Perez. “Novel FPGA- based low-cost hardware architecture for the PRESENT block cipher.” In 2016 Euromicro Conference on Digital System Design (DSD), pp. 646-650. IEEE, 2016.
XV. Maazouz, Mohamed, et al. “FPGA Implementation of a Chaos-Based Image Encryption Algorithm.” Journal of King Saud University-Computer and Information Sciences, vol. 34, no. 10, 2022, pp. 9926-9941.
XVI. Pandey, Bishwajeet, et al. “Energy-Efficient Implementation of AES Algorithm on 16nm FPGA.” 2021 10th IEEE International Conference on Communication Systems and Network Technologies (CSNT), IEEE, 2021, pp. 740-744.
XVII. Prakash, Brahm, and Vrinda Gupta. “An Improved Unified AES Implementation Using FPGA.” International Journal of Embedded and Real-Time Communication Systems (IJERTCS), vol. 13, no. 1, 2022, pp. 1-12.
XVIII. Priya, I., et al. “FPGA Implementation of AES Algorithm for High Speed Applications.” Analog Integrated Circuits and Signal Processing, 2022, pp. 1-11.
XIX. Priyanka Brahmaiah, V., et al. “Implementation of AES Algorithm.” International Conference on Information and Communication Technology for Intelligent Systems, Springer Nature Singapore, 2023, pp. 161-171
XX. Sawant, A. G., V. N. Nitnaware, and A. A. Deshpande. “Spartan-6 FPGA Implementation of AES Algorithm.” ICCCE 2019, Springer, Singapore, 2020, pp. 205-211.
XXI. Siva Balan, N., and B. S. Murugan. “Low Area FPGA Implementation of AES Architecture with EPRNG for IoT Application.” Journal of Electronic Testing, vol. 38, no. 2, 2022, pp. 181-193.
XXII. Sornalatha, R., et al. “FPGA Implementation of Protected Compact AES S–Box Using CQCG for Embedded Applications.” Smart Intelligent Computing and Communication Technology, IOS Press, 2021, pp. 396-401.
XXIII. Sreekanth, Muttuluru, and R. K. Jeyachitra. “Implementation of Area-Efficient AES Using FPGA for IOT Applications.” International Journal of Embedded Systems, vol. 15, no. 4, 2022, pp. 354-362.
XXIV. Yang, Cheng-Hsiung, and Yu-Sheng Chien. “FPGA Implementation and Design of a Hybrid Chaos-AES Color Image Encryption Algorithm.” Symmetry, vol. 12, no. 2, 2020, p. 189.
XXV. Yazdeen, Abdulmajeed Adil, et al. “FPGA Implementations for Data Encryption and Decryption via Concurrent and Parallel Computation: A Review.” Qubahan Academic Journal, vol. 1, no. 2, 2021, pp. 8-16

View Download

ENHANCING INTEROPERABILITY AND STANDARDIZATION IN IOT AND CLOUD INTEGRATION

Authors:

Julaily Aida Jusoh, Najla Al-Qawasmeh, Belal alifan, Syarilla Iryani Ahmad Saany, M Hafiz Yusoff, Yousef A. Baker El-Ebiary

DOI NO:

https://doi.org/10.26782/jmcms.2026.01.00005

Abstract:

Introduction: The rapid expansion of Internet of Things (IoT) devices, combined with the widespread adoption of cloud computing, has led to an interconnected digital environment. However, the lack of interoperability and standardization between IoT and cloud systems presents significant challenges. This study explores the importance of addressing interoperability issues and establishing standardized practices to facilitate smoother integration between these technologies. Problem Statement: The diverse range of IoT devices and cloud platforms has created a fragmented ecosystem where interoperability challenges impede the seamless exchange of data and functionality. The absence of universally accepted protocols further complicates compatibility, leading to performance inefficiencies, increased development complexity, and potential security risks. Resolving these issues is essential for unlocking the full capabilities of IoT and cloud integration. Objective: The goal of this research is to examine the current state of interoperability and standardization in IoT and cloud integration. The study aims to identify existing challenges, evaluate current standards and protocols, and propose solutions to enhance interoperability and standardization, fostering a more cohesive and efficient integration between these technologies. Methodology: This study uses a multi-method approach, including a thorough literature review, case studies of existing IoT and cloud integration efforts, and unstructured interviews with industry experts. The analysis focuses on identifying recurring interoperability challenges, evaluating the effectiveness of existing standards, and reviewing successful integration strategies. This comprehensive approach provides a detailed understanding of the complexities surrounding IoT and cloud interoperability. Results: The research identifies key challenges affecting the interoperability of IoT and cloud systems. Through detailed analysis of current standards and successful integration cases, the study offers insights into effective strategies for overcoming these barriers. The results provide actionable recommendations for enhancing interoperability and achieving smoother integration across various IoT and cloud environments. Conclusion: This study emphasizes the urgent need for improved interoperability and standardization in IoT and cloud integration. The research findings, along with proposed solutions, offer valuable direction for industry professionals, policymakers, and researchers working towards creating a more interconnected and efficient digital ecosystem. As IoT and cloud technologies continue to advance, establishing strong, standardized frameworks is crucial to realizing the full potential of these transformative technologies.

Keywords:

IoT integration,Interoperability,Standardization,Cloud computing,Digital ecosystem,Connectivity protocols,

References:

I. A. Greeni, et al., “BrainLang DL: A Deep Learning Approach to FMRI for Unveiling Neural Correlates of Language across Cultures” International Journal of Advanced Computer Science and Applications(IJACSA), 15(6), 2024. 10.14569/IJACSA.2024.01506114.
II. Al-Sammarraie, N. A., Y. M. H. Al-Mayali, and Yousef A. Baker El-Ebiary.“Classification and Diagnosis Using Back Propagation Artificial Neural Networks (ANN).” Proceedings of the International Conference on Smart Computing and Electronic Enterprise (ICSCEE), IEEE, 2018, pp. 1–5. 10.1109/ICSCEE.2018.8538383
III. Anna Gustina Zainal, M. et al. “Cross-Cultural Language Proficiency Scaling using Transformer and Attention Mechanism Hybrid Model” International Journal of Advanced Computer Science and Applications(IJACSA), 15(6), 2024. 10.14569/IJACSA.2024.01506116.
IV. Antonius, Franciskus, et al.“Incorporating Natural Language Processing into Virtual Assistants: An Intelligent Assessment Strategy for Enhancing Language Comprehension.” International Journal of Advanced Computer Science and Applications, vol. 14, no. 10, 2023. 10.14569/IJACSA.2023.0141079
V. Anushree A. et al. “Real-time Air Quality Monitoring in Smart Cities using IoT-enabled Advanced Optical Sensors” International Journal of Advanced Computer Science and Applications(IJACSA), 15(4), 2024. 10.14569/IJACSA.2024.0150487.
VI. Araddhana Arvind Deshmukh, et al. “Event-based Smart Contracts for Automated Claims Processing and Payouts in Smart Insurance” International Journal of Advanced Computer Science and Applications(IJACSA), 15(4), 2024. 10.14569/IJACSA.2024.0150486.
VII. Aradhana Sahu, et al. “Federated LSTM Model for Enhanced Anomaly Detection in Cyber Security: A Novel Approach for Distributed Threat” International Journal of Advanced Computer Science and Applications(IJACSA), 15(6), 2024. 10.14569/IJACSA.2024.01506125.
VIII. Artika Farhana, et al.“Efficient Deep Reinforcement Learning for Smart Buildings: Integrating Energy Storage Systems Through Advanced Energy Management Strategies.” International Journal of Advanced Computer Science and Applications, vol. 14, no. 12, 2023. 10.14569/IJACSA.2023.0141257
IX. Atul Tiwari, et al.“Optimized Ensemble of Hybrid RNN–GAN Models for Accurate and Automated Lung Tumour Detection from CT Images.” International Journal of Advanced Computer Science and Applications, vol. 14, no. 7, 2023. 10.14569/IJACSA.2023.0140769
X. Atzori, Luigi, Antonio Iera, and Giacomo Morabito.“The Internet of Things: A Survey.” Computer Networks, vol. 54, no. 15, 2022, pp. 2787–2805. 10.1016/j.comnet.2010.05.010
XI. Baker El-Ebiary, Yousef A., et al.“Blockchain as a Decentralized Communication Tool for Sustainable Development.” Proceedings of the International Conference on Smart Computing and Electronic Enterprise (ICSCEE), IEEE, 2021, pp. 127–133. 10.1109/ICSCEE50312.2021.9497910
XII. Baker El-Ebiary, Yousef A., et al.“Determinants of Customer Purchase Intention Using Zalora Mobile Commerce Application.” Proceedings of the International Conference on Smart Computing and Electronic Enterprise (ICSCEE), IEEE, 2021, pp. 159–163. 10.1109/ICSCEE50312.2021.9497995
XIII. Baker El-Ebiary, Yousef A., et al.“E-Government and E-Commerce Issues in Malaysia.” Proceedings of the International Conference on Smart Computing and Electronic Enterprise (ICSCEE), IEEE, 2021, pp. 153–158. 10.1109/ICSCEE50312.2021.9498092
XIV. Baker El-Ebiary, Yousef A., et al.“Mobile Commerce and Its Apps: Opportunities and Threats in Malaysia.” Proceedings of the International Conference on Smart Computing and Electronic Enterprise (ICSCEE), IEEE, 2021, pp. 180–185. 10.1109/ICSCEE50312.2021.9498228
XV. Bamansoor, S., et al.“Efficient Online Shopping Platforms in Southeast Asia.” Proceedings of the International Conference on Smart Computing and Electronic Enterprise (ICSCEE), IEEE, 2021, pp. 164–168. 10.1109/ICSCEE50312.2021.9497901
XVI. Bamansoor, S., et al.“Evaluation of Chinese Electronic Enterprise from Business and Customers Perspectives.” Proceedings of the International Conference on Smart Computing and Electronic Enterprise (ICSCEE), IEEE, 2021, pp. 169–174. 10.1109/ICSCEE50312.2021.9498093
XVII. Borgia, Eleonora.“The Internet of Things Vision: Key Features, Applications and Open Issues.” Computer Communications, vol. 54, 2014, pp. 1–31. 10.1016/j.comcom.2014.09.008
XVIII. Botta, Alessio, et al.“Integration of Cloud Computing and Internet of Things: A Survey.” Future Generation Computer Systems, vol. 56, 2016, pp. 684–700. 10.1016/j.future.2015.09.021
XIX. Deeba, K., et al.“Optimizing Crop Yield Prediction in Precision Agriculture with Hyperspectral Imaging-Unmixing and Deep Learning.” International Journal of Advanced Computer Science and Applications, vol. 14, no. 12, 2023. 10.14569/IJACSA.2023.0141261
XX. Ghanem, W. A. H. M., et al.“Metaheuristic-Based IDS Using Multi-Objective Wrapper Feature Selection and Neural Network Classification.” Advances in Cyber Security, Springer, 2021. 10.1007/978-981-33-6835-4_26
XXI. Gubbi, Jayavardhana, et al.“Internet of Things (IoT): A Vision, Architectural Elements, and Future Directions.” Future Generation Computer Systems, vol. 29, no. 7, 2019, pp. 1645–1660. 10.1016/j.future.2013.01.010
XXII. Gunnam Rama Devi, et al. “COOT-Optimized Real-Time Drowsiness Detection using GRU and Enhanced Deep Belief Networks for Advanced Driver Safety” International Journal of Advanced Computer Science and Applications(IJACSA), 15(4), 2024. 10.14569/IJACSA.2024.0150483.
XXIII. Hasan, Mohammad Kamrul, et al.“Lightweight Cryptographic Algorithms for Guessing Attack Protection in Complex IoT Applications.” Complexity, 2021. 10.1155/2021/5540296
XXIV. Hilles, S. M. S., et al.“Adaptive Latent Fingerprint Image Segmentation and Matching Using Chan–Vese Technique.” Proceedings of the International Conference on Smart Computing and Electronic Enterprise (ICSCEE), IEEE, 2021, pp. 2–7. 10.1109/ICSCEE50312.2021.9497996
XXV. Hilles, S. M. S., et al.“Latent Fingerprint Enhancement and Segmentation Technique Based on Hybrid Edge Adaptive DTV Model.” Proceedings of the International Conference on Smart Computing and Electronic Enterprise (ICSCEE), IEEE, 2021, pp. 8–13. 10.1109/ICSCEE50312.2021.9498025
XXVI. Jazdi, Nasser.“Cyber Physical Systems in the Context of Industry 4.0.” Proceedings of the IEEE International Conference on Automation, Quality and Testing, Robotics, IEEE, 2014, pp. 1–4. 10.1109/AQTR.2014.6857843
XXVII. Jin, Jing, et al.“An Information Framework for Creating a Smart City through Internet of Things.” IEEE Internet of Things Journal, vol. 1, no. 2, 2019, pp. 112–121. 10.1109/JIOT.2013.2296516
XXVIII. Jara, Antonio J., et al.“Interconnection Framework for mHealth and Remote Monitoring Based on the Internet of Things.” IEEE Journal on Selected Areas in Communications, vol. 31, no. 9, 2018, pp. 47–65. 10.1109/JSAC.2013.130905
XXIX. Jugunta, Suresh Babu, et al.“Exploring the Insights of Bat Algorithm-Driven XGB-RNN for Optimal Fetal Health Classification.” International Journal of Advanced Computer Science and Applications, vol. 14, no. 11, 2023. 10.14569/IJACSA.2023.0141174
XXX. Kamilaris, Andreas, et al.“The Rise of Blockchain Technology in Agriculture and Food Supply Chains.” Trends in Food Science & Technology, vol. 91, 2022, pp. 640–652. 10.1016/j.tifs.2019.07.034
XXXI. Lakshmi, K., et al.“Efficiency Analysis of Firefly Optimization-Enhanced GAN-Driven Convolutional Model for Cost-Effective Melanoma Classification.” International Journal of Advanced Computer Science and Applications, vol. 14, no. 11, 2023. 10.14569/IJACSA.2023.0141175
XXXII. Li, Shancang, Li Da Xu, and Shanshan Zhao.“The Internet of Things: A Survey.” Information Systems Frontiers, vol. 17, no. 2, 2022, pp. 243–259. 10.1007/s10796-014-9492-7
XXXIII. M Hafiz Yusoff, et al., “The Influence Of Knowledge Management Strategies On Decision-Making In Enterprises”. Journal Of Mechanics of Continua and Mathematical Sciences. Vol – 20 No – 9, September 2025. 10.26782/jmcms.2025.09.00009
XXXIV. M. Madhavi, et al. “Elevating Offensive Language Detection: CNN-GRU and BERT for Enhanced Hate Speech Identification” International Journal of Advanced Computer Science and Applications(IJACSA), 15(5), 2024. 10.14569/IJACSA.2024.01505118.
XXXV. Meraj, S. T., et al.“A Diamond Shaped Multilevel Inverter with Dual Mode of Operation.” IEEE Access, vol. 9, 2021, pp. 59873–59887. 10.1109/ACCESS.2021.3067139
XXXVI. Mohamad, M. B., et al.“Enterprise Problems and Proposed Solutions Using the Concept of E-Commerce.” Proceedings of the 2nd International Conference on Smart Computing and Electronic Enterprise (ICSCEE), IEEE, 2021, pp. 186–192. 10.1109/ICSCEE50312.2021.9498197
XXXVII. Mukhedkar, Moresh, et al.“Enhanced Land Use and Land Cover Classification Through Human Group-Based Particle Swarm Optimization–Ant Colony Optimization Integration with Convolutional Neural Network.” International Journal of Advanced Computer Science and Applications, vol. 14, no. 11, 2023. 10.14569/IJACSA.2023.0141142
XXXVIII. Mukhedkar, Moresh, et al.“Feline Wolf Net: A Hybrid Lion–Grey Wolf Optimization Deep Learning Model for Ovarian Cancer Detection.” International Journal of Advanced Computer Science and Applications, vol. 14, no. 9, 2023. 10.14569/IJACSA.2023.0140962
XXXIX. Myagmarsuren Orosoo, et al. “Analysing Code-Mixed Text in Programming Instruction Through Machine Learning for Feature Extraction” International Journal of Advanced Computer Science and Applications(IJACSA), 15(7), 2024. 10.14569/IJACSA.2024.0150788.
XL. Naramala, Venkateswara Rao, et al. “Enhancing Diabetic Retinopathy Detection Through Machine Learning with Restricted Boltzmann Machines.” International Journal of Advanced Computer Science and Applications, vol. 14, no. 9, 2023. 10.14569/IJACSA.2023.0140961
XLI. Nastic, Stefan, Sanjin Sehic, and Schahram Dustdar. “Cloud-of-Things: Unified Interoperability Framework for IoT Platforms.” IEEE Cloud Computing, vol. 4, no. 2, 2020, pp. 20–28. 10.1109/MCC.2017.27
XLII. Palattella, Maria Rita, et al. “Internet of Things in the 5G Era: Enablers, Architecture, and Business Models.” IEEE Journal on Selected Areas in Communications, vol. 34, no. 3, 2016, pp. 510–527. 10.1109/JSAC.2016.2525418
XLIII. Pathmanathan, P. R., et al. “The Benefit and Impact of E-Commerce in Tourism Enterprises.” Proceedings of the 2nd International Conference on Smart Computing and Electronic Enterprise (ICSCEE), IEEE, 2021, pp. 193–198. 10.1109/ICSCEE50312.2021.9497947
XLIV. Pawar, B., et al. “Multi-Scale Deep Learning-Based Recurrent Neural Network for Improved Medical Image Restoration and Enhancement.” International Journal of Advanced Computer Science and Applications, vol. 14, no. 10, 2023. 10.14569/IJACSA.2023.0141088
XLV. Perera, Charith, et al. “A Survey on Internet of Things from Industrial Market Perspective.” IEEE Access, vol. 4, 2021, pp. 6787–6795. 10.1109/ACCESS.2016.2619379
XLVI. Preethi, K. N., et al. “Enhancing Startup Efficiency: Multivariate DEA for Performance Recognition and Resource Optimization in a Dynamic Business Landscape.” International Journal of Advanced Computer Science and Applications, vol. 14, no. 8, 2023. 10.14569/IJACSA.2023.0140869
XLVII. Rajina R. et al., “Comprehensive Security Frameworks For Safeguarding IoT Devices In Smart Cities: Addressing Authentication, Encryption, Access Control, And Anomaly Detection”. Journal Of Mechanics of Continua and Mathematical Sciences. Vol – 20 No – 9, September 2025. 10.26782/jmcms.2025.09.00005.

XLVIII. Rajasekhar Reddy, N. V., et al. “Enhancing Skin Cancer Detection Through an AI-Powered Framework by Integrating African Vulture Optimization with GAN-Based Bi-LSTM Architecture.” International Journal of Advanced Computer Science and Applications, vol. 14, no. 9, 2023. 10.14569/IJACSA.2023.0140960
XLIX. Ranjan, R., and M. Paprzycki. “Internet of Things (IoT): A Vision, Architectural Elements, and Future Directions.” Future Generation Computer Systems, vol. 49, 2020, pp. 173–190. 10.1016/j.future.2015.12.027
L. Shaista Khan, et al. “A Hybrid DBN-GRU Model for Enhanced Sentiment Analysis in Product Reviews” International Journal of Advanced Computer Science and Applications(IJACSA), 15(7), 2024. 10.14569/IJACSA.2024.0150789.
LI. Shi, Weisong, et al. “Edge Computing: Vision and Challenges.” IEEE Internet of Things Journal, vol. 3, no. 5, 2019, pp. 637–646. 10.1109/JIOT.2016.2579198
LII. Sundaramoorthy, K., et al. “Hybrid Optimization with Recurrent Neural Network-Based Medical Image Processing for Predicting Interstitial Lung Disease.” International Journal of Advanced Computer Science and Applications, vol. 14, no. 4, 2023. 10.14569/IJACSA.2023.0140462
LIII. T M Swathy, et al., Shobana Gorintla and Elangovan Muniyandy, “Game Theory-Optimized Attention-Based Temporal Graph Convolutional Network for Spatiotemporal Forecasting of Sea Level Rise” International Journal of Advanced Computer Science and Applications(IJACSA), 16(8), 2025. 10.14569/IJACSA.2025.0160857.
LIV. Tarshany, Y. M. A., Y. Al Moaiad, and Y. A. Baker El-Ebiary. “Legal Maxims Artificial Intelligence Application for Sustainable Architecture and Interior Design to Achieve the Maqasid of Preserving the Life and Money.” 2022 Engineering and Technology for Sustainable Architectural and Interior Design Environments (ETSAIDE), 2022, pp. 1–4. 10.1109/ETSAIDE53569.2022.9906357
LV. Taviti Naidu Gongada, et al. “Optimizing Resource Allocation in Cloud Environments using Fruit Fly Optimization and Convolutional Neural Networks” International Journal of Advanced Computer Science and Applications(IJACSA), 15(5), 2024. 10.14569/IJACSA.2024.01505119.
LVI. Thakkalapally Preethi, et al. “Advancing Healthcare Anomaly Detection: Integrating GANs with Attention Mechanisms” International Journal of Advanced Computer Science and Applications(IJACSA), 15(6), 2024. 10.14569/IJACSA.2024.01506113.
LVII. Tiwari, Atul, et al. “Optimized Ensemble of Hybrid RNN-GAN Models for Accurate and Automated Lung Tumour Detection from CT Images.” International Journal of Advanced Computer Science and Applications, vol. 14, no. 7, 2023. 10.14569/IJACSA.2023.0140769
LVIII. Vögler, M., et al. “A Fog-Based Platform for End-to-End IoT-Cloud Interoperability.” 2017 IEEE International Conference on Edge Computing (EDGE), IEEE, 2019, pp. 1–8. 10.1109/EDGE.2017.7961733
LIX. Wahsheh, F. R., et al. “E-Commerce Product Retrieval Using Knowledge from GPT-4.” 2023 International Conference on Computer Science and Emerging Technologies (CSET), IEEE, 2023, pp. 1–8. 10.1109/CSET58993.2023.10346860
LX. Wahsheh, F. R., et al. “An Evaluation and Annotation Methodology for Product Category Matching in E-Commerce Using GPT.” 2023 International Conference on Computer Science and Emerging Technologies (CSET), IEEE, 2023, pp. 1–6. 10.1109/CSET58993.2023.10346684
LXI. W.A.H.M. Ghanem, et al. “Metaheuristic Based IDS Using Multi-Objective Wrapper Feature Selection and Neural Network Classification.” In: Anbar M., Abdullah N., Manickam S., editors. Advances in Cyber Security. ACeS 2020. Communications in Computer and Information Science, vol 1347. Springer, Singapore, 2021. 10.1007/978-981-33-6835-4_26
LXII. Xiang, Yi, et al. “Fog Computing: Platform and Applications.” Proceedings of the 2015 Workshop on Mobile Big Data, ACM, 2019, pp. 37–42. 10.1145/2791928.2791932
LXIII. Zhou, J., et al. “Security and Privacy for Cloud-Based IoT: Challenges.” IEEE Communications Magazine, vol. 56, no. 3, 2018, pp. 52–57. 10.1109/MCOM.2018.1700237

View Download

DOUBLE ELZAKI TRANSFORM AND ADOMIAN POLYNOMIALS FOR SOLVING BENJAMIN ONO AND BUCKMASTER EQUATIONS

Authors:

Inderdeep Singh, Parvinder Kaur

DOI NO:

https://doi.org/10.26782/jmcms.2026.01.00006

Abstract:

In this research paper, we have proposed a new technique for resolving the Benjamin-Ono and Buckmaster equations that come up in many engineering and science applications. The double Elzaki transform and the Adomian polynomials are coupled in the suggested hybrid approach. Experiments have been carried out to verify the correctness and simplicity of the suggested scheme. To assess the effectiveness of the suggested scheme, the outcomes so obtained are compared with the results obtained by the variational iteration method.

Keywords:

Double Elzaki Transform,Adomian Decomposition method,Benjamin-Ono Equation,Buckmaster Equations,Variational Iteration Method (VIM),Test examples,

References:

I. Abbaoui, K., and Y. Cherruault. “Convergence of Adomian’s Method Applied to Differential Equations.” Computers & Mathematics with Applications, vol. 28, no. 5, 1994, pp. 103–109. 10.1016/0898-1221(94)00144-8.
II. Ahmed, S. “Application of Sumudu Decomposition Method for Solving Burger’s Equation.” Advances in Theoretical and Applied Mathematics, vol. 9, 2014, pp. 23–26.
III. Alderremy, A. A., and T. M. Elzaki. “On the New Double Integral Transform for Solving Singular System of Hyperbolic Equations.” Journal of Nonlinear Sciences and Applications, vol. 11, 2018, pp. 1207–1214.
IV. Eltayeb, H., and A. Kilicman. “A Note on Double Laplace Transform and Telegraphic Equations.” Abstract and Applied Analysis, vol. 2013, 2013, Article ID 932578. 10.1155/2013/932578.
V. Elzaki, T. “The New Integral Transform: Elzaki Transform.” Global Journal of Pure and Applied Mathematics, vol. 7, 2011, pp. 57–64.
VI. Elzaki, T. M., and E. M. A. Hilal. “Solution of Linear and Non-Linear Partial Differential Equations Using Mixture of Elzaki Transform and the Projected Differential Transform Method.” Mathematical Theory and Modeling, vol. 2, 2012, pp. 1–12.
VII. Elzaki, T. M., and E. M. A. Hilal. “Solution of Telegraph Equation by Modified Double Sumudu Transform ‘Elzaki Transform.’” Mathematical Theory and Modeling, vol. 2, 2012, pp. 95–103.
VIII. Elzaki, T. M., and S. M. Elzaki. “On the Connections between Laplace and Elzaki Transforms.” Advances in Theoretical and Applied Mathematics, vol. 6, 2011, pp. 1–10.
IX. Elzaki, T. M., and S. M. Elzaki. “On the Elzaki Transform and Ordinary Differential Equations with Variable Coefficients.” Advances in Theoretical and Applied Mathematics, vol. 6, 2011, pp. 41–46.
X. Elzaki, T. M., S. M. Elzaki, and E. M. A. Hilal. “Elzaki and Sumudu Transforms for Solving Some Differential Equations.” Global Journal of Pure and Applied Mathematics, vol. 8, 2012, pp. 167–173.
XI. Hassaballa, A. A., and Y. A. Salih. “On Double Elzaki Transform and Double Laplace Transform.” IOSR Journal of Mathematics, vol. 11, 2015, pp. 35–41.
XII. Hassan, M. A., and T. M. Elzaki. “Double Elzaki Transform Decomposition Method for Solving Non-Linear Partial Differential Equations.” Journal of Applied Mathematics and Physics, vol. 8, 2020, pp. 1463–1471.
XIII. Hassan, M. A., and T. M. Elzaki. “Double Elzaki Transform Decomposition Method for Solving Third Order Korteweg–De Vries Equations.” Journal of Applied Mathematics and Physics, vol. 9, 2021, pp. 21–30. 10.4236/jamp.2021.91003.
XIV. Hussain, E. A., and Z. M. Alwan. “The Finite Volume Method for Solving Buckmaster’s Equation, Fisher’s Equation, and Sine-Gordon Equation for PDEs.” International Mathematical Forum, vol. 8, 2013, pp. 599–617.
XV. Idowu, K. O., et al. “A Semi-Analytic Hybrid Approach for Solving the Buckmaster Equation: Application of the Elzaki Projected Differential Transform Method.” Engineering Reports, vol. 7, no. 3, 2025, pp. 1–15. 10.1002/eng2.70044.
XVI. Idrees, M. I., et al. “On the Convergence of Double Elzaki Transform.” International Journal of Advanced and Applied Sciences, vol. 5, no. 6, 2018, pp. 19–24. 10.21833/ijaas.2018.06.003.
XVII. Ige, O. E., et al. “Adomian Polynomial and Elzaki Transform Method of Solving Third Order Korteweg–De Vries Equations.” Global Journal of Pure and Applied Mathematics, vol. 15, no. 3, 2019, pp. 261–277.
XVIII. Kenig, C. E., and K. D. Koenig. “On the Local Well-Posedness of the Benjamin–Ono and Modified Benjamin–Ono Equations.” Mathematical Research Letters, vol. 10, 2003, pp. 879–895.
XIX. Koch, H., and N. Tzvetkov. “On the Local Well-Posedness of the Benjamin–Ono Equation in H^s(R).” International Mathematics Research Notices, no. 26, 2003, pp. 1449–1464. 10.1155/S1073792803211260
XX. Kumari, U., and I. Singh. “Homotopy Perturbation Technique for Solving Higher Dimensional Time Fractional Burger–Huxley Equations.” American Journal of Applied Mathematics, vol. 13, no. 4, 2025, pp. 245–255.
XXI. Kumari, U., and I. Singh. “Two Accurate Semi-Analytical Techniques for Solving (2+1)-D and (3+1)-D Schrödinger Equations.” IAENG International Journal of Applied Mathematics, vol. 55, no. 2, 2025, pp. 348–355.
XXII. Ponce, G. “On the Global Well-Posedness of the Benjamin–Ono Equation.” Differential and Integral Equations, vol. 4, 1991, pp. 527–542.
XXIII. Singh, I., and P. Kaur. “Double Elzaki Decomposition Method for Solving PDEs Arising during Liquid Drop Formations.” Journal of Mechanics of Continua and Mathematical Sciences, vol. 19, no. 11, 2024, pp. 44–55. DOI: 10.26782/jmcms.2024.11.00004.
XXIV. Singh, I., and U. Kumari. “Elzaki Transform Homotopy Perturbation Method for Solving Two-Dimensional Time-Fractional Rosenau–Hyman Equation.” MATHEMATIKA, MJIM, vol. 39, no. 2, 2023, pp. 159–171.
XXV. Taghizadeh, N., M. Mirzazadeh, and F. Farahrooz. “Exact Soliton Solutions for Second-Order Benjamin–Ono Equation.” Applications and Applied Mathematics: An International Journal, vol. 6, 2011, pp. 384–395.
XXVI. Wazwaz, A. M. “A Reliable Modification of Adomian Decomposition Method.” Applied Mathematics and Computation, vol. 102, no. 1, 1999, pp. 77–86. 10.1016/S0096-3003(98)10024-3.

View Download

ENHANCED FIXED POINT RESULTS IN G-METRIC SPACES VIA MANN ITERATION AND RATIONAL-TYPE CONTRACTIONS

Authors:

Maitreyee Dey, Hiral Raja, Vasavi Cheruku

DOI NO:

https://doi.org/10.26782/jmcms.2026.02.00002

Abstract:

In this work, we use the Mann iteration process rather than the conventional Picard operator to extend fixed point findings in G-metric spaces. Mann iteration is known to provide better convergence properties and stability in fixed point approximations, particularly in cases where Picard iteration fails due to weak contractive conditions. We present a new family of?rational-type contractive conditions and prove the existence and uniqueness of fixed points of single-valued mappings in G-complete G metric spaces. Specifically, we improve upon existing theorems in the literature both by generalizing their?statements as well as strengthening their use through an improved iterative scheme.

Keywords:

G-metric space,Fixed point,Mann iteration,Rational contraction,G-convergence,Iterative approximation,

References:

I. Aldwoah, K., Shah, S. K., Hussain, S., Almalahi, M. A., Arko, Y. A. S., & Hleili, M. (2024). Investigating fractal fractional PDEs, electric circuits, and integral inclusions via (?, ?)-rational type contractions. Scientific Reports, 14(23546), 1–15. 10.1038/s41598-024-74046-8
II. Acar, Ö. (2023). Some recent and new fixed point results on orthogonal metric-like space. Constructive Mathematical Analysis, 6(3), 184–197. 10.33205/cma.1360402
III. Alqahtani, B., Alzaid, S. S., Fulga, A., & Roldán López de Hierro, A. F. (2021). Proinov type contractions on dislocated b-metric spaces. Advances in Difference Equations, 2021(164), 1–16. 10.1186/s13662-021-03329-5
IV. Ege, O., Park, C., & Ansari, A. H. (2020). A different approach to complex valued Gb-metric spaces. Advances in Difference Equations, 2020(152), 1–13. 10.1186/s13662-020-02605-0
V. Imdad, M., Alfaqih, W. M., & Khan, I. A. (2018). Weak ?-contractions and some fixed point results with applications to fractal theory. Advances in Difference Equations, 2018(1), 439. 10.1186/s13662-018-1900-8.
VI. Kumar, M., Ege, O., Mor, V., Kumar, P., & De la Sen, M. (2024). Boyd-Wong type contractions in generalized parametric bipolar metric space. Heliyon, 10(1), e23998. 10.1016/j.heliyon.2024.e23998
VII. Yildirim, I., & Khan, S. Hussain. (2022). Convexity in G-metric spaces and approximation of fixed points by Mann iterative process. International Journal of Nonlinear Analysis and Applications, 13(1), 1957–1964. 10.22075/ijnaa.2021.21435.2259.
VIII. Gaba, Y. U. (2017). Fixed point theorems in G-metric spaces. Journal of Mathematical Analysis and Applications, 455(1), 528–537. 10.1016/j.jmaa.2017.05.062
IX. Kanwal, S., Waheed, S., Rahimzai, A. A., & Khan, I. (2024). Existence of common fuzzy fixed points via fuzzy F-contractions in b-metric spaces. Scientific Reports, 14(7807), 1–14. 10.1038/s41598-024-58451-7
X. Karap?nar, E., Chen, C.-M., Alghamdi, M. A., & Fulga, A. (2021). Advances on the fixed point results via simulation function involving rational terms. Advances in Difference Equations, 2021(409), 1–20. 10.1186/s13662-021-03564-w
XI. Okeke, G. A., Francis, D., & de la Sen, M. (2020). Some fixed point theorems for mappings satisfying rational inequality in modular metric spaces with applications. Heliyon, 6(9), e04785. 10.1016/j.heliyon.2020.e04785
XII. Rao, N. S., & Kalyani, K. (2020). Unique fixed point theorems in partially ordered metric spaces. Heliyon, 6(11), e05563. 10.1016/j.heliyon.2020.e05563
XIII. Rao, N. S. (2022). Coupled fixed points of (??, ??, ??)-contractive mappings in partially ordered b-metric spaces. Heliyon, 8(12), e12442. 10.1016/j.heliyon.2022.e12442
XIV. Rao, N. S., Aloqaily, A., & Mlaiki, N. (2024). Results on fixed points in b-metric space by altering distance functions. Heliyon, 10(7), e33962. 10.1016/j.heliyon.2024.e33962
XV. Rasham, T., Shoaib, A., Park, C., Agarwal, R. P., & Aydi, H. (2021). On a pair of fuzzy mappings in modular-like metric spaces with applications. Advances in Difference Equations, 2021(245), 1–17. 10.1186/s13662-021-03398-6
XVI. Rasham, T., Asif, A., Aydi, H., & De La Sen, M. (2021). On pairs of fuzzy dominated mappings and applications. Advances in Difference Equations, 2021(417), 1–22. 10.1186/s13662-021-03569-5
XVII. Mustafa, Z., & Sims, B. (2009). Fixed point theorems for contractive mappings in complete G-metric spaces. Fixed Point Theory and Applications, 2009, Article 917175. 10.1155/2009/917175
XVIII. Rasham, T., Panda, S. K., Basendwah, G. A., & Hussain, A. (2024). Multivalued nonlinear dominated mappings on a closed ball and associated numerical illustrations with applications to nonlinear integral and fractional operators. Heliyon, 10(7), e34078. 10.1016/j.heliyon.2024.e34078.
XIX. Shoaib, M., Abdeljawad, T., Sarwar, M., & Jarad, F. (2019). Fixed point theorems for multi-valued contractions in b-metric spaces with applications to fractional differential and integral equations. IEEE Access, 7, 127373–127383. 10.1109/ACCESS.2019.2938635
XX. Souayah, N., Mlaiki, N., & Mrad, M. (2018). The GM-contraction principle for mappings on an M-metric spaces endowed with a graph and fixed-point theorems. IEEE Access, 6, 25178–25188. 10.1109/ACCESS.2018.2833147
XXI. Turcanu, T., & Postolache, M. (2024). On a new approach of enriched operators. Heliyon, 10(3), e27890. 10.1016/j.heliyon.2024.e27890

View Download

REAL-TIME DETECTION OF MALICIOUS LOGIC INJEC-TION IN SCADA SYSTEMS USING HYBRID YARA SIGNA-TURES

Authors:

Gulab Kumar Mondal, Arijit Das, Moumita Pal, Biswarup Neogi, DharamPal Singh

DOI NO:

https://doi.org/10.26782/jmcms.2026.02.00003

Abstract:

Modern Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) networks face a growing class of logic-layer attacks in which adversaries silently manipulate configuration or project files instead of deploying traditional malware. Existing defences, such as network intrusion de-tection systems and machine-learning-based anomaly detectors, struggle to ob-serve these pre-deployment logic changes and often incur high operational complexity. This paper presents a lightweight, host-based framework that uses YARA, a rule-based pattern-matching engine, to perform static inspection of XML configuration files generated by SCADA engineering tools. The proposed system is implemented on a Windows 10 engineering workstation using Mod-busPal as a Modbus TCP simulator, Python for file monitoring and GUI devel-opment, and YARA CLI/Python bindings for rule execution. Custom YARA rules are crafted to detect unauthorized Modbus function code 5 (Write Single Coil) operations targeting critical coil addresses, modelling malicious logic injections such as covert actuator activations. In a controlled lab environment, using a va-riety of ModbusPal project files, a combination of benign (no infiltration) and tampered project files, as well as our detection framework, achieved less than 200 milliseconds of latency for detecting true positives (and 0 false positives and 0 false negatives) for the defined ruleset and under a negligible resource over-head. These findings indicate that static logic validation at the host-level would fulfil an effective integrity pre-deployment check for PLC logic in addition to current network-based and behaviour-based ICS security mechanisms, without requiring modification of the installed PLC hardware and network protocol.

Keywords:

SCADA Security,Industrial Control Systems (ICS),YARA,Logic,Modbus,TCP,Host-Based Intrusion Detection,Static Analysis,OT Cybersecurity,

References:

I. Adepu, M., and A. Mathur. “SCADAhunt: Framework for Detecting Pro-cess Control Attacks.” International Journal of Critical Infrastructure Protection, vol. 19, 2017. https://www.sciencedirect.com/science/article/pii/S1874548217300279

II. Cheminod, M., L. Durante, and A. Valenzano. “Review of Security Issues in Industrial Networks.” IEEE Transactions on Industrial Informatics, vol. 9, no. 1, 2013, pp. 277–293. 10.1109/TII.2012.2198666

III. Chung, S. P., et al. “Host-Based Detection of ICS Configuration Tamper-ing.” Proceedings of the Annual Computer Security Applications Confer-ence (ACSAC), 2022. 10.1145/3564625.3564629

IV. Claroty Team82. “MITRE ATT&CK for ICS: Detecting Logic Manipula-tion TTPs.” Claroty Research, 2024. https://claroty.com/team82/research

V. Costin, A. “Towards a Framework for ICS Intrusion Detection.” Black Hat USA, 2020. https://www.blackhat.com/us-20/

VI. Dragos. “FrostyGoop: Modbus Malware Targeting Coils.” ICS Threat De-tection Bulletin, 2024. https://www.dragos.com/

VII. Dragos, Inc. “INCONTROLLER (PIPEDREAM): Highly Capable ICS Toolkit.” Threat Intelligence Report, Apr. 2022. https://www.dragos.com/resources/

VIII. Dressler, F., and P. Sommer. “Using Zeek for ICS Protocol Detection.” Proceedings of the 9th USENIX Workshop on Cyber Security Experimen-tation and Test (CSET), 2021. https://www.usenix.org/conference/cset21

IX. ENISA. “Threat Landscape for Industrial Control Systems.” ENISA Threat Report, 2025. https://www.enisa.europa.eu/publications

X. Forescout Research. The State of Modbus Security. Forescout Labs Tech-nical Brief, 2023. https://www.forescout.com/resources/

XI. Ike, H., et al. “SCAPHY: Behavior-Aware ICS Security Using Physical Traces.” Proceedings of the IEEE International Conference on Industrial Cyber-Physical Systems, 2022. https://ieeexplore.ieee.org/

XII. ICS-CERT. “Advisory (ICS-ALERT-14-281-01) — BlackEnergy Mal-ware.” U.S. Department of Homeland Security, 2014. https://www.cisa.gov/news-events/ics-alerts/ics-alert-14-281-01

XIII. ICS-CERT. “Havex Malware Targeting ICS/SCADA Systems.” Industrial Control Systems Cyber Emergency Response Team, 2013. https://www.cisa.gov/ics

XIV. Kravchik, M., and A. Shabtai. “Detecting Cyber Attacks in Industrial Control Systems Using Convolutional Neural Networks.” Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy, 2018. 10.1145/3264888.3264896

XV. Langner, R. “Stuxnet: Dissecting a Cyberwarfare Weapon.” IEEE Securi-ty & Privacy, vol. 9, no. 3, 2011, pp. 49–51. 10.1109/MSP.2011.67

XVI. Mandiant. “FrostyGoop ICS Malware Technical Analysis.” Mandiant Threat Intelligence, 2024. https://www.mandiant.com/resources

XVII. McLaughlin, S., et al. “The Cybersecurity Landscape in Industrial Con-trol Systems.” Proceedings of the IEEE, vol. 104, no. 5, 2016, pp. 1039–1057. 10.1109/JPROC.2015.2512235

XVIII. Modbus Organization. “Modbus Application Protocol Specification V1.1b3.” 2015. http://modbus.org/docs/Modbus_Application_Protocol_V1_1b3.pdf

XIX. NIST. Guide to Industrial Control Systems (ICS) Security. SP 800-82 Re-vision 3, 2025. https://csrc.nist.gov/publications/detail/sp/800-82/rev-3/final

XX. Nguyen, N., T. Ogawa, and M. Saito. “Integrity Verification for PLC Log-ic Files Using Lightweight Hash Trees.” IEEE Transactions on Industrial Informatics, vol. 21, no. 2, 2025, pp. 1204–1213. https://ieeexplore.ieee.org/

XXI. Searle, J., et al. “LogicLocker: Ransomware for Programmable Logic Controllers.” Georgia Tech ICS Security Lab, 2017. https://arxiv.org/

XXII. TXOne Networks. “PIPEDREAM Local Exploit Analysis.” TXOne Threat Research, 2025. https://www.txone.com/blog/

View Download

MPTCP PERFORMANCE ENHANCEMENT USING NETWORK PARAMETER OPTIMIZATION APPROACH

Authors:

Saurabh Bhutani, Nitin Jain

DOI NO:

https://doi.org/10.26782/jmcms.2026.02.00004

Abstract:

This study investigates the issues of energy usage in multipath wireless networks utilizing the Multipath Transport Control Protocol (MPTCP) under application-level timing knobs implemented in socket logic, which allows numerous TCP connections via different pathways. Due to route heterogeneity, MPTCP consumes more energy. Currently, many research works have provided several techniques to optimize energy efficiency; however, they focused on individual systems rather than total performance. This work proposed a stochastic multipath scheduling technique that considers the fluctuations in data transmission rate and path capacity. The scheduling mechanism is associated with the optimization problem to achieve the objectives of maximizing throughput, avoiding congestion, and improving stability. An algorithm is developed to solve multipath data transmission issues by utilizing the drift-based constraints. Simulations are performed to generate results for the comparison of three different optimized MPTCP schemes in the application layer with baseline and conventional protocols. The results are showing considerable improvements in throughput and end-to-end latency

Keywords:

Multipath Transmission,Optimization,Energy Efficiency,TCP,

References:

I. Abbas, Ahmed Saleem. “Technical Comparison between MPTCP and TCP in Heterogeneous Networks.” Int. J. Interact. Mob. Technology, Vol. 16, 2022, pp. 163–175. 10.3991/ijim.v16i19.35299.
II. Aljubayri, Mohammad., Tong Peng, and Mohamad Shikh-Bahaei, “Reduce delay of multipath TCP in IoT networks.” Wireless Networks, vol. 27.no. 6, 2021, pp. 4189-4198. 10.1007/s11276-021-02701-3
III. Aljubayri, Mohammed, Tong Peng, and Mohammad Shikh-Bahae. “Reduce delay of multipath TCP in IoT networks.” Wireless Networks, vol. 27, no. 6, 2022, pp. 4189-4198. 10.1007/s11276-021-02701-3.
IV. Arain, Zulfiqar Arain et al. “Stochastic Optimization of Multipath TCP for Energy Minimization and Network Stability over Heterogeneous Wireless Network.” KSII Transactions on Internet & Information Systems, vol. 15, no. 1, 2021, pp. 11-22. 10.3837/tiis.2021.01.012.
V. Arain, Zulfiqar Arain, et al. “Stochastic Optimization of Multipath TCP for Energy Minimization and Network Stability over Heterogeneous Wireless Network.” KSII Transactions on Internet & Information Systems, vol. 15, no. 1, 2021, pp. 195-215. 10.3837/tiis.2021.01.012.
VI. Bhering, F. et al. “Wireless multipath video transmission: when IoT video applications meet networking—a survey.” Multimedia Systems, vol. 28, no. 3, 2022, pp. 831-850. 10.1007/s00530-021-00885-4.
VII. Cisco, “Visual Networking Index: Forecast and Methodology”, CISCO white paper, vol. 202, 2017, p. 17.
VIII. Cui, HuanXi, et al. “Lyapunov Optimization Based Energy Efficient Congestion Control for MPTCP in HetNets,” Proc. of IEEE 18th International Conference on Communication Technology (ICCT), 2018, pp. 440-445, 10.1109/ICCT.2018.8600159.
IX. Cui Yong, et al. “FMTCP: A Fountain Code-based Multipath Transmission Control Protocol,” IEEE/ACM Transactions on Networking, vol. 23, no. 2, 2015, pp. 465-478. 10.1109/TNET.2014.2300140.
X. Dong, Pingping et al. “An Energy-Saving scheduling algorithm for Multipath TCP in wireless networks.” Electronics, vol. 11, no. 3, 2022, p. 490. 10.3390/electronics11030490
XI. Ji, Lejun, et al. “Research on Attack Signal Feature Extraction Method of Multipath TCP Transmission System Based on Wavelet Energy Entropy.” International Conference on Mobile Networks and Management, vol. 474, 2022, pp. 398-412. 10.1007/978-3-031-32443-7_29.
XII. Ji, Xiaolan., et al. “Adaptive QoS-aware multipath congestion control for live streaming.” Computer Networks, vol. 220, 2023, p. 109470. 10.1016/j.comnet.2022.109470.
XIII. Khan, Imran, et al. “Multipath TCP in smartphones equipped with millimeter wave radios.” In Proceedings of the 15th ACM Workshop on Wireless Network Testbeds, Experimental evaluation & Characterization, vol. 1, 2022, pp. 54-60. 10.1145/3477086.34808.
XIV. Lee, Jae Yong, et al. “Coupled CUBIC Congestion Control for MPTCP in Broadband Networks.” Comput. Syst. Sci. Eng., vol. 45, no. 1, 2023, pp. 99–115. 10.32604/csse.2023.030801.
XV. Lim, Yeon-sup, et al. “Design, Implementation, and Evaluation of Energy-aware Multi-path TCP.” Proc. of the 11th ACM Conference on Emerging Networking Experiments and Technologies, 2015, pp. 1-13. 10.1145/2716281.28361.
XVI. Lim, Yeon-sup. “Cost-Efficient Framework for Mobile Video Streaming using Multi-Path TCP.” KSII Transactions on Internet & Information Systems, vol. 16, no. 4, 2022, pp. 234-243. 10.3837/tiis.2022.04.009.
XVII. ?uczak, ?ukasz Piotr, Przemys?aw Ignaciuk, and Micha? Morawsk “Evaluating MPTCP congestion control algorithms: Implications for streaming in open Internet.” Future Internet, vol. 15, no. 10, 2023, p.328. 10.3390/fi15100328.
XVIII. Majeed, Uzma, et al. “An energy-efficient distributed congestion control protocol for wireless multimedia sensor networks.” Electronics, vol. 11, no. 20, 2022, p. 3265. 10.3390/electronics11203265.
XIX. Matheen, M. A., and S. Sundar. “IoT multimedia sensors for energy efficiency and security: A review of QoS aware and methods in wireless multimedia sensor networks.” International Journal of Wireless Information Networks, vol. 29, no. 4, 2022, pp. 407-418. 10.1007/s10776-022-00567-6.
XX. Palash, Mijanur Rahaman, Kang Chen, and Imran Khan. “Bandwidth-Need Driven Energy Efficiency Improvement of MPTCP Users in Wireless Networks,” IEEE Transactions on Green Comm. & Networking, vol. 3, no. 2, 2019, pp. 343-355. 10.1109/TGCN.2019.2897778.
XXI. Prakash, P. Suman, Dwaram Kavitha, and P. Chenna Reddy. “Energy and congestion-aware load balanced multi-path routing for wireless sensor networks in ambient environments.” Computer Communications, vol. 195, 2022, pp. 217-226. 10.1016/j.comcom.2022.08.012.
XXII. Qiao, Wenxuan., et al. “An AI-enhanced multipath TCP scheduler for open radio access networks.” IEEE Transactions on Green Communications and Networking, vol. 8, no. 3, 2024, pp. 910-923. 10.1109/TGCN.2024.3424202.
XXIII. Tran, Duong Dinh, et al. “Formal analysis of post-quantum hybrid key exchange ssh transport layer protocol.” IEEE Access, vol. 12, 2023, pp. 1672-1687. 10.1109/ACCESS.2023.3347914.
XXIV. Ullah, Y. et al. “A survey on AI-enabled mobility and handover management in future wireless networks: key technologies, use cases, and challenges.” Journal of King Saud University Computer and Information Sciences, vol. 37, no. 4, 2025, p. 47. 10.1007/s44443-025-00048-9.
XXV. Wang, Chengke., et al. “Experience: a three-year retrospective of large-scale multipath transport deployment for mobile applications.” Proceedings of the 29th Annual International Conference on Mobile Computing and Networking, 2023, pp. 1-15. 10.1145/3570361.35925.
XXVI. Wu, Jian, Rui Tan, and Ming Wang, “Energy-Efficient Multipath TCP for Quality-Guaranteed Video over Heterogeneous Wireless Networks,” IEEE Transactions on Multimedia, vol. 21, no. 6, 2019, pp. 1593-1608. 10.1109/TMM.2018.2879748.
XXVII. Zhao Jia, Liu, et al. “Multipath congestion control: Measurement, analysis, and optimization from the energy perspective.” IEEE Transactions on Network Science and Engineering, vol. 10, no. 6, 2023, pp. 3295-3307 10.1109/TNSE.2023.3257034.

View Download

CRYPTOGRAPHIC MODELS FOR ADAPTIVE THREAT DETECTION IN CLOUD-BASED INFRASTRUCTURES

Authors:

Hadi Hussein Madhi, Ali Dahir Alramadan

DOI NO:

https://doi.org/10.26782/jmcms.2026.02.00005

Abstract:

The exponential growth of cloud computing has brought both operational efficiency and complex cybersecurity challenges. Traditional intrusion detection systems (IDS) struggle to adapt to dynamic attack patterns and ensure data confidentiality. This research proposes a hybrid Artificial Intelligence–Cryptographic Framework that integrates deep learning and lightweight encryption to achieve adaptive threat detection while maintaining secure communication within cloud environments. Using the CICIDS 2023 and UNSW-NB15 datasets, the model combines a CNN–LSTM network for behavioral anomaly recognition with AES–ECC encryption for data integrity. Experimental results show a detection accuracy of 98.2 %, an F1-score of 97.9 %, and a 50 % reduction in false positives compared with traditional AI models, while maintaining an average encryption latency of 45 ms. Statistical validation using the Wilcoxon signed-rank test confirmed the significance of these improvements (p < 0.05). The study contributes theoretically by bridging information asymmetry, signaling, and fair-value principles into cybersecurity and practically by providing a scalable, efficient, and trust-aware solution for adaptive cloud protection.

Keywords:

Cloud Security,Artificial Intelligence,Cryptography,Hybrid Framework,Intrusion Detection,AES-ECC Encryption,Adaptive Threat Detection,Cybersecurity,Information Asymmetry,Deep Learning.,

References:

I. Ali, S. (2025). Security and privacy in multi-cloud and hybrid systems. Journal of Cloud Security, 12(3), 45–60.
II. Alazab, M., Alazab, M., & Zhang, J. (2023). AI-driven intrusion detection in cloud environments. Computers & Security, 127, 103056.
III. Alazab, M., Alhyari, S., Awajan, A., & Abdalla, A. (2023). Machine learning-based intrusion detection systems in cloud computing. Computers & Security, 125, 103028.

IV. Alshamrani, M., Bahashwan, A., & Alotaibi, B. (2020). Machine learning techniques for cybersecurity threat detection: A comprehensive review. IEEE Access, 8, 221990–222010.

V. Ahmad, N., & Javed, H. (2023). Hybrid AI–blockchain frameworks for reliable cloud security. Journal of Information Security Research, 12(4), 210–225.

VI. Current Study (2025) refers to the authors’ ongoing research and therefore is not externally published.
VII. Deegan, C. (2022). Fair Value Theory and Its Role in Enhancing Corporate Reporting Transparency. Accounting Perspectives, 18(1), 33–49.
VIII. Hassan, M., Noor, M., & Rahim, R. (2024). Integrating AES and LSTM models for adaptive cloud threat mitigation. Computers & Security, 132, 103355.

IX. Kaur, P., & Singh, S. (2021). Deep learning-based intrusion detection framework using CNN–LSTM model. Future Generation Computer Systems, 115, 225–238.

X. Kim, Y., Park, H., & Seo, J. (2024). Cognitive CNN–LSTM-based intrusion detection for virtualized cloud environments. Expert Systems with Applications, 242, 121816.

XI. Rahman, M., Chowdhury, S., & Alam, K. (2022). Blockchain and AI-enabled hybrid systems for secure cloud infrastructures. IEEE Transactions on Cloud Computing, 10(6), 3624–3637.
XII. Rahman, M., Chowdhury, F., & Zhang, T. (2022). Benchmarking hybrid AI models for adaptive threat detection. Cybersecurity (SpringerOpen), 5(3), 18–32.
XIII. Smith, J., & Jones, A. (2022). Modern cloud architecture and threats. International Journal of Cloud Computing, 9(1), 1–20.

XIV. Zhao, L., Chen, Y., & Li, H. (2022). Federated learning architectures for privacy-preserving cloud intrusion detection. Information Sciences, 603, 112–128.

XV. Zhou, W., Li, P., & Wang, X. (2024). Information asymmetry and trust in AI-driven security frameworks. Journal of Information Technology, 39(2), 211–228.

View Download

A HYBRID XGBOOST-LSTM FRAMEWORK FOR SCALABLE ASSESSMENT OF TIME MANAGEMENT COMPETENCE IN HIGHER EDUCATION: SHAP-DRIVEN INSIGHTS FROM WEST BENGAL COHORT

Authors:

Arkaprava Bandyopadhyay, Debkanta Mishra, Md. Rakib Hosen, Bijoyalakshmi Mitra, Sourav Ghosh, Biswarup Mukherjee

DOI NO:

https://doi.org/10.26782/jmcms.2026.02.00006

Abstract:

Effective time management is vital for undergraduate students to succeed in demanding academic environments, yet scalable assessment tools remain limited. This study introduces a hybrid XGBoost-LSTM framework, integrated with a Python Flask-based web application, to evaluate time management competence among 313 undergraduate students at a college in West Bengal, India. A PCA validated 10-question quiz, derived from a 31-item survey, demonstrated high reliability with Cronbach’s Alpha equal to 0.87. The XGBoost model classified students into Poor, Average, or Good categories with an accuracy of 90% and an F1-score of 0.89, while a RandomForestRegressor achieved an RMSE of 0.21, improving 75.65% over the baseline. SHAP-based analysis identified delaying tasks and scheduling as key predictors. A significant gender difference was found (p=0.013), but no residence differences (p=0.43). A simulated LSTM model was implemented as proof-of-concept for future longitudinal analysis, with an RMSE of 0.21. The Flask application provides real-time categorization and feedback, offering a scalable tool for identifying students needing support. Future work includes longitudinal data collection and cloud-based deployment to enhance regional educational insights.

Keywords:

Time Management,XGBoost,LSTM,Explainable AI,Higher Education,SHAP,

References:

I. Alkhanbouli, R., Almadhaani, H. M. A., Alhosani, F., & Simsekler, M. C. E. (2025). The role of explainable artificial intelligence in disease prediction: A systematic literature review and future research directions. BMC Medical Informatics and Decision Making, 25(1), Article 110. 10.1186/s12911-025-02944-6

II. Band, S. S., Yarahmadi, A., Hsu, C. C., Biyari, M., Sookhak, M., Ameri, R. & Liang, H. W. (2023). Application of explainable artificial intelligence in medical health: A systematic review of interpretability methods. Informatics in Medicine Unlocked, 40, Article 101286. 10.1016/j.imu.2023.101286

III. Halde, R. R. (2016). Application of machine learning algorithms for betterment in education system. In 2016 International Conference on Automatic Control and Dynamic Optimization Techniques (ICACDOT) (pp. 1110–1114). IEEE. 10.1109/ICACDOT.2016.7877759
IV. Kumar, K., Kumar, P., Deb, D., Unguresan, M. L., & Muresan, V. (2023). Artificial intelligence and machine learning based intervention in medical infrastructure: A review and future trends. Healthcare, 11(2), Article 207. 10.3390/healthcare11020207

V. Orrù, G., Monaro, M., Conversano, C., Gemignani, A., & Sartori, G. (2020). Machine learning in psychometrics and psychological research. Frontiers in Psychology, 10, Article 2970. 10.3389/fpsyg.2019.02970

VI. Pendyala, V., & Kim, H. (2024). Assessing the reliability of machine learning models applied to the mental health domain using explainable AI. Electronics, 13(6), Article 1025. 10.3390/electronics13061025

VII. Praveenraj, D. D. W., Habelalmateen, M. I., Shrivastava, A., Kaur, A., Valarmathy, A. S., & Patnaik, C. P. (2024). Behavioral time management analysis: Clustering productivity patterns using K-means. In 2024 IEEE International Conference on Communication, Computing and Signal Processing (IICCCS) (pp. 1–6). IEEE. 10.1109/IICCCS61609.2024.10763887
VIII. Rezazadeh, H., Mahani, A. M., & Salajegheh, M. (2022). Insights into the future: Assessing medical students’ artificial intelligence readiness—A cross-sectional study at Kerman University of Medical Sciences (2022). Health Science Reports, 8(5), Article e70870. 10.1002/hsr2.70870

IX. Saranya, A., & Subhashini, R. (2023). A systematic review of explainable artificial intelligence models and applications: Recent developments and future trends. Decision Analytics Journal, 7, Article 100230. 10.1016/j.dajour.2023.100230

X. Shahzad, M. F., Xu, S., Lim, W. M., Yang, X., & Khan, Q. R. (2024). Artificial intelligence and social media on academic performance and mental well-being: Student perceptions of positive impact in the age of smart learning. Heliyon, 10(8), Article e29769. 10.1016/j.heliyon.2024.e29769

XI. Thanasekhar, B., Gomathy, N., Kiruthika, A., & Swarnalaxmi, S. (2019). Machine learning based academic stress management system. In 2019 11th International Conference on Advanced Computing (ICoAC) (pp. 147–151). IEEE. 10.1109/ICoAC48765.2019.8935556

XII. Van der Velden, B. H. M., Kuijf, H. J., Gilhuijs, K. G. A., & Viergever, M. A. (2022). Explainable artificial intelligence (XAI) in deep learning-based medical image analysis. Medical Image Analysis, 79, Article 102470. 10.1016/j.media.2022.102470

XIII. Vimbi, V., Shaffi, N., & Mahmud, M. (2024). Interpreting artificial intelligence models: A systematic review on the application of LIME and SHAP in Alzheimer’s disease detection. Brain Informatics, 11(1), Article 10. 10.1186/s40708-024-00222-1

XIV. Von Keyserlingk, L., Yamaguchi-Pedroza, K., Arum, R., & Eccles, J. S. (2022). Stress of university students before and after campus closure in response to COVID-19. Journal of Community Psychology, 50(1), 285–301. 10.1002/jcop.22561

XV. Wijbenga, L., van der Velde, J., Korevaar, E. L., Reijneveld, S. A., Hofstra, J., & de Winter, A. F. (2024). Emotional problems and academic performance: The role of executive functioning skills in undergraduate students. Journal of Further and Higher Education, 48(2), 196–207. 10.1080/0309877X.2023.2300393
XVI. Wolters, C. A., & Brady, A. C. (2021). College students’ time management: A self-regulated learning perspective. Educational Psychology Review, 33(4), 1319–1351. 10.1007/s10648-020-09519-z

XVII. Woodman, R. J., & Mangoni, A. A. (2023). A comprehensive review of machine learning algorithms and their application in geriatric medicine: Present and future. Aging Clinical and Experimental Research, 35(11), 2363–2397. 10.1007/s40520-023-02552-2

View Download

GRAPHENE OXIDE-MODIFIED SLAG CEMENT CONCRETE: EFFECTS ON MECHANICAL STRENGTH, RESISTANCE UNDER AGGRESSIVE ENVIRONMENTS AND MICROSTRUCTURE EVOLUTION

Authors:

Saruk Mallick, Prasanna Kumar Acharya

DOI NO:

https://doi.org/10.26782/jmcms.2026.02.00007

Abstract:

This study investigated the influence of graphene oxide (GO) on enhancing the mechanical characteristics and microstructure of concrete made of slag cement. Concrete samples were made with and without GO, added in varying dosages from 0.01% to 0.1% by weight of cement. The mechanical performance of these specimens was evaluated through compressive, tensile, and flexural strength tests. The durability was checked through acid and sulphate attack tests. To ensure uniform dispersion of GO within the matrix, polycarboxylate ether-based superplasticizer was employed at a measure of 0.25% by weight of cement. Scanning electron microscopy (SEM) was conducted to observe the microstructural development, while energy-dispersive X-ray spectroscopy (EDX) and X-ray Diffraction (XRD) were used to check the composition of the elements of the GO-modified matrix and its contribution to concrete health. The study found that GO addition is beneficial in enhancing compressive, tensile, and flexural strength up to 61, 109, and 39% at 28 days in comparison with conventional concrete. The acid and sulphate resistance of GO-modified concrete was found to be 46% and 30% better than that of control concrete. The effect of GO up to 0.05% on the properties of concrete is found in an increasing trend. SEM analysis confirmed improved dispersion of GO and enhanced interfacial bonding with cement particles. The EDX and XRD analyses validated the macro-level results. These findings highlight the potential of GO as an effective nanomaterial for improving the performance of slag cement-based composites.

Keywords:

Mechanical characteristics,Graphene oxide,Acid resistance,Sulphate resistance,Microstructure,

References:

I. Acharya, P. K., and S. K. Patro. “Acid Resistance, Sulphate Resistance and Strength Properties of Concrete Containing Ferrochrome Ash (FA) and Lime.” Construction and Building Materials, vol. 120, 2016, pp. 241–250, 10.1016/j.conbuildmat.2016.05.099.
II. Bureau of Indian Standards. IS 10262: Concrete Mix Proportioning – Guidelines. 2nd rev., BIS, 2019, New Delhi, India.
III. Bureau of Indian Standards. IS 383: Coarse and Fine Aggregate for Concrete – Specification. 3rd rev., BIS, 2016, New Delhi, India.
IV. Bureau of Indian Standards. IS 455: Portland Slag Cement – Specification. 5th rev., BIS, 2015, New Delhi, India.
V. Bureau of Indian Standards. IS 516 (Part 1/Section 1): Hardened Concrete – Methods of Test: Compressive, Flexural and Split Tensile Strength. BIS, 2021, New Delhi, India.
VI. Bureau of Indian Standards. IS 516 (Part 2/Section 2): Hardened Concrete – Methods of Test: Initial Surface Absorption. BIS, 2020, New Delhi, India.
VII. Bureau of Indian Standards. IS 5816: Method of Test for Splitting Tensile Strength of Concrete. BIS, 1999, reviewed 2018, New Delhi, India.
VIII. Chaipanich, A., et al. “Compressive Strength and Microstructure of Carbon Nanotubes–Fly Ash Cement Composites.” Materials Science and Engineering A, vol. 527, no. 4–5, 2010, pp. 1063–1067.
IX. Chuah, S., et al. “Nano Reinforced Cement and Concrete Composites and New Perspective from Graphene Oxide.” Construction and Building Materials, vol. 73, 2014, pp. 113–124.
X. Cwirzen, A., K. Habermehl-Cwirzen, and V. Penttala. “Surface Decoration of Carbon Nanotubes and Mechanical Properties of Cement/Carbon Nanotube Composites.” Advances in Cement Research, vol. 20, no. 2, 2008, pp. 65–73.
XI. Fu, K., et al. “Defunctionalization of Functionalized Carbon Nanotubes.” Nano Letters, vol. 1, no. 8, 2001, pp. 439–441.
XII. Gaitero, J. J., I. Campillo, and A. Guerrero. “Reduction of the Calcium Leaching Rate of Cement Paste by Addition of Silica Nanoparticles.” Cement and Concrete Research, vol. 38, no. 8–9, 2008, pp. 1112–1118.
XIII. Gholampour, A., et al. “From Graphene Oxide to Reduced Graphene Oxide: Impact on the Physiochemical and Mechanical Properties of Graphene-Cement Composites.” ACS Applied Materials & Interfaces, vol. 9, no. 49, 2017, pp. 43275–43286.
XIV. Kang, D., et al. “Experimental Study on Mechanical Strength of GO–Cement Composites.” Construction and Building Materials, vol. 131, 2017, pp. 303–308.
XV. Keyvani, A. Huge Opportunities for Industry of Nanofibrous Concrete Technology. PhD thesis, Azarbaijan University of Tarbiat Moallem, 2007.
XVI. Konsta-Gdoutos, M. S., Z. S. Metaxa, and S. P. Shah. “Highly Dispersed Carbon Nanotube Reinforced Cement-Based Materials.” Cement and Concrete Research, vol. 40, no. 7, 2010, pp. 1052–1059.
XVII. Li, G. Y., P. M. Wang, and X. Zhao. “Mechanical Behavior and Microstructure of Cement Composites Incorporating Surface-Treated Multi-Walled Carbon Nanotubes.” Carbon, vol. 43, no. 6, 2005, pp. 1239–1245.
XVIII. Li, G. Y., P. M. Wang, and X. Zhao. “Pressure-Sensitive Properties and Microstructure of Carbon Nanotube Reinforced Cement Composites.” Cement and Concrete Composites, vol. 29, no. 5, 2007, pp. 377–382.
XIX. Li, H., et al. “Microstructure of Cement Mortar with Nanoparticles.” Composites Part B: Engineering, vol. 35, no. 2, 2004, pp. 185–189.
XX. Liu, J., et al. “Fracture Toughness Improvement of Multi-Wall Carbon Nanotubes/Graphene Sheets Reinforced Cement Paste.” Construction and Building Materials, vol. 200, 2019, pp. 530–538, 10.1016/j.conbuildmat.2018.12.141.
XXI. Lv, S., et al. “Effect of GO Nanosheets on Shapes of Cement Hydration Crystals and Their Formation Process.” Construction and Building Materials, vol. 64, 2014, pp. 231–239.
XXII. Lv, S., et al. “Effect of Graphene Oxide Nanosheets on Microstructure and Mechanical Properties of Cement Composites.” Construction and Building Materials, vol. 49, 2013, pp. 121–127.
XXIII. Lv, S. H., et al. “Study of Graphene Oxide Reinforced Toughened Cementitious Composites.” Functional Materials, vol. 44, no. 15, 2013, pp. 2227–2231.
XXIV. Lv, S. H., et al. “Toughening Effect and Mechanism of Graphene Oxide Nanoflakes on Cementitious Composites.” Journal of Composite Materials, vol. 31, no. 3, 2014, pp. 644–652.
XXV. Makar, J. “The Effect of SWCNT and Other Nanomaterials on Cement Hydration and Reinforcement.” Nanotechnology in Civil Infrastructure, edited by K. Gopalakrishnan et al., Springer, 2011, pp. 103–130.
XXVI. Nasibulin, A. G., et al. “A Novel Cement-Based Hybrid Material.” New Journal of Physics, vol. 11, 2009, article 023013.
XXVII. Pan, Z., et al. “Mechanical Properties and Microstructure of a Graphene Oxide–Cement Composite.” Cement and Concrete Composites, vol. 58, 2015, pp. 140–147.
XXVIII. Sáez de Ibarra, Y., et al. “Atomic Force Microscopy and Nanoindentation of Cement Pastes with Nanotube Dispersions.” Physica Status Solidi A, vol. 203, no. 6, 2006, pp. 1076–1081.
XXIX. Sanchez, F., and C. Ince. “Microstructure and Macroscopic Properties of Hybrid Carbon Nanofiber/Silica Fume Cement Composites.” Composites Science and Technology, vol. 69, no. 7–8, 2009, pp. 1310–1318.
XXX. Sedaghat, A., et al. “Investigation of Physical Properties of Graphene Cement Composite for Structural Applications.” Open Journal of Composite Materials, vol. 4, no. 1, 2014, pp. 12–21.
XXXI. Shah, S. P., et al. Highly Dispersed Carbon Nanotubes Reinforced Cement-Based Materials. United States Patent Application Publication No. US2009/0229494 A1, 2009.
XXXII. Shang, Y., et al. “Effect of Graphene Oxide on the Rheological Properties of Cement Pastes.” Construction and Building Materials, vol. 96, 2015, pp. 20–28.
XXXIII. Wang, M., et al. “Study on the Three-Dimensional Mechanism of Graphene Oxide Nanosheets Modified Cement.” Construction and Building Materials, vol. 126, 2016, pp. 730–739.
XXXIV. Wang, Z. M., and H. L. Zhang. “Study on the Mechanical Properties of Graphene Oxide Nanosheet Reinforced Cement-Based Composites.” Industrial Buildings, vol. 51, no. 2, 2021, pp. 153–161.

View Download

IMPROVING INDOOR LOCALIZATION ACCURACY BY LINEAR INTERPOLATION OF WIFI RSS AND SMARTPHONE SENSOR DATA

Authors:

Hena Kausar, Suvendu Chattaraj, Abhishek Majumdar

DOI NO:

https://doi.org/10.26782/jmcms.2026.02.00008

Abstract:

Multilateration is a popular geometrical algorithm to determine the location of a mobile smartphone in an indoor environment. In this method, the distance of the smartphone from three or more WiFi access sites is calculated based on the strengths of radio signals. Intermittent measurements of radio signals due to the presence of obstacles in the indoor environment affect the overall localization accuracy. The present work addresses this problem and manages the intermittent measurements issue with an innovative Kalman filter-based approach. The linear interpolation method is applied to obtain uninterrupted coordinate information from WiFi RSS measurements. A Kalman filter is designed that uses these interpolated measurements along with its own sensor data to obtain an optimal localization estimate. Less than 2 meters of final position estimation accuracy is attained in Monte-Carlo simulations, which is better than other state-of-the-art techniques in this domain. Additionally, the performance of this intended approach has been found indistinguishable during frequent loss of measurements, in case of which the conventional trilateration approach could not succeed.

Keywords:

Linear Interpolation,Indoor navigation,Wi-Fi Access Points,Intermittent measurement,Kalman filter,

References:

I. Alfakih, Marwan, Mokhtar Keche, Hadjira Be-noudnine, and Abdelkrim Meche. “Improved Gaussian Mixture Modelling for Accurate Wi-Fi Based Indoor Localization Systems.” Physical Communication, vol. 43, 2020, p. 101218
II. Chen, Jian, Gang Ou, Ao Peng, Lingxiang Zheng, and Jianghong Shi. “An INS/WiFi Indoor Localization System Based on the Weighted Least Squares.” Sensors, vol. 18, no. 5, 2018. 10.3390/s18051458.
III. Golenbiewski, Jaren, and Girma Tewolde. “Wi-Fi Based Indoor Positioning and Navigation System (GPS/INS).” Proceedings of the IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS), 2020, pp. 1–7.
IV. Hayward, S. J., Katherine van Lopik, Christopher Hinde, and Andrew A. West. “A Survey of Indoor Location Technologies, Techniques and Applications in Industry.” Internet of Things, vol. 20, 2022, p. 100608.
V. Jan, Shau-Shiun, Shuo-Ju Yeh, and Ya-Wen Liu. “Received Signal Strength Database Interpolation by Kriging for a Wi-Fi Indoor Positioning System.” Sensors, vol. 15, no. 9, 2015, pp. 21377–21393. 10.3390/s150921377.
VI. Kausar, H., and S. Chattaraj. “On Some Issues in Kalman Filter Based Trilateration Algorithms for Indoor Localization Problem.” Proceedings of the IEEE International Conference on Signal Processing, Informatics, Communication and Energy Systems (SPICES), vol. 1, 2022, pp. 431–435. 10.1109/SPICES52834.2022.9774037.
VII. Khokhar, Zulqarnain, and Murtaza A. Siddiqi. “Machine Learning Based Indoor Localization Using Wi-Fi and Smartphone.” Journal of Independent Studies and Research – Computing, vol. 18, no. 1, 2021.
VIII. Koweerawong, Chavalit, Komwut Wipusitwarakun, and Kamol Kaemarungsi. “Indoor Localization Improvement via Adaptive RSS Fingerprinting Database.” Proceedings of the International Conference on Information Networking (ICOIN), 2013, pp. 412–416. 10.1109/ICOIN.2013.6496414.
IX. Kuemper, Daniel, Thorben Iggena, Ralf Toenjes, and Elke Pulvermueller. “Valid.IOT: A Framework for Sensor Data Quality Analysis and Interpolation.” Proceedings of the 9th ACM Multimedia Systems Conference, 2018, pp. 294–303.
X. McCool, Danielle, Peter Lugtig, and Barry Schouten. “Maximum Interpolable Gap Length in Missing Smartphone-Based GPS Mobility Data.” Transportation, vol. 51, no. 1, 2024, pp. 297–327.
XI. Navada, Bhagya, and Santhosh Venkata. “Filter Design Using Data Fusion for a Pneumatic Control Valve.” Serbian Journal of Electrical Engineering, vol. 18, 2021, pp. 49–61. 10.2298/SJEE2101049N.
XII. Poulose, Alwin, Odongo Steven Eyobu, and Dong Seog Han. “A Combined PDR and Wi-Fi Trilateration Algorithm for Indoor Localization.” Proceedings of the International Conference on Artificial Intelligence in Information and Communication (ICAIIC), 2019, pp. 072–077. 10.1109/ICAIIC.2019.8669059.
XIII. Redži?, Milan D., Conor Brennan, and Noel E. O’Connor. “SEAMLOC: Seamless Indoor Localization Based on Reduced Number of Calibration Points.” IEEE Transactions on Mobile Computing, vol. 13, no. 6, 2014, pp. 1326–1337. 10.1109/TMC.2013.107.
XIV. Singh, Navneet, Sangho Choe, and Rajiv Punmiya. “Machine Learning Based Indoor Localization Using Wi-Fi RSSI Fingerprints: An Overview.” IEEE Access, vol. 9, 2021, pp. 127150–127174.
XV. Suroso, Dwi, Farid Adiyatma, Panarat Cherntanomwong, and Pitikhate Sooraksa. “Fingerprint Database Enhancement by Applying Interpolation and Regression Techniques for IoT-Based Indoor Localization.” Emerging Science Journal, vol. 4, 2022, pp. 167–189. 10.28991/esj-2021-SP1-012.
XVI. Yang, Junhua. “Indoor Localization System Using Dual-Frequency Bands and Interpolation Algorithm.” IEEE Internet of Things Journal, vol. 7, no. 11, 2020, pp. 11183–11194. 10.1109/JIOT.2020.2996610.
XVII. Zhang, Xing, et al. “WiFi-Based Indoor Localization with Interval Random Analysis and Improved Particle Swarm Optimization.” IEEE Transactions on Mobile Computing, vol. 23, no. 10, 2024, pp. 9120–9134.

View Download

ENERGY-EFFICIENT AND SAFE ROUTING WITH A COMBINATION OF PARTICLE SWARM OPTIMIZATION AND FUZZY SET

Authors:

Thanaa Hasan Yousif, Heyam A. Marzog

DOI NO:

https://doi.org/10.26782/jmcms.2026.02.00009

Abstract:

Wireless Sensor Networks (WSNs) are critical to modern IoT applications, yet their deployment is often constrained by limited energy, dynamic topologies, security vulnerabilities, and stringent Quality-of-Service (QoS) requirements. While existing approaches frequently address these challenges in isolation, this paper introduces a holistic routing framework that synergistically integrates an Improved Fuzzy Logic System (IFLS) with Particle Swarm Optimization (PSO) to balance multiple performance metrics in real time. Our hybrid model dynamically tunes routing parameters and fuzzy rules based on network state—including energy levels, congestion, node density, mobility, and security threats—thereby optimizing cluster-head selection, path stability, and trust-aware communication in UAV-assisted WSNs. Extensive simulations demonstrate that the proposed system achieves a 94.2% packet delivery ratio, reduces energy consumption by 48%, and extends network lifetime by 97% compared to contemporary fuzzy-based and trust-aware routing protocols. The work thus offers a scalable, adaptive, and energy-efficient routing solution suitable for large-scale, resource-constrained, and mobility-prone sensor networks. We also provide complete algorithmic specifications and reproducible simulation setups to facilitate validation and further research.

Keywords:

Wireless Sensor Networks (WSN),Fuzzy Logic,Particle Swarm Optimization (PSO),Energy Efficiency,QoS-Aware Routing,UAV Networks,Trust Management.,

References:

I. Alam, M. M., & Moh, S. (2023). Q-learning-based routing inspired by adaptive flocking control for collaborative unmanned aerial vehicle swarms. Vehicular Communications, 40, 100572.
II. Al-Shareefi, N. A., Aldhaibaini, J. A., Abbas, S. A., & Obaid, H. S. (2020). Towards 5G millimeter-wave wireless networks: a comparative study on electro-optical upconversion techniques. vol, 20, 1471-1478.
III. Aldhaibani, J. A., Yahya, A., & Ahmad, R. B. (2014). Optimizing power and mitigating interference in LTE-A cellular networks through optimum relay location. Elektronika ir Elektrotechnika, 20(7), 73-79.
IV. Chan, K. W., Nirmal, U., & Cheaw, W. G. (2018). Progress on drone technology and their applications: A comprehensive review. In AIP Conference Proceedings (Vol. 2030, p. 020308). Ho Chi Minh, Vietnam: AIP Publishing.
V. Colefax, A. P., Butcher, P. A., Pagendam, D. E., & Kelaher, B. P. (2019). Reliability of marine faunal detections in drone-based monitoring. Ocean & Coastal Management, 174, 108–115.
VI. Giusti, E., et al. (2023). A drone-based multisensory payload for maritime pollutants detections. IEEE Aerospace and Electronic Systems Magazine, 38(2), 4–18.
VII. Hosseinzadeh, M., et al. (2023). A novel fuzzy trust-based secure routing scheme in flying ad hoc networks. Vehicular Communications, 44, 100665.
VIII. Kumbhar, F. H., & Shin, S. Y. (2023). Innovating multi-objective optimal message routing for unified high mobility networks. IEEE Transactions on Vehicular Technology, 72(5), 6571–6583.
IX. Li, J., Zhang, G., Jiang, C., & Zhang, W. (2023). A survey of maritime unmanned search system: Theory, applications and future directions. Ocean Engineering, 285, 115359.
X. Li, S., Wang, F., Gaber, J., & Zhou, Y. (2020). An optimal relay number selection algorithm for balancing multiple performance in flying ad hoc networks. IEEE Access, 8, 225884–225901.
XI. Mahapatra, S. N., Singh, B. K., & Kumar, V. (2022). A secure multi-hop relay node selection scheme based data transmission in wireless ad hoc network via blockchain. Multimedia Tools and Applications, 81(13), 18343–18373.
XII. Mezaal, Y. S., & Abdulkareem, S. F. (2017). Affine cipher cryptanalysis using genetic algorithms. JP Journal of Algebra, Number Theory and Applications, 39(5), 785-802.
XIII. Mezaal, Y. S., Khaleel, S. K., Alameri, B. M., Al-Majdi, K., & Al-Hilali, A. A. (2024). Miniaturized microstrip dual-channel diplexer based on modified meander line resonators for wireless and computer communication technologies. Technologies, 12(5), 57.
XIV. Mezaal, Y. S., Khaleel, S. K., Al-Hillal, A. A., Azeez, A. R., Hemza, M. S., & Al-Majdi, M. (2024). State of art on microstrip resonators, filters, diplexers and triplexers. Journal of Mechanics of Continua and Mathematical Sciences, 19, 1-24.
XV. Mittal, H., & Joshi, A. (2023). Automatic ship detection using CFAR algorithm for quad-pol UAV-SAR imagery. In Proceedings of UASG 2021 (Vol. 304, pp. 199–210). Cham, Switzerland: Springer.
XVI. Mohsin, M. J., Marzog, H. A., & Therib, M. A. (2020). Enhancement throughput and increase security of image transmitted over wireless network using (DNC). In IOP Conference Series: Materials Science and Engineering (Vol. 928). Thi-Qar, Iraq: IOP Publishing.
XVII. Mozaffari, M., Saad, W., Bennis, M., & Debbah, M. (2017). Mobile unmanned aerial vehicles (UAVs) for energy-efficient Internet of Things communications. IEEE Transactions on Wireless Communications, 16(11), 7574–7589.
XVIII. Qian, L., Zhang, H., Wang, Q., Wu, Y., & Lin, B. (2023). Joint multi-domain resource allocation and trajectory optimization in UAV-assisted maritime IoT networks. IEEE Internet of Things Journal, 10(1), 539–552.
XIX. Rahmani, A. M., et al. (2022). OLSR+: A new routing method based on fuzzy logic in flying ad-hoc networks (FANETs). Vehicular Communications, 36, 100489.
XX. Roman, A., et al. (2023). Mapping intertidal oyster farms using unmanned aerial vehicles (UAV) high-resolution multispectral data. Estuarine, Coastal and Shelf Science, 291, 108432.
XXI. Saeed, S. R., et al .(2023). The study of deep learning for automotive logo recognition and classification. Periodicals of Engineering and Natural Sciences, 11(3), 255-268.
XXII. Shareef, M. S., Abd, T., & Mezaal, Y. S. (2020). Gender voice classification with huge accuracy rate. TELKOMNIKA (Telecommunication Computing Electronics and Control), 18(5), 2612-2617.
XXIII. Serov, V. A., Voronov, E. M., & Kozlov, D. A. (2021). A neuro-evolutionary synthesis of coordinated stable-effective compromises in hierarchical systems under conflict and uncertainty. Procedia Computer Science, 186, 257–268.
XXIV. Sharma, J., & Mehra, P. S. (2023). Secure communication in IoT-based UAV networks: A systematic survey. Internet of Things, 23, 100883.
XXV. Telli, K., et al. (2023). A comprehensive review of recent research trends on unmanned aerial vehicles (UAVs). Systems, 11(8), 400.
XXVI. Thakkar, P., Balaji, A., & Narwane, V. S. (2019). Intelligent unmanned aerial vehicles. In Proceedings of International Conference on Intelligent Manufacturing and Automation (pp. 485–494). Singapore: Springer.
XXVII. Tucker, J. P., et al. (2021). White shark behaviour altered by stranded whale carcasses: Insights from drones and implications for beach management. Ocean & Coastal Management, 200, 105477.
XXVIII. Tomah, Nahla Ali , Marwa Jaleel Mohsin, Thanaa Hasan Yousif.(2025). Journal of Optics. Wavelength-dependent cytotoxicity of platinum nanoparticles in photodynamic therapy against hepatocellular carcinoma.
XXIX. Van’t Hof, A., & Nieh, J. (2019). AnDrone: Virtual drone computing in the cloud. In Proceedings of the 14th EuroSys Conference (pp. 1–16). Dresden, Germany: ACM.
XXX. Wang, Z., et al. (2023). Learning to routing in UAV swarm network: A multi-agent reinforcement learning approach. IEEE Transactions on Vehicular Technology, 72(5), 6611–6624.
XXXI. Yahya, A., et al. (2016). Lte-a cellular networks. Multi-hop Relay for Coverage, Capacity and Performance Enhancement.
XXXII. Yang, T., Jiang, Z., Dong, J., Feng, H., & Yang, C. (2018). Multi agents to search and rescue based on group intelligent algorithm and edge computing. In Proceedings of IEEE iThings/GreenCom/CPSCom/SmartData (pp. 389–394). Halifax, NS, Canada: IEEE.
XXXIII. Yousif, Thanaa Hasan , Nahla Ali Tomah, Marwa Jaleel Mohsin(2023). Machine learning-based diagnosis of eye-diseases Indonesian Journal of Electrical Engineering and Computer Science. 32 (2), pp. 787~795.
XXXIV. Yousif, Thanaa Hasan, et al., Multiple transceivers based wimax mesh network to optimize routing algorithm.(2021) Journal of Physics: Conference Series.
XXXV. Zeng, Y., Zhang, R., & Lim, T. J. (2016). Wireless communications with unmanned aerial vehicles: Opportunities and challenges. IEEE Communications Magazine, 54(5), 36–42.

View Download

IMPACT OF ANTIOXIDANT–NANOPARTICLE ADDITIVES ON COMBUSTION, PERFORMANCE, AND EMISSION CHARACTERISTICS OF A BIODIESEL-FUELED CRDI DIESEL ENGINE

Authors:

A. Anbarasu, S. Thirumavalavan, R. J. Golden Renjith Nimal, R. Sabarish, Cheng Xinwen

DOI NO:

https://doi.org/10.26782/jmcms.2026.02.00010

Abstract:

This study investigates the effect of antioxidant additives on the performance and emission characteristics of a Common Rail Direct Injection (CRDI) diesel engine fuelled with biodiesel blends. Biodiesel derived from Madhuca indica (Mahua) oil was blended with conventional diesel in different proportions (B10, B20, and B30). To enhance oxidative stability and control NOx emissions, two antioxidants, Butylated Hydroxytoluene (BHT) and Tert-Butylhydroquinone (TBHQ), were added at concentrations of 1000 ppm and 1000 ppm. Experiments were conducted on a single-cylinder, four-stroke, water-cooled CRDI engine at a constant speed of 1500 rpm under varying load conditions. The results showed that the addition of antioxidants improved brake thermal efficiency (BTE) and reduced brake-specific fuel consumption (BSFC) compared to untreated biodiesel blends. A notable reduction in NOx and smoke opacity was achieved with TBHQ, while CO and HC emissions exhibited a marginal increase. The optimal performance and emission trade-off was obtained with the B20 + TBHQ (1000 ppm) blend, demonstrating the potential of antioxidant-treated biodiesel as a sustainable and cleaner fuel for CRDI diesel engines.

Keywords:

Biodiesel blends; Energy Efficiency,CRDI diesel engine; Antioxidant additives; Butylated Hydroxytoluene (BHT); Tert-Butylhydroquinone (TBHQ); Performance characteristics; Emission reduction; Oxidative stability; NOx emissions; Brake thermal efficiency (BTE),

References:

I. Agarwal, A. K., Gupta, J. G., & Dhar, A. (2021). Potential and challenges of biodiesel production from non-edible oils in India. Renewable and Sustainable Energy Reviews, 135, 110206. 10.1016/j.rser.2020.110206
II. Atmanli, A., Ileri, E., & Yuksel, B. (2016). Effects of antioxidant additives on engine performance and exhaust emissions of a diesel engine fueled with canola oil biodiesel–diesel blends. Energy Conversion and Management, 118, 11–19. https://doi.org/10.1016/j.enconman.2016.03.046
III. Balaji, G., & Cheralathan, M. (2020). Experimental investigation on the influence of antioxidant additives on oxidation stability and performance of a CI engine fueled with biodiesel. Fuel, 262, 116535. 10.1016/j.fuel.2019.116535
IV. Baskar, P., & Senthil Kumar, A. (2016). Experimental analysis of antioxidant additives with biodiesel on engine performance and emissions. Renewable Energy, 95, 390–400. 10.1016/j.renene.2016.04.004
V. Chen, R., Zhang, L., & Zhang, Y. (2022). Effects of antioxidants on oxidation stability and NOx emission characteristics of biodiesel. Energy, 238, 121700. 10.1016/j.energy.2021.121700
VI. Dhar, A., Kevin, R., & Agarwal, A. K. (2012). Production of biodiesel from high-FFA non-edible oils and performance evaluation in a CI engine. Fuel, 104, 30–40. 10.1016/j.fuel.2011.10.008
VII. Fattah, I. M. R., Rahman, S. A., & Masjuki, H. H. (2014). Effect of antioxidant additives on the oxidation stability and emission performance of a CI engine fueled with palm biodiesel blends. Energy Conversion and Management, 79, 265–272. 10.1016/j.enconman.2013.12.032
VIII. Goga, G., & Chintala, V. (2021). Experimental study of CRDI diesel engine characteristics using biodiesel blends with nano and antioxidant additives. Fuel, 303, 121301. 10.1016/j.fuel.2021.121301
IX. Han, H., Cao, W., & Zhang, J. (2019). Review on biodiesel production and oxidation stability improvement. Renewable and Sustainable Energy Reviews, 102, 290–306. 10.1016/j.rser.2018.12.038
X. Ileri, E., & Atmanli, A. (2016). Experimental investigation of the effects of antioxidant additives on the performance and exhaust emissions of a diesel engine fueled with biodiesel blends. Applied Thermal Engineering, 106, 1117–1125. 10.1016/j.applthermaleng.2016.06.060
XI. Jain, S., & Sharma, M. P. (2010). Stability of biodiesel and its blends: A review. Renewable and Sustainable Energy Reviews, 14(2), 667–678. 10.1016/j.rser.2009.10.011
XII. Khan, M. I., & Islam, M. R. (2022). Impact of antioxidants on the stability and performance of biodiesel: A review. Fuel Processing Technology, 224, 107015. 10.1016/j.fuproc.2021.107015
XIII. Kumar, N. (2017). Oxidative stability of biodiesel: Causes, effects, and prevention. Fuel, 190, 328–350. 10.1016/j.fuel.2016.10.121
XIV. Leung, D. Y. C., & Luo, Y. (2020). Effects of antioxidant and metal deactivator additives on biodiesel oxidation stability. Energy, 200, 117495. 10.1016/j.energy.2020.117495
XV. Mofijur, M., Rasul, M. G., & Hyde, J. (2014). Role of antioxidant additives in improving the oxidation stability of biodiesel fuels. Energy Procedia, 75, 1111–1116. 10.1016/j.egypro.2015.07.265
XVI. Natarajan, S., & Kumar, G. (2023). Experimental analysis on performance and emission behavior of biodiesel blends with antioxidant and nanoadditives. Fuel, 341, 127660 10.1016/j.fuel.2023.127660
XVII. Ozener, O., Yüksek, L., & Ergenç, A. T. (2014). Effects of biodiesel–diesel fuel blends on performance and emissions of a diesel engine. Applied Energy, 118, 111–119. 10.1016/j.apenergy.2013.12.019.
XVIII. Sabarish, R. (2019). Experimental investigation of single cylinder diesel engine by diesel – Citrullus vulgaris with N-Butanol and its blends. Journal Of Mechanics Of Continua and Mathematical Sciences,1(2). 10.26782/jmcms.spl.2019.08.00080

XIX. Palash, S. M., Kalam, M. A., & Masjuki, H. H. (2015). Impacts of antioxidant additives on the oxidation stability and NOx emissions of a CI engine fueled with biodiesel. Energy Conversion and Management, 90, 68–75. 10.1016/j.enconman.2014.11.002
XX. Radhakrishnan, S., Devarajan, Y., & Nagappan, B. (2021). Influence of TBHQ antioxidant additive on performance, emission, and oxidation stability of biodiesel blends in diesel engines. Renewable Energy, 178, 537–548. 10.1016/j.renene.2021.06.073
XXI. Sharma, A., Rajak, U., & Chaurasiya, P. K. (2022). Combined effect of antioxidant and nanoparticle additives on combustion and emission characteristics of biodiesel-fueled CRDI engine. Fuel, 324, 124654. 10.1016/j.fuel.2022.124654
XXII. Dhairiyasamy, R., Bunpheng, W., kit, C. C., & Hasan, N. (2025). Comparative Performance and Emission Analysis of Soybean and Algae Biodiesels in Low Heat Rejection Engines. Energy Science & Engineering, 13(4), 1732–1748. 10.1002/ese3.2090
XXIII. Mylavarapu, A., Manikandan, R., Alwetaishi, M., & Elumalai, P. V. (2025). Impact of butanol and hexanol on RCCI engine efficiency and emission characteristics using sapota oil methyl ester and response surface methodology. Scientific Reports, 15(1). 10.1038/s41598-025-11243-z

View Download