Forthcoming and Online First Articles

International Journal of System of Systems Engineering

International Journal of System of Systems Engineering (IJSSE)

Forthcoming articles have been peer-reviewed and accepted for publication but are pending final changes, are not yet published and may not appear here in their final order of publication until they are assigned to issues. Therefore, the content conforms to our standards but the presentation (e.g. typesetting and proof-reading) is not necessarily up to the Inderscience standard. Additionally, titles, authors, abstracts and keywords may change before publication. Articles will not be published until the final proofs are validated by their authors.

Forthcoming articles must be purchased for the purposes of research, teaching and private study only. These articles can be cited using the expression "in press". For example: Smith, J. (in press). Article Title. Journal Title.

Articles marked with this shopping trolley icon are available for purchase - click on the icon to send an email request to purchase.

Online First articles are published online here, before they appear in a journal issue. Online First articles are fully citeable, complete with a DOI. They can be cited, read, and downloaded. Online First articles are published as Open Access (OA) articles to make the latest research available as early as possible.

Open AccessArticles marked with this Open Access icon are Online First articles. They are freely available and openly accessible to all without any restriction except the ones stated in their respective CC licenses.

Register for our alerting service, which notifies you by email when new issues are published online.

We also offer which provide timely updates of tables of contents, newly published articles and calls for papers.

International Journal of System of Systems Engineering (70 papers in press)

Regular Issues

  • A Secure and Efficient Mobile ID Framework for Authentication with Enhance ECC   Order a copy of this article
    by Kapil Kant Kamal, Sunil Gupta, Padmaja Joshi, Monit Kapoor 
    Abstract: The broad adoption of smartphones as a primary computing platform has led to their use for several real-life applications. Online payment transactions, location-based services, electronic governance, and online social media are a few of them. Such applications require access to various services through mobile applications, sharing sensitive information like authentication credentials, pictures, videos, personal data, etc. Therefore, the adoption of secure Mobile Identity Management (IDM) is the need of the day. We, in this regard, provide a scheme for identity authentication during online transactions. We first analyse the design requirements and propose a Mobile ID authentication architecture by leveraging PKI (public-key infrastructure), EECC (Enhance Elliptic Curve Cryptography), and token-based authentication. Finally, we use function verification and performance analysis to assess the suggested method for Mobile identity authentication. By contrasting the proposed Enhance ECC with the current RSA (Rivest-Shamir-Adleman), AES, and ECC algorithms, the overall performance is examined. The experimental results show the viability of this proposal.
    Keywords: Mobile ID; Authentication; Cryptography; Key Management; Network Security.
    DOI: 10.1504/IJSSE.2025.10059079
     
  • Biocybersecurity and Applications of Predictive Physiological Modeling   Order a copy of this article
    by Lucas Potter, Sachin Shetty, Saltuk Karahan, Xavier-Lewis Palmer 
    Abstract: In the scientific world, models are useful abstractions and sets of rules that can be utilized to predict hypothetical events. One's first exposure to models is likely in primary science education - models of gravity or chemical interaction. As computational power increases, the availability of models for different purposes continues to grow. For instance, models of climate and weather are more accurate than before. This growth has also grown to encompass the field of medicine. There is now an increasing number of computational models that describe the physiology of a given patient with great accuracy and interaction. The development of these models is a boon to the medical training field and is typically the reason for most of the development of these models. These models could be used to design a customised, multivariate biological threat. This threat would be entirely hypothetical if the medical training models were a singular development. However, the independent rise of low-cost, semi-autonomous biological manipulators gives this hypothetical threat very practicable teeth to combine high-resolution computational data with designer bioagents to deliver the optimal biological agent for a threat. This paper attempts to spur conversation based on the exploration of this distinct possibility and scenarios derived from the ideas proposed within the models described below.
    Keywords: Biocybersecurity; Cyberbiosecurity; Predictive; Physiological Modeling; Machine Learning; Deep Learning; Artificial Intelligence; Biodefense; Models; Bioweapons.
    DOI: 10.1504/IJSSE.2024.10056103
     
  • Strengths of Computational Systems of Techniques Using Artificial Intelligence in Machine Learning   Order a copy of this article
    by Shashikant V. Athawale, Indrajit Patra, Amol Dattatray Dhaygude, Vaibhav Rupapara, Thanwamas Kassanuk, Khongdet Phasinam 
    Abstract: As a result of technology improvements, engaging and interactive commercials frequently use short messaging services. One of the most well-known cell advertising strategies is location-based advertising. Advertisements for artificially enhanced location-based services use randomised forests, support vector machines, and synthetic neural networks. It appears sufficient for generic structures, development tools, and other field implementations. Machine learning employs algorithms and data to simulate realistic computer learning and enhance system accuracy. Machine learning algorithms can predict friction force and equipment wear to extend dry machining drill bit life. Modern cognitive computing frameworks enable optimised conventional machining process variables to increase component production productivity. Machine learning systems can predict and improve product quality to improve machine precision. Machine learning is used in self-driving cars, intelligent assistants, diagnosis, and other technologies. Machine learning predicts industrial equipment power demand and reduces milling power consumption. Future research should summarise the latest milling operations investigations on these topics. Machine tools use natural and artificial information systems in this investigation.
    Keywords: Utilization; methods; Machine learning; Instruction; Decision-making; Artificial intelligence; Machine tools; Computational Systems of Techniques.
    DOI: 10.1504/IJSSE.2024.10057269
     
  • Brain Tumor Detection Systems Based on Histopathological Image Analysis Using Segmentation and Classification by Deep Learning Architectures   Order a copy of this article
    by Abdullah Alamoudi 
    Abstract: The human brain has billions of cells and is one of the body’s most complicated organs. This research proposes a novel technique in histopathological image analysis for detecting brain tumor by segmentation with classification utilizing deep learning (DL)methods. Input images have been taken as histopathological images and processed for noise removal, smoothening, and normalization using Adaptive median filtering and Macheno-Stain Normalization. Then the processed image was segmented utilizing an active contour-based Kernel k-means clustering operation where the tumor region has been segmented, and this segmented part has been classified. The classification has been carried out using Boltzmann Q- learning with a convolutional network, where the exact tumor region has been classified, and its volume has been analyzed. Experimental analysis is carried out for various histopathological brain images for the proposed technique compared to the existing technique. the parameters compared are accuracy of 96%, sensitivity of 91%, specificity of 86%, coefficient of dice of 85%, Jaccards coefficient of 96%, spatial overlap of 68%, AVME of 53%, and FoM of 63%.
    Keywords: Brain Tumor; Segmentation; Classification; Histopathological Image Analysis; Deep Learning.
    DOI: 10.1504/IJSSE.2024.10057475
     
  • Spark Framework-Based Crop Yield Prediction Using KR-PEclat And Mish-ANFIS-GRU Technique   Order a copy of this article
    by Anupama C.G, Lakshmi C 
    Abstract: Recent advancements have made tremendous development in various fields including the agricultural sector. Existing research methodologies predicted the crop yield only based on the soil and weather conditions which in turn degraded the efficiency of the crop yield prediction. Hence, an efficient Mish-ANFIS-GRU and DI-LDA-based crop yield prediction methodology is proposed. Initially, the data obtained from the historical dataset is pre-processed and data partitioning is performed using the KR-PEclat algorithm. The partitioned data is then fed into the spark framework. Then, data balancing is done using SMOTE technique to obtain the highest matching data. Next, features are extracted from the balanced data followed by the DI-LDA-based feature reduction process. The reduced features are then fed into the Mish-ANFIS-GRU classifier. Now, when the farmer enters the condition for predicting the yield of the particular crop, feature mapping is performed to provide a better prediction of the crop yield.
    Keywords: Imputation; Gated Recurrent Unit(GRU); Linear Discriminant analysis(LDA); Adaptive Neuro Fuzzy Interference System(ANFIS); Synthetic Minority Oversampling Technique (SMOTE).
    DOI: 10.1504/IJSSE.2024.10057480
     
  • An efficient Smart Container Design Using Internet of Things and Its Applications   Order a copy of this article
    by Umamaheswari K.M, Muthu Kumaran A.M.J, Shobana J, Dorathi Jeyaseeli J.D, Sivasankari K, Safa M 
    Abstract: In the modern era where technology is deeply rooted in ones daily life, the dependence on machines increases. A technology where we define relationships between different objects, devices or components is one such example of the Internet of Things (IoT). However, we must also consider solutions for integrating objects and devices before the concept of IoT emerges. For this reason, the proposed work aims to develop a low-cost smart container that informs us about the amount of products, regardless of the type of material, stored inside the container. It also assesses essential features that can be used for research, such as the internal temperature and humidity of the material stored inside the container. Additionally, a system-defined shopping list can be prepared and items can be added to the shopping list if the quantity of products falls below a user-defined threshold value.
    Keywords: Smart Container; temperature; application; humidity; object.
    DOI: 10.1504/IJSSE.2024.10057936
     
  • Bidirectional LSTM and Self-Attention Mechanisms based Multi-Label Sentiment Analysis   Order a copy of this article
    by Aruna A.R 
    Abstract: This study proposes the implementation of a novel optimization-depend on deep learning algorithm for Multi-Label Sentiment Analysis (MLSA). The goal of the algorithm is to improve the accuracy of sentiment analysis, particularly in the context of e-commerce-related applications. This technique effectively categorize the text data into multiple sentiment classes, such as positive, negative, neutral, or other emotions, and to determine the overall sentiment expressed in a given text document. The challenge of MLSA on e-commerce data lies in the informal and often cryptic nature of the text, which can make sentiment analysis difficult. To address this, a novel optimization-empowered Bidirectional Long-Short Term Memory (Bi-LSTM) system with Self-Attention Mechanisms is proposed in this research work. It uses the Bi-LSTM network to capture the sequential relationships between words in the manuscript and the self-attention mechanism to dynamically weigh the importance of different words in determining the overall sentiment expressed in the text
    Keywords: Self-attention; Bi-Directional Long Short-Term Memory; Multi-Label Sentimental Analysis; Deep Learning; Sentimental Analysis; Natural Language Processing.
    DOI: 10.1504/IJSSE.2025.10059046
     
  • Automatic Music Generation Using Bio-Inspired Algorithm Based Deep Learning Model   Order a copy of this article
    by V.Bhuvana Kumar, M. Kathiravan 
    Abstract: In recent years, automatic music generation plays vital role to get multimedia products cheaper and faster. For automatic music generation, both machine learning and deep learning methods were presented. The researchers, in particular, have used long short term memory (LSTM). Although the LSTM model produces better results, its prediction accuracy for music generation needs to be improved further. Thus, an optimized LSTM model is presented for automatic music generation. Namely, to improve the efficiency of LSTM, adaptive crocodile optimization algorithm (ACOA) is presented. Using ACOA, weight parameters of the LSTM are optimized. It leads to enhance the efficiency of music generation or music vector prediction. The proposed scheme is evaluated using classical music MIDI dataset. The article's findings show that the proposed ACOA-LSTM outperforms the conventional LSTM in prediction accuracy.
    Keywords: Automatic music generation; LSTM; ACOA; MIDI.
    DOI: 10.1504/IJSSE.2024.10058092
     
  • Security and Data Privacy Systems Concerns in IoT Using Consensus Algorithm   Order a copy of this article
    by Maria Michael Visuwasam L, Sheetal Vishal Deshmukh, N.R.Rejin Paul, M.Arun Manicka Raja, Kanimozhi S, Anuradha Thakare 
    Abstract: The most recent technology to emerge as a result of the quick development of smart devices and related technologies from both an industry and research standpoint is the Internet of Things (IoT). IoT techniques are used in the development of apps for real-time monitoring. Smart things are vulnerable to attacks due to their insufficient processing and storage capacities and the ineffectiveness of current security and encryption techniques. The first step was an investigation and analysis of the study's system to identify any potential breaches in confidentiality or security. Second, several security options are provided by blockchain technology. The intricacies of the analysis, such as the incorporation of enabling technologies and the Internet of Things, are broken down in great detail. After that, the results of a sample experiment utilising a blockchain-driven Ethereum and an intelligent IoT system are shown to the audience.
    Keywords: IoT; smart IoT; Block Networks; Security; Privacy Systems; Cryptography Technique.
    DOI: 10.1504/IJSSE.2024.10058093
     
  • An Enhanced Multi-Kernel Based Extreme Learning Machine Model for Crop Yield Prediction in IoT-Based Smart Agriculture   Order a copy of this article
    by Yogomaya Mohapatra, Anil Kumar Mishra 
    Abstract: Smart agriculture is a terrific approach to boost agricultural output and boost farm productivity, whereas the Internet of Things (IoT) provides production and control facilities with intelligent navigation. Large-scale physical surveys and the use of remote sensing data are two approaches that are widely used for crop prediction. Due to the growing volume of data generated by remote sensing images and the requirement for more sophisticated algorithms to identify the underlying spatiotemporal patterns of this data, this approach is essential for the issue of forecasting agricultural yields. Despite the fact that this field has made great strides owing to machine learning techniques. Here, we suggested a machine learning-based automated prediction approach. The crop production can be accurately predicted by the suggested optimized Multi-Kernel Based Extreme Learning Machine model. By employing the adaptive rat optimization technique to optimize the kernel parameters of kernel functions, the performance of the Multi-Kernel Based Extreme Learning Machine is improved in this detection model. The recommended OMK-ELM model can detect crop yield output in IoT agriculture with a maximum accuracy of 98.462%, precision of 93.627%, and recall of 99.721%, according to testing results.
    Keywords: Crop Yield Prediction; Extreme Learning Machine; IoT; OMK-ELM; Adaptive Rat Optimization Algorithm; Machine Learning.
    DOI: 10.1504/IJSSE.2024.10058117
     
  • Energy Aware Optimisation of Topology Update Interval and Routing Based On Adaptive Chimp Optimization Algorithm in k-Connected MANETs   Order a copy of this article
    by Shyam Sundar Agrawal, Rakesh Rathi 
    Abstract: In k-connected Mobile Ad-hoc Network (MANET), topology control algorithm plays an important role to support efficient routing. However, due to node mobility and direction changes, the network topology struggles to find it hard to maintain the network connected.To solve this issue, topology update interval (TUI) and topology of each node in the network should be optimized. Thus, in this paper, three phases are followed to enhance the energy efficiency of the network. To determine the best TUI for each node, the minimal power consumption and remaining time of nearby nodes are first calculated. Second, the optimal topology is selected within the optimal TUI by calculating the topology's minimum cumulative power consumption. At the final, the adaptive chimp optimization algorithm selects the optimal routing path from among these connected topologies (ACOA). According to the study's findings, the suggested strategies improve delivery ratios, throughput, connectivity, and energy expansion.
    Keywords: MANET; TUI; ACOA; topology control algorithm; connectivity ratio.
    DOI: 10.1504/IJSSE.2024.10058118
     
  • Compact microstrip patch antenna design using Deep belief neural network for wireless application   Order a copy of this article
    by Sandhya Rani Sriram, Kumar Naik Ketavath 
    Abstract: This paper presents a deep belief neural network (DBN) to design an inset-fed E-shaped microstrip patch antenna. To design the shape of such an antenna, a DBN is proposed. This article is presented to design of a compact patch microstrip antenna with an operating frequency of 0.75 to 2.24 GHz and 3 to 3.46 GHz. The upper and lower notches maintain the same dimensions throughout the design process. Notch length and width are set for the investigation purpose. The proposed work utilizes the optimal DBNN model for the designing of the antenna in terms of area and therein significantly maximizes the bandwidth usage and is also used for simulation purposes. The outcomes are analyzed and compared with state-of-art works and show our proposed approach shows the reduced area with the maximized bandwidth usage.
    Keywords: Microstrip patch antenna; E-shaped microstrip patch antenna; Deep belief neural network; Bandwidth and Area.
    DOI: 10.1504/IJSSE.2025.10058886
     
  • Development of Detection & Recognition of Human Activity in Sports using GMM and CNN algorithms   Order a copy of this article
    by Dhivya Karunya S, Krishna Kumar 
    Abstract: The system offers a comprehensive mechanism for tracking several individuals and measuring their combined actions. Our method assumes that a person's mobility, activity, and neighbouring people's motions and behaviours are meaningfully interconnected. We propose a hierarchy of activity types to allow a more natural transition from solo mobility to communal motion. The approach provides a two-tiered hierarchical graphical model to learn the spatial and temporal links between tracks, tracks, and activity segments. We also propose combining conviction engendering with a branch and bound methodology modified with whole number programming to solve this intractable joint inference problem. This work uses motion and context data to jointly model and detect associated movie actions. The realisation that geographically and temporally related events rarely happen separately and often serve as backdrops prompted this. A hierarchical two-layer conditional random field model represents action segments and activities. The model integrates motion and backdrop variables at numerous levels and generates statistics that automatically identify typical patterns.
    Keywords: CNN; GMM; Sports Activity; Medicine; Athletics; Entertainment Business; Machine Learning; Human Activity in Sports.
    DOI: 10.1504/IJSSE.2024.10058138
     
  • A Comprehensive Review of Various MLI Topologies to Minimize the THDs for FACTS Applications   Order a copy of this article
    by B. Thejasvi, P. Vijayapriya 
    Abstract: In modern days, multilevel inverters (MLIs), which are becoming a feasible technology for a number of applications, particularly FACTS applications, have gained increased attention in research and industry. MLI has a harmonic problem which has a negative impact on some applications, such as producing torque pulsing in grid-connected electric drives, shortening system lifespan and deteriorating efficiency. To solve these issues the different MLI topologies have been investigated. Hence, the various types of MLI topologies tabulated. Not only are these setups achieving higher performance to enhance power quality, but they are also lowering losses. This review also offers a thorough analysis of MLI topologies' various modulation methods and control schemes. Comparison based on significant performance metrics, specific technological difficulties, and future directions is also included in this review study.
    Keywords: FACTS; MLI; Total Harmonic Distortion (THD); Cascaded H-Bridge MLIs (CHB MLI) and Reduced Switch Symmetric H-Bridge Type MLI (RSS MLI).
    DOI: 10.1504/IJSSE.2024.10058155
     
  • Load Balancing in Cloud Computing Systems Using Density Based Clustering Approach   Order a copy of this article
    by Pearly Charles, Vimala S 
    Abstract: Cloud computing, which uses clustering to load balance, is the current paradigm for providing ultimate services to society via the internet. This technology delivers all PAYG services. Privacy, security, reliability, and other problems offset infrastructure, platform, and software gains. Load balancing improves dispersed environments. Recent research prevents VM under- and over-loading. This research uses a density-based clustering-derived LB method. The turn around time (TAT) is much lower than K-Means. K-Means and DBSCAN cloud load balance. Clustering balances server loads. Similar queries let server clusters share the load. System performance, reaction time, and downtime improve the traditional load balancing works well. Round-robin sequence requests among servers. Cluster servers share the load. The least-connections approach sends requests to the server with the fewest active connections, ensuring each server has a similar capacity. Clustering load balances in real time. Clustering algorithms transfer groupings to other servers to balance demand. K-Means takes 269.875ms longer than anticipated.
    Keywords: Load Balancing; Turn Around Time (TAT); Virtual Machine (VM); Cloud Lets; Cloud Sim; Clustering Approach.
    DOI: 10.1504/IJSSE.2024.10058171
     
  • Predicting Consumer's Intention of Biological Products Using E-Commerce Data   Order a copy of this article
    by Kaliraj S, Raghavendra S, Femilda Josephin J.S, Sivakumar V, Karthick K 
    Abstract: Digitalization has evolved as a boon to the e-commerce market. Biological products and organic products also target e-commerce platforms to increase their business. E-commerce has the upper hand over traditional marketing practices due to its adequate accessibility and usability. The research revolves around consumers' opinions in the form of ratings and the idea that the products sold on E-Commerce platforms correlate with the product's rating and features like brand, price, etc. This lets the practitioners predict the consumers' intention by predicting the possible rating. There are many approaches available to predict consumer intention based on e-commerce data. In this paper, we have evaluated the performance of all the machine learning classification algorithms. All of these are used in our proposed structure to predict consumer intention on a product. Here we trained machine learning algorithms using an extracted dataset for forecasting biological product ratings based on other product features. Performance of different machine learning algorithms on e-commerce data discussed using metrics.
    Keywords: Supervised machine learning; consumer behavior; classification algorithms; e-commerce biological product; deep learning.
    DOI: 10.1504/IJSSE.2025.10059048
     
  • Cardiovascular disease prediction using Hybridization multi perception classifier in secure IoT platform
    by Safa M, Pandian A, Chakrapani K, Karpaga Selvi, Kempanna M, Arun D, Umamaheswari K.M 
    Abstract: The primary purpose of this study is to propose a hybrid fuzzy-based decision tree method for early heart attack prediction using a continuous and remote patient monitoring system. The first planned goal is to create an IoT system that detects an individual's level of stress and uses the information gathered through sensor-linked IoT to help individuals cope with stress. The sensory system detects and monitors other proposed data sets for heart disease patients involved in temperature, blood pressure, pulse oximetry, and stress. The IoT Edge intelligence device senses signals from sensors. It manages and monitors output using the MQTT protocol. The IoT Hub, in collaboration with large-scale devices, generates analytical cardiovascular predictions using streaming analysis and real-time data processing in this suggested system. Predictive models for stress analysis are designed using machine learning methods.
    Keywords: Cardiac disease prediction; big data analysis; HMPC; CHD; Stress; Sensors.
    DOI: 10.1504/IJSSE.2025.10058918
     
  • A novel approach for Enhancing Mammographic Images   Order a copy of this article
    by Richa Sharma, Amit Kamra 
    Abstract: A severe health problem impacting many ladies worldwide is mammary calcinoma In order to reduce the risk factor connected with the disease,pre-clinical identification of breast cancer is essential,and mammography is one of the finest screening methods Mammogram quality and radiologists' ability to correctly interpret them are crucial for early cancer diagnosis In this study work,we propose a brand-new method for improving poor-quality mammography pictures Contrast Limited Adaptive Histogram Equalisation (CLAHE)and Morphological Operations(MOs)are two image processing methods we recommend using The suggested technique tries to increase the pictures' clarity and sharpness,which may help in the early identification and diagnosis of breast cancer The median filter,Low Pass Gaussian filtering,Morphological Operations(MOs),and Wavelet Decomposition are the next steps in the suggested technique after removing noise.The combination of these two approaches will increase the efficiency of mammographic image enhancement,according to our studies,which show a considerable improvement in picture quality compared to CLAHE and MOs.
    Keywords: CLAHE; Guided Image Filtering; mammograms,Morphological operations; Medical Image Processing.
    DOI: 10.1504/IJSSE.2025.10058950
     
  • A Fuzzy Inference System Confidence Dynamic Concept Simulated Annealing Strategy for Wireless Sensor Networks   Order a copy of this article
    by Selvamani K, Kanimozhi S, N.R.Rejin Paul, M.Arun Manicka Raja, Venkatasubramanian S, Anuradha Thakare 
    Abstract: Scientific study has focused on extending the lifespan of wireless sensor networks, a cost-effective technique to collect data from a specific area. Previous studies offered a low-energy heterogeneous wireless sensor network routing technique. Few writers proposed the algorithm for finding and calculating critical node linkages. Installing more mobile nodes improved WSN's topological connection earlier. Path design was also proposed to maximise longevity and decrease connected key node effects. Some geo-cast methods used hop-to-hop neighbour data. Dynamic resource routing for wireless sensor networks is advocated using an FIS and area segmentation. Thus, correct device data flow saves energy and prolongs channel life. This work introduces geographic routing. Fuzzy logic determines neural source coordinates, and weighted centroid identification is suggested. A wireless fuzz version measures flow to determine anchor-edge device distance. It decreases localised standard errors and node placement errors. Second, boost messages to the next bounce member nodes with the latest version. Smart next-hop selection reduces node energy usage and extends network lifetime. The suggested thing outperforms existing ways in power utilisation, completion time, and location errors, according to simulations.
    Keywords: Wireless Sensor Network; Internet of Things (IoT); Segmentation; Classification; Communication; Fuzzy Logic; Fuzzy Inference System (FIS),.
    DOI: 10.1504/IJSSE.2025.10059049
     
  • Ensemble Regression Model-Based Missing Not at Random Type Missing Data Imputation on the Internet of Medical Things   Order a copy of this article
    by Iris Punitha P, J.G.R. Sathiaseelan 
    Abstract: The Internet of Medical Things (IoMT) combines IoT and health sensing technologies, which allow for the early detection of various health issues. However, the data generated from IoMT devices may contain missing values or corrupted data, particularly when the missing data is of the missing not-at-random (MNAR) type. Existing solutions for imputing missing data in IoMT have limitations such as low accuracy and high computational cost. To overcome these limitations, this paper proposes an ensemble regression model (ERM) based on MNAR-type missing data progressive imputation (MDPI). The ERM-MDPI model combines three regression models, namely Multilayer Perceptron (MLP), Support Vector Regression (SVR), and Linear Regression (LR), to improve the accuracy of imputed missing data in the cStick dataset. The experimental results demonstrate that the ERM-MDPI model-based cStick imputed dataset generated higher accuracy (93.6301%), precision (91.0385%), recall (87.0898%) and F-measure (89.0204%) than cStick missing dataset. Therefore, the proposed solution offers an efficient and accurate approach to impute MNAR-type missing data in IoMT, providing valuable insights for medical decision-making.
    Keywords: The Internet of Medical Things (IoMT); Missing not-at-random (MNAR) data; Ensemble regression model (ERM); Progressive imputation; Medical decision-making.
    DOI: 10.1504/IJSSE.2024.10058313
     
  • Application of Deep Convolutional Neural Networks Systems in Autonomous Vehicles   Order a copy of this article
    by Souvik Ganguli, Charu Virmani, Vrince Vimal, Gunjan Chhabra, Garima Sinha, Bobur Sobirov 
    Abstract: The currently available sensor on those self-driving automobiles does a poor job of detecting the state of the road ahead of them. However, daytime and nighttime weather-related road conditions require safe driving. Deep learning study for daytime roadway identification uses data from a vehicle sensor. An overview of the use of deep convolutional neural networks in autonomous cars is given in this article. The paper starts by going through the difficulties of creating autonomous vehicles and how CNNs can be utilised to overcome these difficulties. The author thoroughly explains the basis of CNN and how it may be used for tasks like object detection, lane finding, and recognition of traffic signals. The research also examines how CNN focus techniques and transfer learning can be applied to autonomous vehicles. The authors conclude by highlighting the limits of current CNNs in this field and suggesting future research. This review article gives academic scholars and industry experts a current overview of CNNs in cars.
    Keywords: Application; Deep Convolutional Neural Networks Systems; Autonomous Vehicles; Convolutional Layers; Convolutional Neural Networks (CNNs).
    DOI: 10.1504/IJSSE.2025.10059050
     
  • A Collaborative Approach for Testing MapReduce Access Control Issues using Agent-based Architecture   Order a copy of this article
    by Sara Hsaini, Mohammed Amine Tajioue, Salma Azzouzi, Moulay El Hassan Charaf 
    Abstract: Security mechanisms such as access control are of the utmost importance. There have been a number of applications where it has been used to control the actions performed on resources by system users. In this study, a novel approach to testing access control list (ACL) policies based on the analysis of access control responses is presented. The main objective is to verify that the policies meet the XACML language specifications. As part of addressing the issue in a practical manner, we propose an Agent-based architecture for testing access control of a MapReduce application in a multi-node Hadoop cluster. The methodology is then tested and validated through an "inverted index" case study.
    Keywords: Access Control; Distributed Testing; MapReduce; Security; XACML; Multi-Agents System.
    DOI: 10.1504/IJSSE.2025.10059051
     
  • Detection of Node isolation attack using DNC mechanism in D2D Networks   Order a copy of this article
    by Balaji V, Selvaraj P 
    Abstract: Device to Device (D2D) network is a powerful technology that enables D2D communication without additional infrastructure support. There is no authentication procedure in the D2D routing protocol. As a result, it is a very desirable target for attackers and is exposed to several vulnerabilities, including node isolation attacks during sessions. To avoid this problem, a novel Denial of Node Contradiction (DNC) with OLSR is proposed. According to the simulation results, the proposed DNC-OLSR algorithm outperforms the alternatives in terms of the rate at which packets are forwarded, indicating that the proposed routing path is more stable than those of the Destination Sequenced Distance Vector (DSDV), Ad-hoc On-Demand Distance Vector (AODV) and Dynamic Source Routing (DSR) protocols. However, the DNC-OLSR algorithm is relatively low compared to the other three algorithmic measures of packet loss and the resulting delay. Moreover, the proposed algorithm can provide more reliability and stability for D2D communication.
    Keywords: IoT; D2D; Security Issues; OLSR; AODV; DSR; DSDV.
    DOI: 10.1504/IJSSE.2025.10059052
     
  • Deep Convolutional Neural Networks based Cervical Cancer Detection and Classification   Order a copy of this article
    by Suguna C, Balamurugan S.P 
    Abstract: Cervical cancer (CC) is a major reason of death in cancer in women. The problem of this cancer is limited once it can be analyzed and preserved at the initial phase. With the progress of artificial intelligence (AI) technology, computer aided diagnosis (CAD) is developed most leading investigation topics of medicinal imaging during recent decades. This study develops a Computer Aided Diagnosis Model for Cervical Cancer Classification using Deep Learning (CADC3-DL) model. The presented CADC3-DL model aims to recognize the occurrence of CC on biomedical images. Initially, the CADC3-DL technique creates a mask from the input dataset. Next, the pre-processing step takes place in two levels namely Gaussian filtering (GF) based noise removal and CLAHE based contrast enhancement. Then, the CADC3-DL technique employs customized U-Net segmentation technique where the filter size in the traditional U-Net is replaced by batch normalization (BN) to accomplish enhanced classification accuracy.
    Keywords: Biomedical imaging; Cervical cancer; Deep learning; Computer aided diagnosis; Batch normalization.
    DOI: 10.1504/IJSSE.2025.10059072
     
  • Study and analysis of Data Anonymization Techniques for Social Networks   Order a copy of this article
    by Sivasankari K, Umamaheswari K.M 
    Abstract: Many people all across the globe have been utilizing social media to exchange information. Numerous firms apply social data mining to extract numerous excit-ing insights from social data which is represented as a sophisticated network structure. However, publishing social data has a direct and indirect influence on the privacy of many of its users. Recently, numerous anonymization methods have been invented and deployed to preserve sensitive information about users and their interactions on social media. This paper presents a complete assessment of several data anonymization algorithms for social network data and evaluates their pros and downsides. It also tackles the primary research problems surround-ing the effectiveness of anonymization technologies.
    Keywords: Data Anonymization; social networks; graph modification; machine learning.
    DOI: 10.1504/IJSSE.2024.10058376
     
  • Monitoring and Actuating Devices for Analysis of The New Security Protocols of Internet of Things   Order a copy of this article
    by A. Anandhavalli, A. Bhuvaneswari 
    Abstract: The Internet is ubiquitous and significantly influences contemporary life. A network of countless individually distinguishable, connected, and physically reachable things makes up the Internet of Things (IoT). The Internet of Things can be sensed, communicated with, and controlled by any physical object that can function as a computational device. Internet of Things, cloud computing, and pervasive computing affect corporate and software industries. Software companies must modernise their business models to compete. Data increases as devices connect. This data transformation can happen between devices, devices and humans, and between devices and businesses. Data fabrication, server and network manipulation, and serious ramifications for application platforms and networks could all result from this. The dangers and shortcomings of these technologies have increased due to their increased use in daily life. This study covers IoT basics, challenges, and security. Standardization is unattainable since so many devices are connected heterogeneously across platforms and networking protocols. Academics can now study the IoT's architectures, designs, applications, new security risks, and challenges.
    Keywords: Internet of Things (IoT); Lightweight Local Automation Protocol (LLAP); MQTT (Message Queue Telemetry Transport); Quick UDP Internet Connections (QUIC); User datagram protocol (UDP); Zigbee; Bluetooth.
    DOI: 10.1504/IJSSE.2024.10058411
     
  • Adaptive cat optimization with Attention based bi-LSTM for automatic software bug detection   Order a copy of this article
    by Muthu Kumaran A.M.J, Umamaheswari K.M 
    Abstract: The detection of software bugs is a critical issue in the software maintenance and development process because it is connected to all software successes. Therefore, earlier software bug detection is essential for improving software's efficiency, dependability, quality, and cost. Furthermore, accurate software bug prediction is a critical and challenging task. This article thus develops the effective software bug prediction model. The pre-processing, feature selection, and bug detection phases of the proposed model are the most important ones. The input bug dataset is initially pre-processed. Remove instances of duplicate data from the dataset during pre-processing. The feature selection is carried out by the Adaptive Cat Swam Optimization Algorithm (ACS) following the pre-processing step. At last, the proposed approach uses a Bi-long transient memory (Bi-LSTM) for bug expectation. Bug prediction is done with the promise and the NASA dataset. Based on accuracy, the proposed model performs better than the simulation results.
    Keywords: bug prediction; Bi-long short-term memory (Bi-LSTM); Cat Swam Optimization; feature selection.
    DOI: 10.1504/IJSSE.2025.10059053
     
  • Firefly Cyclic Golden Jackal Optimization Algorithm with Wavelet Artificial Neural Network for Blackmailing Attack Detection in Mobile Ad-hoc Network   Order a copy of this article
    by Parameshwar G, N.V.Koteswara Rao, Nirmala Devi L 
    Abstract: Wireless networks called mobile ad hoc networks (MANETs) have an enlarged number of peer nodes. In recent studies, the major challenges are poor false positive rate, minimum detection rate and energy efficiency with higher delay to enhance the security of MANET. To overcome the problem, in this work, the fuzzy clustering model forms the clusters in MANET. The most appropriate cluster heads are selected in the presence of the Firefly Cyclic Golden Jackal Optimization (FCGJO) algorithm thereby solving the issues of energy and mobility of nodes. Wavelet Artificial Neural Network model to detect a blackmailing attack in MANET. The NS-2 simulation tool handles the implementation works and the statistical parameters such as attack detection rate, delay, energy consumption, throughput, memory consumption and etc to compute the performance of proposed approaches. While comparing to the state-of-art studies, the statistical parametric results reveal the proposed intrusion detection performance.
    Keywords: MANET; Firefly Cyclic Golden Jackal Optimization; Fuzzy clustering model; Blackmailing attack and Wavelet Artificial Neural Network.
    DOI: 10.1504/IJSSE.2025.10058971
     
  • A Novel Architecture for Diabetic and Glaucoma Detection using Multi-Layer Convolutional Neural Network System   Order a copy of this article
    by Neha Sewal, Charu Virmani 
    Abstract: The proposed effort aims to develop a more predictive model for identifying Diabetic Retinopathy (DR) and Glaucoma, two major retinal illnesses that cause blindness in working-age individuals globally. Colour retinal photographs are challenging and time-consuming to diagnose DR and Glaucoma. A multilayer CNN model identifies DR and Glaucoma. The CNN-based network has special upgrades and features to boost diagnosis accuracy. The model can better capture retinal picture subtleties by adding data, improving diagnostic performance. 3658 retinal pictures in five categories are used for the DR problem from the Kaggle dataset. With 1103 retinal pictures and two class labels, RIGA is used for Glaucoma. Using these datasets, the proposed technique easily identifies healthy and diseased retinal pictures, reducing physician evaluations. Using two publicly available datasets, the suggested model had a prediction accuracy of 98%. These measures demonstrate the model's capacity to classify retinal pictures and detect DR and Glaucoma. Finally, data-augmented multilayer CNN models improve DR and glaucoma diagnosis. Accuracy comes from detail and large datasets. Data augmentation and multilayer CNN models improved it. The model may detect and treat severe retinal problems earlier.
    Keywords: Diabetic Retinopathy; Kaggle; Deep Learning; Convolutional Neural Network; Glaucoma; RIGA Dataset; Multi-Layer CNN; Augmentation Techniques,.
    DOI: 10.1504/IJSSE.2025.10059054
     
  • An Optimal Insider-Threats Detection Model Based on Improved Deep Belief Network with Feature Reduction Scheme for E-Healthcare System   Order a copy of this article
    by M. Madhavi, T. Sasirooba, G.Kranthi Kumar 
    Abstract: An EHR (Electronic Health Records) dataset contains routine actions performed when accessing a patient's record,such asassessment form history,pharmacy orders, etc These actions differ depending on the medical practitioner and the access period Leakage of valuable information is a critical challenge As the Internet-of-Things(IoT)evolves,new security challenges arise in existing security architectures An organization's insider threat management is at risk because attack surfaces have expanded dramatically To solve the above challenges,In this work,an Optimized Deep belief network(DBN)is proposed to detect insider threats in EHR Significant features are generated using correlation coefficients, random forest mean reduced accuracy, and gain ratio to improve the performance of the internal threat detection model An appropriate mechanism (and function) is then used to combine the features to obtain an optimal set of features Adaptive rat optimization algorithm (AROA) optimizes DBN weight parameters to enhance performance F-measure, recall, accuracy,precision, and G-mean are calculated to measure Performance.
    Keywords: EHR; Insider threat detection; DBN; AROA and single optimized feature sets.
    DOI: 10.1504/IJSSE.2025.10059055
     
  • Risk integrated effort estimation of software projects: a comparative analysis of machine learning techniques   Order a copy of this article
    by Prerna Singal, Prabha Sharma, Charan Kumari 
    Abstract: Accurate software project effort estimation and risk management are the pillars of delivering an on-time, within budget and quality project. In our earlier research, a formula for computing risk integrated effort estimate by adding weighted cost of risk management for each project cost factor to the cost of initial effort estimate of the project has been proposed. In this research, neural network techniques: MLP, GRNN, CCNN and RBFNN; support vector regression, and adaptive neuro fuzzy inference system to obtain the integrated effort estimate as close as possible to the actual effort spent on the project have been applied. The techniques have been tested on two datasets: Agile and Waterfall datasets. GRNN gave the best results in terms of lowest values of accuracy measures: MAE, MMRE, MBRE, and MIBRE. This research also compares performance of GRNN with evolutionary algorithms ABC, PSO and GLBPSO, and the results for GRNN are comparable.
    Keywords: Agile projects; risk management; neural networks; CoCoMo II; support vector regression; risk exposure.
    DOI: 10.1504/IJSSE.2025.10059056
     
  • Vision Based Vehicle Tracking Network and Counting Using Deep Learning Model Systems   Order a copy of this article
    by Hemalakshmi K, A. Muthukumaravel 
    Abstract: Vehicle counting is a key component of the vehicle behaviourist approach and traffic incident detection for certain video surveillance systems. The accurate counting of vehicles in a variety of traffic conditions using deep learning algorithms and multi-object tracking systems is a popular area of research in the field of intelligent transportation. This research suggests a three-step vehicle identification, tracking, and counting process as a framework for video-based vehicle counting to estimate traffic flow. First, the Yolov3, Faster R-CNN, and SSD deep learning architectures are used to detect the vehicle, and the performances of each are compared. A modified DeepSORT algorithm tracks observed cars, and a picture shows their trajectory. In low-light and traffic conditions, a new vehicle counting system uses tracking data to count vehicles by type. Traffic figures are compared. The recommended method accurately recognises automobiles, tracks multiple objects, and detects with high precision and accuracy, according to experiments. This method meets real-time processing and vehicle counting needs. This study's method can count automobiles on difficult highways.
    Keywords: Vehicle detection; Vehicle Tracking Network; Vehicle counting; Deep learning; Traffic video; Yolov3; DeepSORT algorithm; Detection-Tracking-Counting.
    DOI: 10.1504/IJSSE.2025.10058951
     
  • Feed Forwarded Neural Network with Learning-Based Tuna Swarm Optimization (FFNN-LBTSO) For Semen Quality Prediction Systems   Order a copy of this article
    by C. Shanthini, S.Silvia Priscila 
    Abstract: Nowadays, some new diseases have come into existence due to lifestyle diseases. The major causes of the change in semen quality are environmental and lifestyle factors. One of the key tasks to assess the fertility potential of a male partner is semen analysis. Data-mining decision support systems can help identify this influence. Some seminal quality predictions were made. This research exploited unbalanced datasets with biased majority-class performance findings. Gradient descent local training is prone to local minima. Meta-heuristic algorithm optimization permits local and global solution finding. The paper develops a neural network model to predict semen quality. This paper improves Tuna Swarm Optimization using learning-based Feed-Forward Neural Networks (FFNN) (TSO). To balance normal and atypical cases, SMOTE data balancing was used. Overflow produces minority class instances until the balance is reached. FFNN-LBTSO was tested for predictive power. Steps include data source and pre-processing, SMOTE, FFNN classification, and LBTSO for classifier weights and bias optimisation. UCI sperm prediction. Sensitivity, specificity, G-mean, and accuracy measure experimentation. Fertility-optimal semen was detected. Comparing SVM and ANN classifier results.
    Keywords: Feed Forward Neural Network (FFNN); Tuna Swarm Optimization (TSO); Synthetic Minority Oversampling Technique (SMOTE); Learning-Based Tuna Swarm Optimization (LBTSO); Artificial Neural Network (ANN),.
    DOI: 10.1504/IJSSE.2025.10058952
     
  • Expansion of Situations Theory for Exploring Shared Awareness in Human-Intelligent Autonomous Systems   Order a copy of this article
    by Scott Humr, Anthony Canan, Mustafa Demir 
    Abstract: Intelligent Autonomous Systems (IAS) are part of a system of systems (SoS) that interact with other agents to accomplish tasks in complex environments. However, IAS-integrated SoS add additional layers of complexity based on their limited cognitive processes, specifically shared situation awareness that allows a team to respond to novel tasks. IAS's lack of shared situation awareness adversely influences team effectiveness in complex task environments, such as military command-and-control. A complementary approach of shared situation awareness, called situations theory, is beneficial for understanding the relationship between SoS's shared situation awareness and effectiveness. The current study elucidates a conceptual discussion on situations theory to investigate the development of an SoS’s shared situational awareness when humans team with IAS agents. To ground the discussion, the reviewed studies expanded situations theory within the context of SoS that result in three major conjectures that can be beneficial to the design and development of future SoSs.
    Keywords: Artificial Intelligence; Human-Machine Interaction; Intelligent Autonomous Systems; Shared Situational Awareness; Situations Theory.
    DOI: 10.1504/IJSSE.2025.10058953
     
  • An Intelligent Neural Question Answer Generation from Text Using Seq2se2 with Attention Mechanism System   Order a copy of this article
    by Sonam Soni, Praveen Kumar, Amal Saha 
    Abstract: Utilising data to its fullest extent is becoming increasingly important due to the rapid advancement of data over the past few years. Neural Question Answering is best for this much data. Question-Answer pairings have been laborious. Self-evaluation, education, and courses require questions and answers. Other AI businesses automate customer support inquiries. Designing such a system involves curating a database of consumer enquiries and live customer support representatives responses. For a new query, the system finds the best matched response in the curated dataset. Despite lacking common sense and reasoning skills, the Question Answering System is nonetheless widely used. We propose using reading comprehension strategies to automatically generate questions from sentences. The study used several methods to find the best Question Answer Pair algorithm. To boost accuracy, the model uses BERT, ELMo, and GloVe embedding methods. The model accurately reflects semantic and syntactic characteristics of the input text using these embedding strategies. Attention mechanisms help the model focus on key inputs and generate contextual predictions. Attention and embedding improve model accuracy.
    Keywords: Neural Question Answer; Word Embedding; Encoder-Decoder; AI firms; Sequence-to-Sequence; Question Answering System,.
    DOI: 10.1504/IJSSE.2025.10058954
     
  • SiamEEGNet: Few-Shot Learning for Electroencephalogram-based Biometric Recognition System   Order a copy of this article
    by Kriti Srivastava, Siddharth Sanghvi, Parag Vaid, Palash Rathod 
    Abstract: Authentication is verifying a user's identity when they enter a system. Due to their distinctiveness, biometric-based authentication solutions have started displacing conventional systems. This study suggests employing Electroencephalogram (EEG) or brain waves as a biometric modality since the level of uniqueness attained is higher. These noise-free ECG beats generate grayscale images using the proposed SiamEEGNet. A customised activation mechanism is also designed in this study to hasten the integration of the SiamEEGNet. The one that is suggested can extract characteristics using provided data. EEG signals are difficult to manually analyse and extract features from since they are highly dimensional and have a low signal-to-noise ratio. Because deep learning architectures have transformed end-to-end learning, this study suggests employing them. Convolutional Siamese Neural Networks are used by the suggested method, SiamEEGNet, to perform few-shot learning on a well-known and openly accessible dataset called EEG Motor Movement/Imagery Dataset (EEG- MMIDB), which consists of 106 subjects. The model is then quantitatively assessed using several criteria for person identification and authentication. SiamEEGNet competes favourably with current cutting-edge methods.
    Keywords: Biometric Recognition; Siamese Neural Networks; Convolutional Neural Networks; PhysioNet; Electroencephalogram; Spectrogram.
    DOI: 10.1504/IJSSE.2025.10058955
     
  • Prediction of Lockdown Via Opinion Mining from Tweets Using Machine Learning System   Order a copy of this article
    by Jayalakshmi V, M. Lakshmi 
    Abstract: Social networks are connected to the internet by architecture, facilitating instantaneous digital information sharing. Twitter users can share their thoughts and opinions. During the COVID-19 pandemic, polling and data helped choose the best health intervention. The COVID-19 pandemic showed that online forums and other electronic media spread disinformation more than the disease itself, threatening the world health system. Since December 2019, the new coronavirus has expanded significantly, infecting more Indians since March 2020.The Indian authorities locked down the country to limit citizen mobility and stop the infection. Social media outlets shaped user attitudes about the severe lockdown enforcement. We analyse user perception of lockdown enforcement by compiling lockdown 1.0, 2.0, and 3.0 tweets from many timelines. A Python tool trains and evaluates the deep learning framework using user feedback. Lockdown 3.0 and the government's policies are tested using new data after creation. Python analyses the forecast's performance in the three lockout scenarios. Simulation findings show that the proposed strategy outperforms existing classification algorithms.
    Keywords: Prediction; Lockdown; Opinion Mining; Tweets; Machine Learning; Indian Government; Python; COVID-19.
    DOI: 10.1504/IJSSE.2025.10059014
     
  • Application of Custom Ant Lion Optimization Convolutional Neural Networks for Liver Lesion Classification System   Order a copy of this article
    by A.Bathsheba Parimala, R.S. Shanmugasundaram 
    Abstract: In order to save a person's life, it's essential to categorize the lesions of liver in their early stages. The majority of scientists prefer classifying liver tumours using machine learning approaches. Recently, the use of computer-aided technology for this purpose has captured the interest of scientists. This paper classifies perceptual datasets using pre-trained network models and a lion-optimized CNN classifier. However, neural network learning can be improved, and deep learning-based neural networks and its applications are rarely studied. Additionally, the Custom Optimized Convolution Neural Network (CO-CNN) is suggested in this research as a very accurate method for classifying liver lesions. The de-noising steps in this suggested method include a median filter, the Random Forest (RF) method for extracting the liver, the Gray Level Run Length Matrix (GLRLM) method for extracting features, and the CO-CNN method for classification. This technique is tested on Python. Experimental results showed that the suggested approach exceeds existing approaches in accuracy, sensitivity, and specificity. It has 96% sensitivity and 97.77% accuracy.
    Keywords: Classification System; Liver lesion; RF; Custom Optimized Convolution Neural Network (CO-CNN); Sensitivity; Gray Level Run Length Matrix (GLRLM); Ant Lion Optimization (ALO); Lesion Classification.
    DOI: 10.1504/IJSSE.2025.10059811
     
  • An Efficient Data Sharing Scheme Using MultiTransaction Mode Consortium Blockchain for Smart Healthcare   Order a copy of this article
    by Deepak Kumar Sharma, Adarsh Kumar 
    Abstract: Electronic health records (EHRs) face security and transparency challenges, necessitating new standards. Blockchain technology holds promise for improving EHR security in smart healthcare systems. However, privacy and scalability issues persist, particularly in off-chain transaction management. We propose a method using a multi-transaction mode consortium blockchain (MTMCB) on Redis, enhancing EHR retrieval speed via an Adaptive Balanced Merkle (AB-M) tree. This approach combines binary tree efficiency with Merkle tree robustness. We employ a lattice-based ring signature scheme for secure patient EHR storage and retrieval. Our method significantly improves upload and download times compared to existing techniques, offering a potential solution to EHR access and security challenges.
    Keywords: Blockchain; Smart Healthcare; Electronic Health Records; Data retrieval; Optimized Redis cache.
    DOI: 10.1504/IJSSE.2025.10059329
     
  • Comprehensive study of Skin Cancer Detection and Classification from Skin Lesion Images   Order a copy of this article
    by Joseph George, Anne Kotteswara Roa 
    Abstract: Skin diseases are among the most prevalent and prevalent health issues that people face today. Skin disease (SC) is one among them and its discovery depends on the skin biopsy yields and the aptitude of the specialists yet the time utilization is more and the detection precision is poor. SC detection is difficult to perform at the beginning of the disease, which quickly spreads throughout the body and raises mortality rates. SC can be treated if it is discovered early. To order right and exact SC, the basic errand is SC identification and characterization that in light of the malignant growth illness elements like shape, size, variety, evenness and so forth. Numerous skin diseases share more similar characteristics, making it difficult to select important features from SC dataset images. Consequently, the SC diagnostic precision is improved by requiring a mechanized SC detection and order system in this manner the human master's shortage is taken care of. This surveys different DL strategies for SC identification and arrangement. The classification accuracy improves and computational complexity and time consumption are reduced when these DL methods are used.
    Keywords: Skin cancer; accuracy; deep learning; performance metrics; and data sets are the key words.
    DOI: 10.1504/IJSSE.2025.10059330
     
  • A Secure Blockchain based food supply chain management framework using hybrid IDEA algorithm   Order a copy of this article
    by Mohammed Musthafa Sheriff I, John Aravindhar D 
    Abstract: An agri based food supply chain oriented blockchain technology might provide lot of benefits like increased transparency, accountability and traceability. But there exist some challenges because of improper education, policies, frameworks and some technical aspects. Hence there occurs some need in developing a system which is more reliable that ensures the traceability, trustworthy and proper delivery mechanism in managing the Agri food supply chain. Therefore, a modified blockchain-based food supply chain is proposed based on Hybrid IDEA(International Data Encryption Algorithm) algorithm. It uses MDCNN (Multimodal Deep Convolutional Neural Networks) along with IDEA algorithm for ensuring the quality of the food Here in this work, the farmers, food processors and the various distributors will enter their data into the blockchain for generating the incontrovertible record needed for transaction. The transaction is encrypted using HIDEA algorithm which makes the authorization between the parties for accessing the data.
    Keywords: Multimodal Deep Convolutional Neural Networks; blockchain-based food supply chain; International Data Encryption Algorithm; transparency; accountability and traceability.
    DOI: 10.1504/IJSSE.2025.10059358
     
  • Covid-19: A Comprehensive Study of the Emergence, Impact, Diagnosis, Treatment, Challenges, and Future Perspectives   Order a copy of this article
    by Prabakaran G, Jayanthi K 
    Abstract: The COVID-19 pandemic caused by the SARS-CoV-2 virus has affected millions of people worldwide and has become a major global public health challenge. This review article provides a comprehensive overview of the current knowledge on COVID-19, including its epidemiology, pathophysiology, clinical manifestations, diagnosis, and treatment. The article focuses on the various diagnostic techniques used for COVID-19, including molecular, antigen, antibody, and imaging tests, and provides a comparison of their advantages and limitations. The review also discusses the various treatment options for COVID-19, including antiviral drugs, immunomodulators, and supportive care. Furthermore, the article examines the impact of COVID-19 on vulnerable populations, such as elderly individuals, immunocompromised patients, and individuals with underlying medical conditions. Finally, the review highlights the current challenges and future perspectives for COVID-19 research, including the development of effective vaccines and strategies for pandemic preparedness.
    Keywords: COVID-19; Epidemiology; Pathophysiology; Immunocompromised; Diagnosis; Treatment.
    DOI: 10.1504/IJSSE.2025.10060236
     
  • An Acceleration of Blockchain Mining by Parallel Process and Proof-of-Luck with Fair Share Technique System   Order a copy of this article
    by K. Lino Fathima Chinna Rani Vincent, M.P. Anuradha 
    Abstract: Blockchain plays a vital role in several applications; specifically, cryptocurrency transactions are performed through Blockchain applications. This technique stores network data securely via a distributed ledger. The transactions are part of Bitcoin mining. Miners in the network compute and verify these values. Blockchain networks using proof-of-work (PoW) consensus methods may have scalability issues as transaction volumes climb. The PoW mining mechanism cracks cryptographic riddles to authenticate more transactions and attach them to the Blockchain. When more miners join the network, transaction throughput and efficiency decrease, increasing authentication time and energy consumption. The proof-of-luck fair share parallel mining approach addresses PoW minings scalability issue. While retaining network security, this method enhances transactional validation quality and speed. Parallel mining uses several processors and processes to speed up Solo mining. The unique method boosts solo mining to TPS. Validators can mine various test case scenarios utilising the proposed methodologies in the testing environment. Experimental results show that the proposed technique can greatly increase Blockchain TPS. Experimental results show computer power's potential.
    Keywords: Parallel Mining; Scalability; Blockchain; Proof-of-Luck; TPS; Fair Share; Miners; and Transactions System.
    DOI: 10.1504/IJSSE.2025.10060238
     
  • Customized U-Net Model based Brain Tumor Segmentation in MRI Images and Ensemble based Tumor Classification Systems   Order a copy of this article
    by Devisivasankari P, Lavanya K 
    Abstract: Medical image processing requires autonomous brain tumour segmentation because early diagnosis can improve survival by treating brain cancers quickly. Brain tumours are manually classified by experts, which is time-consuming. Brain tumour (BT) diagnosis takes time and skill, hence radiologists must be skilled. As patient numbers have grown, so has data volume, making outdated methods expensive and inefficient. Many scholars have studied fast and accurate BT detection and classification algorithms. DL can locate BTs in medical photos using trained convolutional neural network (CNN) models. Brain tumour segmentation is easier with automatic segmentation, which is widespread. This work categorises and automates brain tumour segmentation using customised UNet model-based brain tumour segmentation (CUNet-BTS). Classification, preprocessing, segmentation, feature extraction, and fusion are modelled. Gaussian filtering enhances MRI pictures. Finally, an ensemble classification algorithm is suggested. For classification, this model combines the output scores of optimal DeepMaxout, DCNN, and RNN classifiers. The excellent training model Pelican Assisted Chimp Optimisation (PACO) Method can change classification model weights.
    Keywords: Magnetic Resonance Imaging; Convolutional Neural Network; Intersection-over-Union; Fully Convolutional Neural Networks; Recurrent Regression based Neural Network; Internet of Medical Things,.
    DOI: 10.1504/IJSSE.2025.10059671
     
  • Implementation of Octavia;s Openstack for Futuristic Cloud Computing by Optimization of Resources and Traffics
    by R.Nathiya Senthil Kumar, S.K. Piramu Preethika 
    Abstract: The Internet provides computing resources as a service on demand using cloud computing. In order to remedy this, locals have access to a range of open-source cloud operating systems, enabling them to use the cloud for useful reasons. Amazon Web Services (AWS), Microsoft Azure, Oracle Cloud, and OpenStack offer open-source cloud operating systems. Only OpenStack is free and has a substantial user base out of all of these. In private institutions or businesses, installation and use are free. Cloud load balancing is seen as a lifeline. In order to avoid website failures and other operational problems, it’s critical to balance traffic when websites face unexpected traffic spikes. This article discusses the concept and methods for automatic load balancing in OpenStack to help control bandwidth and stresses among virtual machines. The goal is to minimise traffic and maximise resources. The OpenStack networking feature LBaaS balances load as a service. An open-source LBaaS architecture for dynamic load-balancing clouds is presented here.
    Keywords: Cloud Computing; LBaaS; Load Balancer; Network Traffic; OpenStack Octavia; Octavia; bandwidth and stresses; Software-Defined Data Centers (SDDC); Software Defined Networking (SDN),.
    DOI: 10.1504/IJSSE.2025.10060239
     
  • Numerical Solution of Boundary Value Problems Using Quantum Computing System   Order a copy of this article
    by Ajanta Das, Debabrata Datta, Suman Rajest George, Varun Kumar Nomula, R. Dharani, K. Danesh 
    Abstract: Boundary value problems (BVPs) arise in various scientific and engineering disciplines, including physics, finance, and biology Classical computers may take too long to solve these issues numerically Quantum computing may solve this issue using quantum parallelism to calculate quicker than classical computers Recent quantum computer research shows that Quantum Fourier Transform (QFT) can efficiently solve Schr
    Keywords: Boundary value problems; Quantum computing; HHL algorithm; Quantum phase; estimation algorithm; Linear Solver; Quantum Fourier Transform.
    DOI: 10.1504/IJSSE.2025.10059826
     
  • Feature Interpreted Convolutional Neural Networks for Real Time Implementation of Respiratory Data   Order a copy of this article
    by Rampriya R, Suguna N, Sudhakar P 
    Abstract: Automatic detection of respiratory diseases is important to prevent any sudden death in patients. At present, respiratory diseases are detected by a physician who normally consumes more time to detect. In this work, the respiratory data from the persons are classified into either normal or abnormal using the proposed deep learning architecture. The proposed work consists of two subsequent phases namely training and testing. In training phase of the Respiratory Classification System (RCS), the respiratory data from both normal and both abnormal cases are individually data augmented in order to eliminate the overfitting issues in deep learning architecture. This data augmented respiratory data from both normal and abnormal case is used to construct Data Augmented Matrix (DAM) which is trained by the proposed Feature Interpreted Convolutional Neural Networks (FICNN) to produce the trained data. The proposed FICNN work obtained a 99.9% RDR with 0.05 ms as computational time.
    Keywords: FICNN; Over fitting; Data Augmentation; Deep Learning; Respiratory Classification System; RDR.
    DOI: 10.1504/IJSSE.2025.10060148
     
  • Pulmonary Carcinoma cells Classification using a Novel DCNN model Integrated with Cloud Computing Environment   Order a copy of this article
    by Sudha R, Umamaheswari K.M 
    Abstract: In this work, we presented a carcinoma cells classification of Non-Small Cell Lung Cancer (NSCLC) which is a more difficult challenge in CAD detection. So, a modified CADx is being investigated to alleviate radiologists' excessive work and the need for the following interpretations. We describe an approach for identifying and verifying different types of pulmonary carcinoma. In addition, a novel deep convolutional neural network (DCNN) and data were obtained via a cloud system for classifying lung nodule cell types in this study. As an integrated approach for CT images, the presented system includes a Cloud-based Lung Carcinoma cell Classifier. The suggested Cloud Based -on LCC first applied active snake model-based segmentation. A Novel DCNN for identifying distinct malignant cells of lung nodules is designed and verified using open sources Lung images. When compared to current strategies, our suggested technique reaches an accuracy of 96%, which is higher than other models.
    Keywords: Artificial Intelligence; Cloud Computing; CT Scans; Deep Neural Networks; Pulmonary Carcinoma.
    DOI: 10.1504/IJSSE.2025.10060240
     
  • Seeker Optimization Algorithm with Deep Learning based Feature Fusion Model for Tomato Plant Leaf Disease Detection   Order a copy of this article
    by Jayaprakash K, Balamurugan S.P 
    Abstract: The study focus on design and development of the Seeker Optimization Algorithm with Deep Learning based Feature Fusion Model for Tomato Plant Leaf Disease Detection (SOADLF-TPLDD) technique. The goal of the SOADLF-TPLDD technique is to apply DL technique for the segmentation and classification of plant disease. In the primary stage, the SOADLF-TPLDD technique uses U2Net model for background removal and UNetPP model for segmentation process. Besides, a feature fusion of two DL models takes place namely InceptionV3+EfficientNetB2. For disease detection and classification, Attention Convolutional Gated Recurrent Unit (ACGRU) model is applied. Furthermore, the SOA is used for optimal hyperparameter selection of the ACGRU model. Finally, the recommendation of pesticides for the detected plant diseases takes place using matrix factorization (MF) approach. The stimulation outcomes of the SOADLF-TPLDD method on benchmark dataset are validated and the outcomes represented the betterment of the SOADLF-TPLDD method over other existing techniques.
    Keywords: Tomato; Plant leaf diseases; Deep learning; Segmentation; Seeker Optimization Algorithm.
    DOI: 10.1504/IJSSE.2025.10060560
     
  • Database Systems under Rayleigh Fading Channels: MIMO-NOMA Based Performance Evaluation Modeling   Order a copy of this article
    by Bharathi C, Manjunatha Reddy H. S 
    Abstract: In recent years, Non-Orthogonal Multiple Access (NOMA) has emerged as a transformative technique, revolutionizing spectral efficiency and enabling massive connectivity in next-gen wireless communication. This groundbreaking research delves into MIMO NOMA systems’ power allocation strategies, prioritizing system throughput and user fairness. Our innovative approach leverages QPSK modulation in a comprehensive system model, meticulously simulating performance across various variables, including user distance and power differentials. Across varying bandwidths, our model showcases remarkable improvements in user experience, with a jaw-dropping 12 dB/Hz increase in spectral efficiency at a mere 1 dB SNR boost, coupled with a staggering 15x10-3 and 12x10-3 reduction in outage probabilities at 0.17 dB. Even in the challenging Rayleigh fading channel, the Bit Error Rate (BER) sees substantial reductions, reaffirming the prowess of our proposed methodology.
    Keywords: Bit Error Rate (BER); Rayleigh; Spectrum Efficiency; Outage probability; Multiple Input Multiple Output (MIMO); Database Systems; Non-Orthogonal Multiple Access (NOMA); Simultaneous Multi-User.
    DOI: 10.1504/IJSSE.2025.10060561
     
  • Improved Gray Wolf Optimisation Based Energy Efficient Spectral Sensing in Cognitive Radio Network   Order a copy of this article
    by Praveen Hipparge, Shivkumar Jawaligi 
    Abstract: In a 5G heterogeneous network, the Cognitive Radio Network (CRN) must choose amongst energy efficiency and spectrum sensing efficiency. The major goal of existing techniques is to apply convex optimization to solve the energy efficiency optimization problem in spectrum sensing. Real-time spectrum sensing, nevertheless, is a non-convex optimization issue. we propose a novel Improved Gray wolf optimization (IGWO) based approach to detect the enhanced energy usage spectrum holes to overcome the non-convex issues. The cuckoo search (CS) algorithm is used to balance the exploitation and exploration phases of GWO. The energy efficient spectrum can be detected with the factors such as power spectral density, transmission power, and sensing bandwidth. Experiments are demonstrated with the MATLAB simulator and compared the outcomes with the state-of-art works. Our proposed approach surpasses all the other works while considering the selection of energy efficient spectrum holes for the communication.
    Keywords: Spectrum; 5G network; cognitive radio network; optimization; and energy efficient.
    DOI: 10.1504/IJSSE.2025.10060744
     
  • HSaaS: Healthcare Security Systems as a Service for Cloud-Based Electronic Health Records with Blockchain Integration   Order a copy of this article
    by Aruna Kumari B, Sreelatha M 
    Abstract: The use of cloud-based electronic health records (EHRs) has led to improvements in healthcare delivery, but concerns about data privacy and security remain Healthcare Security as a Service (HSaaS) is a promising solution to address these concerns and integrating HSaaS with blockchain technology can further enhance the security and privacy of cloud based EHRs Smart healthcare provides an opportunity to improve the security and accessibility of cloud based EHRs, and this research aims to explore the potential of HSaaS with blockchain integration for smart healthcare The research will investigate the current state of security challenges in cloud-based EHRs, evaluate the potential of HSaaS for addressing these challenges, and develop a proof-of-concept prototype that integrates HSaaS with blockchain technology into a cloud-based EHR system The performance and security of the proposed solution will be evaluated, and the benefits and limitations of using HSaaS with blockchain integration for securing cloud based EHRs will be analysed. This research aims to provide a more secure and trustworthy environment for cloudbased EHRs, contributing to improving healthcare delivery.
    Keywords: Cloud-based Electronic Health Records (EHRs); Healthcare Security as a Service (HSaaS); Blockchain; Data Security.
    DOI: 10.1504/IJSSE.2025.10060880
     
  • Modified oversampling based Borderline Smote with Noise Reduction Techniques for IoT Smart Farming dataset   Order a copy of this article
    by Suresh M, Manju Priya 
    Abstract: Global population is anticipated to grow exponentially to ten billion in the future years. To feed the globe, agriculture must be prioritised. Agriculture is vital to human survival. Every field plant breeding, agricultural monitoring, automated maintenance systems, sensor use, and agrochemicals has evolved physiologically and technologically. Technology and analytics merge in IoT-based farm data. Machine learning algorithms analyse massive agricultural data. Predictive analytics learning algorithms built with machine learning are fast and effective. The data pipeline's pre-processing stage uses the SMOTE with Noise Reduction, an advanced oversampling technique. To evaluate its efficacy and robustness, this novel pre-processing method is heavily compared to SMOTE, ADASYN, and NRAS. This comparison analysis assesses our updated technique's precision, recall, and accuracy in class imbalance scenarios, a common machine learning difficulty. To increase synthetic sample quality and model prediction, address dataset noise and borderline occurrences. This article states that pre-processing procedures shape machine learning models,
    Keywords: Machine Learning; IoT Smart Farming; Noise Reduction; Modified Borderline Synthetic Minority Over-sampling Technique (SMOTE); Data pre-processing.
    DOI: 10.1504/IJSSE.2026.10061579
     
  • Oppositional remora based AUV path planning with optimal energy efficient data collection in underwater wireless sensor network   Order a copy of this article
    by Arul Rex, Jemila Rose R, Alphiya R 
    Abstract: In the proposed model, the data packets are sent from the autonomous underwater vehicles (AUVs) to the base station. When creating underwater wireless sensor networks, it is essential to consider the energy consumption of AUVs. Still, it can be difficult to choose an AUV's optimal path. To solve this issue, the suggested method utilizes the optimal path selection. This is addressed by the oppositional remora optimization algorithm (OROA). The performance of the proposed method is assessed in terms of residual energy, network lifetime, delivery ratio, energy consumption, and delay. The suggested solution provides average performance parameters of 95% packet delivery ratio, 12032J residual energy, 1.54s delay, and 3908s network life. The suggested model is exceptionally energy-efficient because it achieved the highest delivery ratio while consuming the least amount of energy. The proposed approach is implemented on the NS2 platform.
    Keywords: Underwater wireless sensor networks; Manhattan based k means; salp swarm; remora optimization and autonomous underwater vehicles.
    DOI: 10.1504/IJSSE.2026.10061692
     
  • Develop a Convolutional Neural Network Architecture to Accurately Detect and Track Moving Objects in Video Sequence Systems   Order a copy of this article
    by P. Nagaraju, Manchala Sadanandam 
    Abstract: Object motion detection constitutes the initial crucial step in collecting data about moving objects. The research offered a precise video sequence system motion detection method using a novel object tracking and recognition method through faster region convolutional neural network (R-CNN) that enhances object detection accuracy. To associate things, looks and improved motion are used. The RoI pooling layer uses max pooling to create a compact feature map with a given spatial extent from all admissible region of interest features. The assessment findings demonstrate that the performance of existing work has improved by minimising identification transitions and segmentation. Visual examination, accuracy testing, and comparison with other methods were used to examine the suggested techniques detection outcomes. The proposed Project is implemented using Python software. The FRCNN architecture outperforms other conventional techniques, such as the R-CNN, convolutional neural network (CNN), and deep neural network (DNN), with an accuracy rate of 97.31%, demonstrating a greater effectiveness.
    Keywords: Convolutional Neural Network; faster R-CNN; Network Architecture; Object Motion Detection; Track Moving Objects; Video Sequence Systems.
    DOI: 10.1504/IJSSE.2026.10061732
     
  • Radio Fingerprint-based UAV Detection and Identification using Discrete Wavelet Feature Extraction and Deep Learning approaches   Order a copy of this article
    by Khush Attarde, Sameer Sayyad, Satish Kumar, Arunkumar Bongale 
    Abstract: The increasing use of drones in various industries presents security detection challenges due to their high altitude and remotely controlled capabilities. Researchers have developed methods for identifying UAVs, including camera, audio, radar, and thermal-based techniques. Radio fingerprinting is the effective method for detecting drones at high altitudes. This research used Discrete Wavelet Transform (DWT), Machine Learning (ML) and Deep Learning (DL) models for UAV identification and detection. The Random Forest feature selection method improved classification models’ accuracy and reduced computational time. The LSTM model demonstrated promising results, achieving classification accuracy of 95.27%, 87.54%, 82.21%, and 96.7% for identifying UAVs, controller signals, UAV model specifications, and mode of operation. It also demonstrated accuracy of 86.42% and 88.79% in non-line of sight. This research offers valuable insights into practical methods for identifying and detecting UAVs, with significant commercial implications.
    Keywords: Deep Learning; Discrete Wavelet Transform; Radio Fingerprinting signals; Time Domain Features; UAV detection and characteristics identification.
    DOI: 10.1504/IJSSE.2026.10061822
     
  • An Optimized Deep Auto Encoder with Enhanced Extreme Learning Machine Model for Heart Disease Prediction and Classification   Order a copy of this article
    by Duraisamy M, Balamurugan S.P 
    Abstract: This research proposes a comprehensive and innovative approach that includes an optimised deep auto encoder with an enhanced extreme learning machine (ODAE-EELM) model. The model combines a novel deep encoder with red deer optimisation (RDO) for feature selection, and an extreme learning machine (ELM) with Stochastic gradient descent (SGD) optimisation for classification. The presented ODAE-EELM model employs pre-processing to convert the actual data into a usable format. Next, the integration of RDO in the encoder optimises the feature selection process by mimicking the foraging behaviour of red deer to enhance exploration and exploitation, thereby yielding more robust and discriminative features. The extreme learning machine is employed for the classification stage due to its simplicity, efficiency, and ability to handle high-dimensional data effectively. The ELM model is optimised using Stochastic Gradient Descent, which ensures faster convergence and efficient utilisation of computational resources. Experimental results shows, our proposed method attained the maximum accuracy of 99%.
    Keywords: Red Deer Optimization; Deep Auto Encoder; Feature Selection; Extreme Learning Machine; Stochastic Gradient Descent; Heart Disease Classification.
    DOI: 10.1504/IJSSE.2026.10062277
     
  • A NewMethod for Minimizing PAPR in LFDMA Systems   Order a copy of this article
    by Lekshmi R. Nair, Sakuntala S. Pillai, Shiny G 
    Abstract: Single carrier frequency division multiple access (SC-FDMA) is a standardised technology for high data rate uplink communications in prospective cellular networks that can meet the increasing needs of users. When compared to orthogonal frequency division multiple access (OFDMA), SC-FDMA strategically blends the low peak to average power ratio (PAPR) of single-carrier systems, which demonstrates higher performance for a high data rate, with bit error rate (BER). This proposed model examines the impact of subcarrier mapping on PAPR using the selected mapping approach for localised single carrier frequency division multiple access (LFDMA), a sort of SC-FDMA uplink system. The primary objective of this paper is to attain reduced PAPR and better BER performance by using an efficient modified Chaotic Whale Optimisation Algorithm (MCWOA). The suggested method improves PAPR by 5 dB using QPSK and by 4.3 dB utilising 16-QAM and 64QAM modulation techniques, respectively.
    Keywords: BER; CWOA; LFDMA; PAPR; SC-FDMA; SLM.
    DOI: 10.1504/IJSSE.2026.10062776
     
  • Blockchain and Cloud-Powered Architecture for Enhancing Efficiency and Security and in Smart Home Environments   Order a copy of this article
    by Priya Iyer K.B, Ramesh Swaminathan, Sinduja B, Dixy F.L 
    Abstract: However, the widespread adoption of IoT devices has raised significant concerns regarding data privacy and security. This paper presents a novel approach to enhance the security of IoT-based home automation systems through the implementation of blockchain technology. The primary objective of this research is to enhance the smart home network's efficiency, scalability, and security. In this paper, we introduce a novel architectural framework for a sustainable smart home service that incorporates both blockchain and cloud computing technologies. Since the blockchain does not depend on a centralized authority, it efficiently transacts data among the IoT devices. The four main segments of the proposed architecture are the home segment, cloud computing segment, blockchain segment, and services segment and the renderers. These results underscore the efficacy of blockchain technology as a robust platform for constructing a smart home environment.
    Keywords: IoT; blockchain; smart home; cloud; efficiency; scalability; security.
    DOI: 10.1504/IJSSE.2026.10062777
     
  • Combined Enhanced Caesar Cipher Algorithm and steganography for Biometricsecurity   Order a copy of this article
    by Gurumurthy S. B, Ajit Danti 
    Abstract: When biometrics data is transferred in the network, it is exposed to others, and if a hacker obtains the data on the network, the biometrics system's security is compromised. As a result, it is critical to maintain the data security for biometrics while it is transmitted via an untrustworthy channel. Therefore, we present a steganography technique for biometric data security in this study. First, the fingerprint image (secret image) is converted to generate the encrypted image. To encrypt fingerprint images, an enhanced Caesar Cipher Algorithm (EC2A) has been created. The dual-tree complex wavelet(DTCWT)algorithm is then used to transform the cover image. The high-frequency wavelet transform is selected for data embedding. During the embedding process, the cover image has the encrypted biometric data embedded into it. Following the embedding process,a stego-image is obtained. The PSNR, SSIM, NC, MAE, BER, and NAE are used to evaluate the performance of the technique.
    Keywords: Embedding; biometric; EC2A; DTCWT; steganography; fingerprint image.
    DOI: 10.1504/IJSSE.2026.10062810
     
  • Unifying Advanced Meta-Systems for AI-Driven Bipedal Robot Locomotion   Order a copy of this article
    by Sivakani R, Mahasree M, Sunilkumar Kn, Puneet Mittal, S.Chitra Selvi, Sukhwinder Singh Sran 
    Abstract: In the age of digitization, the integration of complex meta-systems has become increasingly crucial. This paper explores the convergence of artificial intelligence (AI) and robotics, two fields that exemplify such integration by combining elements from computer science, mechanical engineering, and electronics engineering. Here, we focus on the development and evaluation of a self-adaptive, two-legged mobile robot. This robot not only mimics human activities but also learns and makes decisions based on its environment, thus serving as a humanoid meta-system. The study employs advanced machine learning algorithms namely, Na
    Keywords: Mobile robot; Locomotion; Humanoid; Naïve bayes; Support vector machine; Modelling adaptive control; Bipedal robots; A single inflexible body; Artificial intelligence.
    DOI: 10.1504/IJSSE.2026.10062816
     
  • XLM-R-BiLSTM-CNN: Ensemble Deep Learning Algorithm for Code-Mixed Sentiment Systems Analysis   Order a copy of this article
    by C. Kumaresan, P. Thangaraju 
    Abstract: This research addresses the challenge of analysing sentiment in text that combines different languages, known as code-mixed sentiment analysis. The study presents a specialised deep-learning algorithm designed for code-mixed sentiment analysis in English and Tamil. The approach combines language identification and sentiment analysis models to improve accuracy in classifying sentiments in code-mixed text. The process involves pre-processing and tokenising the code-mixed data and using pre-trained word embeddings specific to each language. The XLM-R-BiLSTM-CNN architecture is used to create separate sentiment analysis models for English and Tamil. The ensemble method utilises language identification to select the appropriate sentiment analysis model for each token. The sentiment predictions from both models are combined, considering language-specific weights, to produce the final sentiment prediction. Experimental assessments on a code-mixed dataset demonstrate that our ensemble approach outperforms baseline models in terms of accuracy, precision, recall, and F1 score. This proposed technique significantly enhances the accuracy of of sentiment analysis in multilingual code-mixed data, making it a valuable tool for understanding sentiments in various language contexts.
    Keywords: Code-mixed sentiment analysis; ensemble deep learning; language identification; BiLSTM; CNN; XLM-R; Mixed Sentiment Systems Analysis.
    DOI: 10.1504/IJSSE.2026.10062830
     
  • A Systematic Literature Review of Secure and Advanced Software Defect Prediction   Order a copy of this article
    by Ayushmaan Pandey, Jagdeep Kaur 
    Abstract: Software defect prediction is a critical component of software development. It enables developers to find and address potential issues before they turn into significant ones. In this paper different problems have been discussed that arise when attempting to predict software defects, including the requirement for reliable and effective data balancing and feature selection techniques to deal with the complex datasets frequently used in this field. We examine how data security, class imbalance, and feature selection issues are related to the performance of software defect prediction models. We have emphasized the significance of taking security concerns into account when predicting software defects and talking about potential solutions to these problems. This survey paper offers insights into these primary issues of data security and reliability of software defect prediction models and their potential solutions in addition to a thorough analysis of the current advancements made in software defect prediction today. After a detailed study of SDP techniques developed in the past few years, we have provided some future challenges and recommendations that may further enhance the performance of the current models.
    Keywords: class imbalance; homomorphic encryption; differential privacy; feature selection; software defect prediction; federated learning.
    DOI: 10.1504/IJSSE.2026.10062929
     
  • Weapon Detection Technologies for Surveillance under Different YoloV8 Models on Primary Data: Smart City Based Approach for Safe Society   Order a copy of this article
    by Rohit Rastogi, Yati Varshney, Jagrati Sharma 
    Abstract: This comparison between the yolov8s.pt and yolov8x.pt YOLOv8 models is very important for real-time applications, particularly for object recognition and surveillance. Based on the results, the 95% precision and recall of the yolov8s.pt model, together with its 96% mean average precision, demonstrate the models usefulness in situations requiring precise and quick object recognition. This model has potential applications in a variety of security systems, supporting security protocols in high-risk areas such as airports, public areas, and high-security enterprises by assisting in the quick identification of possible threats in real-time surveillance data. Conversely, the yolov8x.pt models better performance which includes an astounding 98% precision and 99% mean average precision highlights its effectiveness in demanding real-time applications that need exacting accuracy. Because of its complex capabilities, the model is a great fit for use in cutting-edge applications that require quick and accurate object recognition, such as autonomous driving technologies and sophisticated surveillance systems.
    Keywords: Convolutional Neural Network (CNN); down-sampling; Optimization; Weapons; detection; Surveillance; Object Detection; Thermal Imaging; Wave Scanning; Security Infrastructure.
    DOI: 10.1504/IJSSE.2026.10063444
     
  • Energy competent clustering algorithm for minimisation of holes in heterogeneous wireless sensor networks   Order a copy of this article
    by Chinmaya Kumar Nayak, Satyabrata Das 
    Abstract: A sensor network, commonly referred to as a wireless sensor network (WSN) is made up of a large number of small-scale autonomous wireless sensor nodes. These sensor nodes are used to gather the desired information, starting in a target area. The power necessary for information communication is very high in comparison to computation due to long range radio transmission, resulting in the depletion of a high amount of energy from the batteries of sensor nodes. It mainly creates node destruction and hole formation. So it is necessary to design energy competent methods for such networks to enhance the lifespan of the WSN. As a solution in this paper, a protocol for a heterogeneous network called stable election protocol (SEP) implemented jointly through low-energy adaptive clustering hierarchy (LEACH) for load complementary with an increased amount of communication packets to the base station of the sensor network. This can be done by sharing the energy load uniformly with each and every sensor node in a heterogeneous network by selecting cluster heads.
    Keywords: SEP; stable election protocol; WSN; wireless sensor network; lifespan of network; power efficiency; cluster-head.
    DOI: 10.1504/IJSSE.2024.10055955
     
  • Factors affecting consciously improving vocabulary with a spaced repetition system   Order a copy of this article
    by G. Alamelu, M. Ilankumaran 
    Abstract: Language acquisition begins in childhood and continues until death. Many believe learning a second language is essential for career success. Because students rarely experience the target language in its natural situation, learning vocabulary, sentence structures, and pronunciation is difficult. These issues influence students and teachers. Thus, acquiring a second language and developing vocabulary are conscious choices that require continual education, evaluation, and feedback. Spaced cycles can be integrated into conventional teaching methods and improve learning by requiring more resources. The spaced repetition system (SRS) is an old method, but it works well for languages where vocabulary development is the major goal. Ebbinghaus (2013) is the only source of reliable data on the strategy, which dates back to the Vedic era in India. Leitner's flashcards help students learn a language by allowing regular study and improvement. Modern, high-tech vocabulary development tools are available. This study examines how engineering students might actively absorb terminology through spaced repetition.
    Keywords: SRS; spaced repetition system; intentional learning; learning vocabulary; heterogeneous; classrooms; enhancing language; reinforcement.
    DOI: 10.1504/IJSSE.2024.10055993
     
  • Multilayer perceptron sustainable boosting algorithm for thyroid classification systems   Order a copy of this article
    by V. Brindha, A. Muthukumaravel 
    Abstract: Medical professionals can use sophisticated technologies like computer-aided diagnosis systems to help them make the best decisions possible by using data mining to analyse clinical data. When the thyroid gland cannot produce adequate thyroid hormones, a potentially fatal condition known as thyroid disease develops. This research aims to predict thyroid disease from the given dataset. This study suggests using the multilayer perceptron (MLP) technique to identify thyroid disease using straightforward criteria. In order to get the most out of the algorithms, this study evaluated the suggested strategy with the XGBoost classification technique using the UCI thyroid disease dataset. The obtained findings demonstrate the MLP model's capacity to accurately and precisely predict the proper type of thyroid problem diagnosis. According to the results, the MLP algorithm surpasses the XGBoost method with accuracy and precision values of 93% and 89%, respectively. The tool used for analysing the work is Jupyter Notebook, and the language used is Python.
    Keywords: thyroid disorder; XGBoost; MLP; multilayer perceptron; endocrine; hypothyroidism; hormone; diagnose; antithyroid; radial basis function; back-propagation; bagging; ensemble.
    DOI: 10.1504/IJSSE.2024.10055910
     
  • Adaptive artefact canceller filter based on penguins search optimisation algorithm for ECG signals   Order a copy of this article
    by Ishani Mishra, Sanjay Jain, Vivek Maik 
    Abstract: The electrocardiogram (ECG) signal is a collection of biopotentials related to the contractions of heart muscles that is used to diagnose cardiac abnormalities. The ECG signal is usually distorted by unwanted interference called noise or artefact. The removal of such noise is crucial to better analysis of ECG signals and to better evaluation of the human cardiac system. So, in this paper, an enhanced adaptive artefact canceller (AAC) is presented for filtering the ECG signals. The PeSOA algorithm is used to optimise the weight parameters of AAC. The performance of the proposed PeSOA is evaluated in terms of mean square error (MSE), signal-to-noise ratio (SNR), normalised mean square error (NRMSE), correlation, and coherence factor. Besides, the performance of the proposed scheme is compared with that of different existing filtering techniques, such as bacterial foraging optimisation-based AAC (BFOAAC) and AAC. This proposed noise canceller method supports the human cardiac system for analysing the ECG signals preciously.
    Keywords: AAC; adaptive artefact canceller; ECG signal; optimisation algorithm; optimal weight value.
    DOI: 10.1504/IJSSE.2024.10055911
     
  • Green TiO2 nanoparticles to boost the performance of current solar panels   Order a copy of this article
    by Snehal A. Marathe, B.P. Patil, Shobha Ajeet Waghmode, Trupti Sakharam Zaware 
    Abstract: There are several ways to increase the production of solar panels, such as by employing solar trackers for the panels and automatic cleaning systems. Last but not least, using an antireflective coating has become more important for improving solar panel efficiency because the majority of sunlight that hits them is reflected back into the atmosphere. To improve the material efficiency, titanium dioxide (TiO2) nanocomposite material with a green production process is applied. The most prevalent substance on Earth is TiO2, which has unique characteristics as well as increased a high refractive index (n = 2.4). TiO2 nanoparticles are manufactured by a 90% natural process called 'green synthesis' using natural resources like roots, flowers, petals, fruit peels, or leaves. Here, the coating is made using flower petals, a natural material. In comparison to an untreated panel, the power output was improved by an average of 1 watt by spraying this coating on it.
    Keywords: solar energy; solar panel; titanium dioxide; nanomaterials; nanoparticles; efficiency; characteristics.
    DOI: 10.1504/IJSSE.2024.10058116
     
  • An EFSM-based model for testing security issues in the Hadoop ecosystem   Order a copy of this article
    by Oussama Maakoul, Lalla Amina Charaf, Widad Zerzzari, Abdessalam Ait Madi, Salma Azzouzi, My El Hassan Charaf 
    Abstract: Today, the Hadoop infrastructure can be affected by several forms of attacks on public or hybrid clouds. In this work, we propose a comprehensive security scheme based on Kerberos and Adaptive eXtensible Access Control Markup Language (XACML) by considering some timing constraints. In a related context, the appropriate approach to checking the vulnerability of a Hadoop implementation is to perform tests according to predefined specifications. Therefore, the second contribution is to model the security system specifications using an extended finite state machine (EFSM) and to propose an architecture to handle the Hadoop testing process. Furthermore, we provide an algorithm to generate secure local test sequences (SeLTS) that describe the test execution at each port of the system. Finally, experimental results come along to validate our scheme in the healthcare system. As a result, we notice a remarkable time decrease in access request processing with a performance improvement using the new time-constrained approach.
    Keywords: EFSM; extended finite state machine; Hadoop; MapReduce; HDFS; Hadoop File System; XACML; eXtensible Access Control Markup Language; distributed test; ACL; access control list.
    DOI: 10.1504/IJSSE.2024.10058212