https://sesjournal.com/index.php/1/issue/feedSpectrum of Engineering Sciences2025-04-02T09:58:06+03:00Dr. Muhammad Aliinfo.chiefeditor@yahoo.comOpen Journal Systems<p>Spectrum of Engineering Sciences (SEC), is a refereed research platform with a strong international focus. It is open-access, online, editorial-reviewed (blind), peer-reviewed (double-blind), and Quarterly Research journal (with continuous publications strategy).The main focus of the Spectrum of engineering sciences is to publish original research and review articles centred around the Computer science and Engineering Science and Lunched by the SOCIOLOGY EDUCATIONAL NEXUS RESEARCH INSTITUTE (SME-PV).This international focus is designed to attract authors and readers from diverse backgrounds. At the Ses, we believe that including multiple academic disciplines helps pool the knowledge from two or more fields of study to handle better-suited problems by finding solutions established on new understandings.</p>https://sesjournal.com/index.php/1/article/view/203DESIGNING AN INTELLIGENT SMART VTOL DRONE USING FLYSKY TRANSMITTER AND PIXHAWK CONTROLLER FOR HIGH-RISK RESCUE AND MILITARY OPERATIONS2025-03-15T09:01:01+02:00Engr. Shazia Ferozalkish@yahoo.comSyed Kumail Abbas Zaidialkish@yahoo.comBasit Ahmadalkish@yahoo.comMudassar Rafiquealkish@yahoo.comSaifullah Zadranalkish@yahoo.comMuhammad Hassanalkish@yahoo.com<p><em>The development of intelligent unmanned aerial vehicles (UAVs) has </em><em>revolutionized the field of high-risk rescue and military missions, offering enhanced </em><em>capabilities in remote and hazardous environments. This paper presents the design </em><em>and implementation of a smart Vertical Take-Off and Landing (VTOL) drone, </em><em>utilizing a FlySky Transmitter and a Pixhawk Controller for autonomous flight </em><em>operations. The proposed drone integrates advanced navigation and control </em><em>algorithms, enabling seamless performance in dynamic and complex terrains. The </em><em>FlySky Transmitter ensures robust communication between the drone and the </em><em>operator, while the Pixhawk Controller manages the flight stabilization, sensor </em><em>integration, and autonomous mission execution. The system is designed to support </em><em>both manual and autonomous flight modes, with intelligent features such as </em><em>obstacle detection, real-time video streaming, and automatic emergency procedures. </em><em>Through extensive flight testing, the drone's performance is evaluated in various </em><em>high-risk scenarios, demonstrating its potential to enhance mission effectiveness </em><em>and safety in critical applications such as search and rescue operations and </em><em>military surveillance. The findings highlight the system's reliability, adaptability, </em><em>and potential for future integration with advanced AI technologies, positioning it </em><em>as a valuable tool for high-risk environments. The paper concludes with a </em><em>discussion on the future prospects of smart VTOL drones, addressing both </em><em>technical challenges and ethical considerations in their deployment.</em></p>2025-03-15T00:00:00+02:00Copyright (c) 2025 https://sesjournal.com/index.php/1/article/view/204A STUDY ON THE DETECTION AND PREVENTION OF CYBER ATTACKS USING MACHINE LEARNING ALGORITHMS2025-03-15T09:13:16+02:00Muniba Murtazaalkish@yahoo.comDr. Anwar Ali Sanjranialkish@yahoo.comAdnan Bukhari Syedalkish@yahoo.comArsalan Khanalkish@yahoo.com<p><em>This study explores the use of machine learning algorithms to detect and </em><em>prevent cyberattacks. The research focuses on several widely used models, </em><em>including Decision Trees, Support Vector Machines (SVM), Random </em><em>Forests, and Neural Networks, evaluating their performance on datasets </em><em>related to network traffic, intrusion detection, and malware classification. </em><em>Preprocessing techniques such as data cleaning, feature selection, and </em><em>balancing were applied to optimize the datasets for model training. The </em><em>results show that Neural Networks outperformed the other algorithms in </em><em>terms of accuracy, precision, recall, and F1-score, followed by Random </em><em>Forests. This study highlights the importance of machine learning in </em><em>cybersecurity, demonstrating its potential to detect complex attack patterns </em><em>and improve real-time threat detection systems</em><em>.</em></p>2025-03-15T00:00:00+02:00Copyright (c) 2025 https://sesjournal.com/index.php/1/article/view/205COMPARATIVE PERFORMANCE ANALYSIS OF TEXTURED AND UN- TEXTURED TURNING INSERTS IN DRY MACHINE OF AL70752025-03-15T09:21:26+02:00Muhammad Toffiquealkish@yahoo.com<p><em>Surface texturing is an effective process for improving the tribological characteristics </em><em>Surface roughness may be beneficial in a number of ways, including decreased friction </em><em>and tool wear due to the reduced contact area and formation of micro pools of lubricant </em><em>in textures. </em></p> <p><em>In machining operations the tool shape material and cutting parameters must all be </em><em>carefully chosen. Thesevariables can influence both the qualityof work piece and the tool </em><em>wear during machining. Simple and textured (Parallel and perpendicular grooved ,dimple </em><em>textured) Tungsten Carbide inserts were utilized for machining of Al-7075 in this study. </em><em>L20 (5*4) Taguchi orthogonal array was used for experimental design. CMM and </em><em>Surftonic surface meter was used to measure tool wear and surfaceroughness respectively. </em><em>The efficiency of this strategy is demonstrated by the Pareto coefficient main effect plot, </em><em>contour plot, and surface plots. The study found that among the five types of cutting </em><em>inserts evaluated (untextured, Titanium coated, dimple textured, parallel groove textured, </em><em>and perpendicular grooved textured), the parallel groove textured insert performed the best </em><em>exhibitingthe lowest surface roughness and tool wear.</em></p>2025-03-15T00:00:00+02:00Copyright (c) 2025 https://sesjournal.com/index.php/1/article/view/206IMPACT OF AGILE PRACTICES ON SOFTWARE DEVELOPMENT SUCCESS: A STRUCTURAL EQUATION MODELING APPROACH2025-03-17T10:52:05+02:00Dr. Ali Raza Rangalkish@yahoo.comLaviza Asif Memonalkish@yahoo.comZeeshan Qureshialkish@yahoo.comJaved Ahmed Dahrialkish@yahoo.com<p><em>The purpose of this study was basically to examine how the Agile methodologies </em><em>affect the success of the software development work by taking into consideration </em><em>the mediating roles of team collaboration and communication efficiency. </em><em>Structural Equation Modeling (SEM) in Smart PLS was applied to quantitatively </em><em>analyze the data obtained from 300 software professionals in variety of industries </em><em>using a quantitative research design. The study analyzed agile frameworks </em><em>including Scrum, Kanban, and Extreme Programming (XP), and asses their effects </em><em>on software quality and project success. It found that Agile methodologies not only </em><em>made quintessential enhancements to the quality of the software and the success </em><em>of the project but also improved efficiency of communication and promoted better </em><em>collaboration between team members. Furthermore, I find both software </em><em>development success and the effect of Agile on the Software Development Success </em><em>to be mediated by the team collaboration and the team communication efficiency. </em><em>It provides clues to the effective use of Agile implementation strategies by software </em><em>firms as well as project management strategies.</em></p>2025-03-17T00:00:00+02:00Copyright (c) 2025 https://sesjournal.com/index.php/1/article/view/202Efficient ML Technique for Brain Tumor Segmentation, and Detection, based on MRI Scans Using Convolutional Neural Networks (CNNs)2025-03-14T07:08:57+02:00Nasir Ayubeditorshnakhat@gmail.comMuhammad Waqas Iqbaleditorshnakhat@gmail.comMuhammad Usman Saleemeditorshnakhat@gmail.comMuhammad Nabeel Amineditorshnakhat@gmail.comOsama Imraneditorshnakhat@gmail.comHamayun Khaneditorshnakhat@gmail.com<p>Experts need accurate segmentation and detection alongside the classification of Brain tumors from MRI images because this approach helps identify neurological problems early for timely treatment. Deep learning technology has made Convolutional Neural Networks (CNNs) effective in analyzing complex medical imaging challenges by developing automatic abilities to detect and categorize complex data features. This study used 1,251 Brain Tumor MRI images from BraTS2021 for model testing of CaPTk, 2DVNet, EnsembleNets, and ResNet50 towards brain tumor segmentation. The research utilized the DSC and HD metrics for its evaluation process. Importantly, EnsembleUNets achieved the minimum HD of 18 while reaching the maximum DSC of 0.92. The analysis of the radiomic feature confirmed that EnsembleUNets delivered the best CCC value at 0.75 together with the lowest RMSE at 0.52 and the highest TDI at 1.9 for tumor segmentation and classification in clinical practice. These findings show EnsembleUNets effectively perform brain tumor segmentation and classification and identification so healthcare professionals now have more effective guidance about implementing CNN-based clinical applications.</p> <p><strong>Keywords:</strong><strong> </strong>Cyber-physical systems (CPSs). Security Protocols, Encryption, OpenVPN, IKEv2/IPsec, WireGuard, Quantum Computing</p>2025-03-14T00:00:00+02:00Copyright (c) 2025 Spectrum of engineering scienceshttps://sesjournal.com/index.php/1/article/view/194A Deep Learning-Based Enhanced Sentiment Classification and Consistency Analysis of Queries and Results in Search Using Oracle Hybrid Feature Extraction2025-03-10T18:44:13+02:00Muhammad Yousaf editorshnakhat@gmail.comFarwa Khalideditorshnakhat@gmail.comMuhammad Usman Saleem editorshnakhat@gmail.comMohe Ud Dineditorshnakhat@gmail.comAbdul Karim Shahideditorshnakhat@gmail.comHamayun Khaneditorshnakhat@gmail.com<p>Multiple assessments of customer feedback play a vital role in the industry because they help enhance product quality while spotting major network issues and creating improved customer-facing services. A traditional sentiment analysis process relies on external machine learning frameworks that result in system integration issues and performance reduction because large data volumes transfer between different options such as API and FTP file sharing before applying data machine learning models that extract insights. This paper proposed a Machine learning-based Model based on (CNN, RNN, and DT Classifier) and focuses on extracting sentiment metadata that links to the user-selected topic or entity together with their search results. The real-time sentiment analysis system which operates in Oracle Autonomous Database uses OML4SQL and OML4PY components from Oracle Machine Learning to process Communication customer feedback obtained through the web-based Oracle APEX system. The predictive model developed by the research utilizes CNNs and RNN algorithms provided by Oracle to identify whether customer reviews are positive, negative, or neutral. After receiving training the model functions to classify fresh feedback immediately while bypassing dependencies on external AI platforms. The implementation occurs inside the Autonomous Oracle Database while bypassing API or FTP file-sharing methods. The analysis reveals OML4SQL and OML4PY succeed in customer sentiment analysis thus enabling Software organizations to acquire valuable business information for better service delivery and strategic choices. The findings from this research demonstrate that the Convolutional Neural Network (CNN) achieved the highest accuracy (92.5%), followed by RNN (90.2%), while DT (85.4%) performed relatively lower. The analysis of 15,500 customer reviews revealed that 48.1% were positive, 39.4% were negative, and 33.7% were neutral. Oracle machine learning tools (ML4SQL and OML4PY) provide real-time text analytics in Software databases which enables service-based decisions through automated sentiment analysis technology within customer support operations.</p> <p><strong>Keywords:</strong><strong> </strong>Sentiment Analysis, Oracle Machine Learning for SQL (OML4SQL), Oracle Machine Learning for Python (OML4PY), Machine Learning.</p>2025-03-10T00:00:00+02:00Copyright (c) 2025 Spectrum of engineering scienceshttps://sesjournal.com/index.php/1/article/view/189Scrum-Driven Quality Improvement: Mitigating Software Failures Effectively2025-03-07T11:29:25+02:00Noreen Khalidnoreen.khalid@bnu.edu.pk<p>The pressure on developmental teams increases due to the technical advancement of 21<sup>st</sup> century, accomplishing the projects within specific time frame. Various Incremental development process initiated to achieve the growing customers’ demands. But it is a challenge for developers to opt the best methodology for quality enhancement of Software failure. During this process risk management, right product, time limitation and error rate should be kept in mind to avoid the risk of failure. In this study, one of the most famous agile methodologies, Scrum, was introduced to analyze the improvement of software failures. Through this analysis, we can suggest the implementation of Scrum for quality enhancement of software failures. For further study, researchers can work on Scrum flexibility and use of scrum model in all kind of software; also can work on scrum architecture to improve the performance and efficiency in software development management.</p>2025-03-08T00:00:00+02:00Copyright (c) 2025 Spectrum of engineering scienceshttps://sesjournal.com/index.php/1/article/view/200Enhancing Chronic Kidney Disease Prediction with a Hybrid Hard Voting Classification Approach2025-03-14T01:40:57+02:00Kavita Tabbassumeditorshnakhat@gmail.comWaqas Ahmed Gadahieditorshnakhat@gmail.comSaima Shaikheditorshnakhat@gmail.comShahnawaz Farhan Khahro editorshnakhat@gmail.com<p>Chronic kidney disease (CKD) affects over 10% of the global population, equating to more than 800 million people. It is prevalent among older adults, women, minorities, and individuals with diabetes and hypertension. CKD also presents a significant health burden in low- and middle-income countries. The growing prevalence of CKD and its adverse impacts emphasize the urgent need for enhanced prevention and treatment strategies. Machine learning (ML), a prominent application of artificial intelligence, has made significant strides in healthcare research. The aim of this study is to design an ensemble method for more accurate prediction of CKD in patients. The proposed ensemble hard voting classifier integrates four machine learning algorithms—Support Vector Machine, Logistic Regression, K-Nearest Neighbors Classifier, and Random Forest Classifier. The model is trained on a dataset sourced from Kaggle, which includes data from 400 patients with 25 features.</p> <p><strong>Keywords</strong>: Chronic kidney disease, machine learning, ensemble method, hard voting classifier.</p>2025-03-14T00:00:00+02:00Copyright (c) 2025 Spectrum of engineering scienceshttps://sesjournal.com/index.php/1/article/view/195Current State Analysis of Counterfeit Medicine Detection in Pharmaceutical Supply Chains in Pakistan2025-03-11T10:27:40+02:00Imran Ahmadeditorshnakhat@gmail.comDr. Muhammad Umareditorshnakhat@gmail.com<p>Counterfeit medicines are a serious challenge in Pakistan's pharmaceutical supply chain, posing a serious threat to public health and economic stability, as well as the credibility of the health care system as a whole. This paper discusses the current status of counterfeit medicine detection mechanisms in Pakistan by using qualitative methods like an interview with industry leadership. The study deals with the examination of the present legacy systems; prevalence and effect of counterfeit medicines; and a gap in rules and technology that needs to be filled. Urgent need: modern technological integration, updated regulation frameworks, strategic solutions to overcome the growing danger of counterfeit drugs.</p>2025-03-11T00:00:00+02:00Copyright (c) 2025 Spectrum of engineering scienceshttps://sesjournal.com/index.php/1/article/view/193Exploring IoT Secuirty, Privacy and Data Protection2025-03-09T18:14:44+02:00Muhammad Iqbaleditorshnakhat@gmail.comM Arslan Sandilaeditorshnakhat@gmail.comZaheer Ul Hassaneditorshnakhat@gmail.com<p>Internet of things rapid growth is causing security and privacy concerns. Internet of medical things are devices designed for remote monitoring for the patients with chronic diseases. The security of the patient data at the collection, transmission and storage is critical for data integrity and privacy. The access to the patient data is limited only to users with high privileges i.e. for doctor and patient. On the other hand encrypted data is decrypted with shared keys by authorize user only. The technique is well suited for the access of data to only authentic users. The smart device connectivity with other devices is frequent that is sometimes raise questions related to security of these devices. The authentication of the devices is an important concern which is proposed this article. The authentication technique is robust as compared to other proposed technique due to having secure authentication at each step of devices to connect with main smart device. The Lightweight neural network method introduced for the network intrusion detection which is designed for IoT devices having low computing capability and low storage space. LNN model is excellent for classifying the smart devices traffic for normal and attack scenarios. In industrial IoTs trust management is the key factor to allow or deny the specific device to enter into the smart network. The trust between two nodes is calculated based on the device previous history with other devices. The approach is efficient for trust management based access to the devices. Fog assisted IoTs based on trust management and security component shows that their lightweight efficiency is higher as compared to other models for the security of resource constrained devices. For Industrial IoTs advanced encryption is best scenario where number of the devices frequently join and leave the network. The security measures at each level of the smart device is critical to security of data and privacy protection. The access based on human stored biodata or biometrics is secured enough for access to smart devices. The doubled encryption-decryption approach providing strong security measures for smart device generated data and users privacy. The Quick Response or QR code enabled technique providing critical information for device security enabled techniques increase buyer’s trust, which is important for deployment of security enabled smart devices around the world.</p> <p><strong>Keywords</strong><strong>:</strong>&nbspInternet of things security, data protection, privacy, data encryption, network intrusion detection, fog-assisted IoTs, Trust management.</p>2025-03-09T00:00:00+02:00Copyright (c) 2025 Spectrum of engineering scienceshttps://sesjournal.com/index.php/1/article/view/192Exploring IoT Secuirty, Privacy and Data Protection2025-03-08T16:48:38+02:00Muhammad Iqbal editorshnakhat@gmail.comM Arslan Sandila editorshnakhat@gmail.comZaheer Ul Hassan editorshnakhat@gmail.com<p>Internet of things rapid growth is causing security and privacy concerns. Internet of medical things are devices designed for remote monitoring for the patients with chronic diseases. The security of the patient data at the collection, transmission and storage is critical for data integrity and privacy. The access to the patient data is limited only to users with high privileges i.e. for doctor and patient. On the other hand encrypted data is decrypted with shared keys by authorize user only. The technique is well suited for the access of data to only authentic users. The smart device connectivity with other devices is frequent that is sometimes raise questions related to security of these devices. The authentication of the devices is an important concern which is proposed this article. The authentication technique is robust as compared to other proposed technique due to having secure authentication at each step of devices to connect with main smart device. The Lightweight neural network method introduced for the network intrusion detection which is designed for IoT devices having low computing capability and low storage space. LNN model is excellent for classifying the smart devices traffic for normal and attack scenarios. In industrial IoTs trust management is the key factor to allow or deny the specific device to enter into the smart network. The trust between two nodes is calculated based on the device previous history with other devices. The approach is efficient for trust management based access to the devices. Fog assisted IoTs based on trust management and security component shows that their lightweight efficiency is higher as compared to other models for the security of resource constrained devices. For Industrial IoTs advanced encryption is best scenario where number of the devices frequently join and leave the network. The security measures at each level of the smart device is critical to security of data and privacy protection. The access based on human stored biodata or biometrics is secured enough for access to smart devices. The doubled encryption-decryption approach providing strong security measures for smart device generated data and users privacy. The Quick Response or QR code enabled technique providing critical information for device security enabled techniques increase buyer’s trust, which is important for deployment of security enabled smart devices around the world.</p> <p><strong>Keywords</strong><strong>:</strong>&nbspInternet of things security, data protection, privacy, data encryption, network intrusion detection, fog-assisted IoTs, Trust management.</p>2025-04-08T00:00:00+03:00Copyright (c) 2025 Spectrum of engineering scienceshttps://sesjournal.com/index.php/1/article/view/199A Comprehensive Analysis of Mechanical Strength and Durability in Cellular Light Concrete Blocks Modified with Multiple Additives 2025-03-13T12:26:30+02:00Adnan Khan editorshankhat@gmail.comAbdul Basit Mansoor editorshankhat@gmail.comRabia Liaqateditorshankhat@gmail.comRozi Khan editorshankhat@gmail.comUzair Ali* editorshankhat@gmail.comMuhammad Anwar Ullah editorshankhat@gmail.com<p>The multipurpose material, cellular lightweight concrete (CLWC), comprises cement, fly ash, and a foaming agent. The popularity of cellular lightweight concrete can be attributed to its low weight, which lowers the structure's self-weight. With its cementitious qualities and mechanically entrained foam in the cement-based slurry, cellular lightweight concrete (CLWC) is a novel material that has significantly increased in popularity in the construction industry over the past ten years. CLC blocks have poor strength issues while being lightweight concrete with strong water absorption and thermal insulation qualities. CLC blocks are altered with additives like fly ash, silica fume, and marble dust to combat this issue. Due to its low strength, a study reveals that silica fume and marble dust have been utilized in several experiments to increase stability. The samples will undergo compressive strength, thermal conductivity, and water absorption tests. Regarding compressive strength, 3% silica fume and 7% marble dust work well. These findings are based on seven and 28-day curing times, while 14-day curing may be investigated in the future.</p> <p><strong>Keywords: </strong>Concrete blocks, Silica fume, foaming agent, Marble dust, Fly ash</p>2025-03-12T00:00:00+02:00Copyright (c) 2025 https://sesjournal.com/index.php/1/article/view/207ENHANCING THERMAL AND COMBUSTION PERFORMANCE OF GAS WATER TANK GEYSER THROUGH BAFFLE INTEGRATION2025-03-17T11:07:28+02:00Faiq Saidalkish@yahoo.comAfzal Khanalkish@yahoo.comZeeshan Khanalkish@yahoo.com<p><em>Enhancing the thermal and combustion performance of gas water tank geysers is </em><em>crucial for improving energy efficiency and minimizing fuel consumption. This </em><em>study systematically investigates the impact of seven distinct baffle configurations </em><em>baseline (no baffle), strip, cylindrical, conical, finned conical, frustum, and bladed </em><em>frustum on the thermal and combustion performance of a gas water tank geyser. </em><em>Experimental findings demonstrate that structured baffle designs significantly </em><em>enhance heat transfer, optimize fuel-air mixing, and reduce fuel consumption. </em><em>Among the tested configurations, the bladed frustum baffle exhibited the highest </em><em>thermal efficiency (69.03%), surpassing the conical baffle (61.24%) by 7.79% </em><em>while achieving an 8.4% reduction in gas consumption. The frustum baffle </em><em>demonstrated a 5.83% increase in thermal efficiency (67.07%) and a 6.49% </em><em>reduction in gas consumption compared to the conical baffle, underscoring its </em><em>superior heat retention and transfer capabilities. In terms of combustion </em><em>performance, the frustum baffle achieved a 3.99% higher combustion efficiency </em><em>(69%) than the conical baffle (65.01%), ensuring more complete fuel utilization. </em><em>However, the bladed frustum baffle showed a 0.61% decline in combustion </em><em>efficiency (64.4%), attributed to increased stack temperature and altered </em><em>combustion dynamics. Overall, the frustum baffle emerges as the optimal </em><em>configuration, offering the best balance between improved thermal efficiency </em><em>(67.07%), stable combustion (69%), and reduced fuel consumption. These </em><em>findings provide a robust framework for enhancing the energy efficiency of gas-fired </em><em>heating systems in residential applications. </em></p>2025-03-17T00:00:00+02:00Copyright (c) 2025 https://sesjournal.com/index.php/1/article/view/208IN-SITU ELEMENTAL DETECTION IN TOBACCO AND ASH BY LASER INDUCED BREAKDOWN SPECTROSCOPY: IMPLICATIONS FOR HUMAN HEALTH AND ENVIRONMENTAL SUSTAINABILITY2025-03-18T10:38:54+02:00Nimra Shahzadalkish@yahoo.comMadma Habibalkish@yahoo.comYasir Alialkish@yahoo.com<p><em>Laser induced breakdown spectroscopy (LIBS) is a versatile technique that is used </em><em>to determine elemental composition in different samples. It is simple and fast </em><em>multi-elemental analysis technique which provides potential tool in situ chemical </em><em>analysis with high resolution, better limit of detection (LOD) and is cost efficient. </em><em>Smoking tobacco in cigarettes amplifies the risk of growing certain diseases such as </em><em>cancer, heart disease, stroke, lung diseases, diabetes, and chronic obstructive </em><em>pulmonary disease (COPD), which includes emphysema and chronic bronchitis. </em><em>About 80% of lung cancer as well as about 80% of all lung cancer deaths are due </em><em>to </em><em>smoking. </em><em>Smoking tobacco is a considerable source of consuming several </em><em>harmful and toxic elements that are unhealthy for human body. The presence of </em><em>some toxic elements causes serious health concern to active as well as to passive </em><em>smokers. In the present study, we employ LIBS technique to identify and detect </em><em>toxic and harmful elements in tobacco and ash from four popular Pakistani </em><em>cigarette brands, ensuring human health protection, agricultural safety, and </em><em>environmental sustainability. The Q-switched ND: YAG (neodymium-doped </em><em>yttrium aluminum garnet) laser (</em><em>λ</em><em>=1064 nm) with laser energy 90 mJ and pulse </em><em>duration 10 ns were used to ablate the samples. From the recorded optical </em><em>emission spectra of these samples several elements were detected (Fe, Ca, Mn, Sc, </em><em>Ti, Cr, Sc, Sr and Ni) among which Chromium Cr, Nickel Ni and Strontium Sr </em><em>are highly toxic elements. Furthermore, the presence of toxic and heavy metals in </em><em>ash could be significant contributor to metal load in soil as well as for human </em><em>body. We calculated the electron temperature (Te) by the Boltzmann Plot Method </em><em>from the spectroscopic analysis of the transition lines of Fe-I (iron). Stark </em><em>Broadening Method was used to determine electron number density (Ne) from the </em><em>transition line of Fe-I at 422.413 nm and 649.25 nm for tobacco and ash </em><em>sample respectively, under the assumption of local thermodynamic equilibrium. </em><em>The present results demonstrate that LIBS is a powerful diagnostic tool for </em><em>effectively tracing harmful and toxic elements in various solid samples, facilitating </em><em>the development of protective environmental measures.</em></p>2025-03-18T00:00:00+02:00Copyright (c) 2025 https://sesjournal.com/index.php/1/article/view/209OVERCOMING ENERGY EFFICIENCY CHALLENGES IN C-RAN: A REVIEW OF RECENT ADVANCES AND SOLUTIONS2025-03-19T08:09:40+02:00Taha Shahzadalkish@yahoo.comMuhammad Awaisalkish@yahoo.comFurqan Zahid alkish@yahoo.comBasit Alialkish@yahoo.comKhawaja Maaz-Ur-Rahmanalkish@yahoo.com<p><em>Cloud Radio Access Networks (C-RAN) is one of the novel approaches to cell </em><em>network architecture by centralizing baseband processing devices (BBUs) into </em><em>cloud statistics facilities and dispensing far off radio heads (RRHs) at mobile </em><em>web sites. While C-RAN supports aspects of higher scalability, flexibility and </em><em>network management, it also creates significant large power-intake demanding </em><em>scenarios due to its operation with multiple RRHs and the power-in-depth </em><em>BBU pools. This paper examines the major challenges in realizing power </em><em>efficiency in C-RAN with dynamic site traffic loads, idle power consumption </em><em>as well as cooling requirements in central data centers. For example, we </em><em>consider several alternative designs such as dynamic BBU pooling, sleep mode </em><em>techniques for RRHs, AI-based visitors prediction, and integration of </em><em>renewable sources of energy. Hence, based on such results, it can be inferred </em><em>that strength consumption decreases significantly without degrading the </em><em>community performance with such technologies, especially by implementing </em><em>them at various layers of the network. This work concludes with some future </em><em>research guideline on how to improve the energy efficiency of C-RAN in the </em><em>scenario of 5G and previous networks</em><em>.</em></p>2025-03-19T00:00:00+02:00Copyright (c) 2025 https://sesjournal.com/index.php/1/article/view/210INVESTIGATING OF BLACK HOLE ATTACK IN WIRELESS SENSOR NETWORK2025-03-20T09:03:15+02:00Syed Muhammed Nouman Qadiralkish@yahoo.com<p><em>As we enter the era of sensors different types of sensors are deployed everywhere for </em><em>making different types of Networks such as MANET, WBAN, VANET, etc. All </em><em>of these are the categories of wireless sensor networks and in all categories, the </em><em>sensor is deployed to collect data and transmit it to the sensor head node or base </em><em>stations during the data transmission a variety of security threats are available </em><em>some of them are active and some of them are passive all active. In this paper we </em><em>discussed various security attacks that directly affect the performance of a node or </em><em>network (performance-oriented attack), creating the violence in layers (layer-</em><em>oriented attack) and achieving some goals (goals-oriented attack) in detail also </em><em>discussed the countermeasures for all types of attacks. This paper is specially </em><em>designed for the investigation of black hole attacks in the WSNs network we also </em><em>cover the detection of blackhole attacks and their prevention technique.</em></p>2025-03-20T00:00:00+02:00Copyright (c) 2025 https://sesjournal.com/index.php/1/article/view/211ACCESS CONTROL MODEL FOR DATA STORED ON CLOUD COMPUTING2025-03-20T09:18:57+02:00Muhammad Talha Tahir Bajwaalkish@yahoo.comZartasha Kiranalkish@yahoo.comTehreem Fatimaalkish@yahoo.comRameez Akbar Talanialkish@yahoo.comWaseema Batoolalkish@yahoo.com<p><em>Cloud computing can be referred as technology based on internet, having shared, </em><em>adaptable foundation that can be utilized as administration by clients. </em><em>Compositely cloud computing is software and hardware being conveyed by internet </em><em>as a service. It is an extraordinary advancement innovation getting well known </em><em>because of minimal effort, adaptability and versatility according to client’s </em><em>necessity. The objectives of this research were to concentrate on client’s data </em><em>security in cloud computing i.e. data storage security issues and how to limit </em><em>unapproved access to information by proposing access control model. Accessible </em><em>arrangements were introduced by the researcher and then an access control model </em><em>was recommended. Many access model were accessible yet those model do not </em><em>satisfy the security necessities as per service providers and cloud is always under </em><em>assaults of hackers and data integrity, accessibility and protection were traded off. </em><em>This research presented a model keeping in view the requirements of service </em><em>providers that upgraded the information security in terms of integrity, accessibility </em><em>and protection. The proposed model helped the hesitant clients to effectively choose </em><em>to move on cloud while understanding the dangers related with cloud computing. </em></p>2025-03-20T00:00:00+02:00Copyright (c) 2025 https://sesjournal.com/index.php/1/article/view/212AI-POWERED ANOMALY DETECTION IN SOFTWARE LOGS: A MACHINE LEARNING APPROACH FOR PROACTIVE FAULT DIAGNOSIS AND SELF-HEALING SYSTEMS2025-03-20T09:27:47+02:00Taib Alialkish@yahoo.comRizwan Iqbalalkish@yahoo.comNadia Mustaqim Ansarialkish@yahoo.comTalha Tariqalkish@yahoo.comAdnan Ahmed Rafiquealkish@yahoo.com<p><em>Due to the complexity of modern software systems the amount of logs generated to </em><em>assist with monitoring and fault diagnosing has become way too large for manual </em><em>processing. This paper aims at developing the architecture for identifying </em><em>anomalous patterns in the software log files through the application of advanced </em><em>machine learning and deep learning algorithms towards fault diagnosis for self- </em><em>healing systems. Traditional rule based approaches cannot fit the modern complex </em><em>scenarios as well as the large amounts of data that are produced in the form of </em><em>logs. Machine learning approaches, including deep learning structures like LSTMs </em><em>and Transforms, are more effective at detecting anomalies due to their ability to </em><em>capture contextual dependencies inherent in log sequences. It also offers resolutions </em><em>to the problem of a scarcity of labeled data in the utilization of self-supervised </em><em>learning approaches, along with contrastive learning. Additionally, self-C damaged </em><em>control mechanisms based on reinforcement learning as well as a rule and based </em><em>automation recurrently correct faults decreasing the non-availability of the system. </em><em>Several models are assessed on log datasets with different evaluation metrics such </em><em>as precision, recall, F1-score, and AUC-ROC. The results when testing suggest </em><em>that Transformer-based models yield the best performance as compared to other </em><em>conventional machine learning methods while at the same time requiring more </em><em>computational resources. Self-healing systems cut down on downtime by as much </em><em>as 68.2 percent; such characteristics make AI promising for strengthening system </em><em>performance. That is why some issues, like model interpretability, high </em><em>computation costs, and real-time processing, are still present. Mitigating these </em><em>challenges by employing lightweight deep learning models, explainable AI methods, </em><em>and the ability to deploy these algorithms at scale will be instrumental in </em><em>advancing the use of AI-based anomaly detection and self-healing systems in safety- </em><em>critical software applications. This work presents a state-of-the-art review of AI- </em><em>based log anomaly detection methods and discusses potential research directions </em><em>for improving scalability, interpretability, and practicality in real-world </em><em>applications.</em></p>2025-03-20T00:00:00+02:00Copyright (c) 2025 https://sesjournal.com/index.php/1/article/view/215STEGANOGRAPHIC SECRET COMMUNICATION USING RGB PIXEL ENCODING AND CRYPTOGRAPHIC SECURITY2025-03-21T09:35:49+02:00Ghulam Gilaniealkish@yahoo.comSyeda Naila Batoolalkish@yahoo.comSyed Naseem Abbasalkish@yahoo.comAkkahsha Latifalkish@yahoo.comMuhammad Iqbalalkish@yahoo.comHina Shafiquealkish@yahoo.comSana Cheemaalkish@yahoo.com<p><em>This research presents an advanced and highly practical strategy for secure </em><em>communication through steganography, leveraging RGB pixel encoding and </em><em>cryptographic security. Our novel methodology segments message data into 3-bit, 3- </em><em>bit, and 2-bit components, which are seamlessly integrated with the corresponding </em><em>RGB pixel values of a digital image. This structured embedding process generates </em><em>a logarithmic (LOG) table, which is subsequently encrypted using the Rijndael </em><em>Managed algorithm, enhancing both confidentiality and resistance to </em><em>cryptographic attacks. Comparative analysis demonstrates that our approach </em><em>maintains image quality with less than a 1% variation in pixel intensity, </em><em>significantly outperforming traditional steganographic techniques such as the </em><em>Least Significant Bit (LSB) method. The proposed method establishes a robust </em><em>and imperceptible communication channel, offering superior security, </em><em>undetectability, and resilience against steganalysis.</em></p>2025-03-21T00:00:00+02:00Copyright (c) 2025 https://sesjournal.com/index.php/1/article/view/216READABLE TEXT RETRIEVAL FROM NOISE-INFLUENCED DOCUMENTS USING IMAGE RESTORATION METHODS2025-03-21T09:43:50+02:00Ghulam Gilaniealkish@yahoo.comSyeda Naila Batoolalkish@yahoo.comSyed Naseem Abbasalkish@yahoo.comHina Shafiquealkish@yahoo.comMuhammad Iqbalalkish@yahoo.comSana Cheemaalkish@yahoo.comAkkahsha Latifalkish@yahoo.com<p><em>Documents scanning has become a necessary phase in official record keeping of </em><em>everyday business environment. Typically, scanned document images in digitized </em><em>format suffer from various types of noise which create serious problems at </em><em>document reading time. This noise may be due to several reasons low quality </em><em>paper, paper aging, scanner assembly and tonner, unskilled machine operator, or </em><em>due to some copying machine artifacts. The removal or elimination of noise in </em><em>scanned documents is still a big challenge for researchers in the digital era. Already </em><em>performed work on digitized handwritten, and machine-printed degraded historical </em><em>documents, but we have experimented with different datasets such as the Media </em><em>Team Document Database manually scanned noisy documents, and decided to </em><em>use, a collection of scanned noise-affected documents, which are available on the </em><em>websites. We have transformed the noise-influenced image document into a </em><em>binarized document. After this, we applied noise reduction techniques for textual </em><em>data enhancement so that the text would be in readable and noise-free form. An </em><em>Adaptive Gaussian Mixture Model based on Expectation Maximization (EM) </em><em>has been used to restore the image pixels, with the values expected to be the </em><em>original ones. The enhanced text in its visual aspect and improved quantitatively </em><em>measured parameters show the restored documents. We have calculated Signal to </em><em>Noise Ratio (SNR), Mean Square Error / Mean Square Difference </em><em>(MSE/MSD), Peak Signal Noise Ratio (PSNR), Contrast, and Energy for </em><em>quantitative parameters to evaluate the performance measures of the proposed </em><em>method of document restoration comparative to the state-of-the-art methods. Our </em><em>research is quantitative, as we have performed experiments on digital sensor data </em><em>and the evaluation of the results based on computational techniques. Our results </em><em>are successful, support the proposed methodology, and perform well in comparison </em><em>to the state-of-the-art methods. Overall, the proposed methodology is easy to </em><em>understand and simple to implement.</em></p>2025-03-21T00:00:00+02:00Copyright (c) 2025 https://sesjournal.com/index.php/1/article/view/218USING GENERATIVE AI FOR SIMULATING CYBER SECURITY ATTACKS AND DEFENSE MECHANISMS: A NEW APPROACH TO AI-DRIVEN CYBER THREAT MODELING2025-03-22T10:10:41+02:00Hamza Raufalkish@yahoo.comSyed Imran Hussain Shahalkish@yahoo.comTaib Alialkish@yahoo.comHassam Gulalkish@yahoo.comMaria Soomroalkish@yahoo.com<p><em>Awareness of cyber risk is a crucial factor in today’s world, where new forms of </em><em>threats are potentially dangerous to companies’ IT frameworks. The reaction-based </em><em>detection, particularly the signature based detection and the rule based systems </em><em>have their limitations in combating new and advanced attacks because they are </em><em>deficient in the proactive approach. With threats emerging in the cyber realm in a </em><em>dynamic way, it is imperative that organizations seek out active and conscious </em><em>defenses. This paper aims at bringing forward the possibility of using Generative </em><em>Artificial Intelligence (AI) in the process of modeling cyberattacks and defense </em><em>strategies: a new approach to Defending AI Cyber Threats. Generative AI models </em><em>such as GAN and VAE are used to generate realistic attack scenarios that are </em><em>useful in assessing and improving security systems. These allow the emulation of </em><em>new scenarios that have not yet been experienced in cyberspace that, in turn, can </em><em>be used to assess defence mechanisms. This is why this approach is popular in </em><em>cybersecurity research since it can represent such threats as APTs and other types </em><em>of threats that may appear over time while advancing through the specific attack </em><em>life cycle. Through leveraging generative AI for threat modeling, organizations </em><em>start shifting from a reactive approach to threat modeling, with security features </em><em>matching up with the advancing complexity of threats.</em></p>2025-03-22T00:00:00+02:00Copyright (c) 2025 https://sesjournal.com/index.php/1/article/view/220COMPREHENSIVE ANALYSIS OF FRAUD DETECTION PREVENTION SYSTEMS FOR ACCURACY AND EFFICACY2025-03-25T08:41:58+02:00Hasnain Kashifalkish@yahoo.comFawad Naseeralkish@yahoo.com<p><em>Financial fraud, waste, and abuse cost global economies an estimated $5.4 </em><em>trillion annually, with digital payment platforms experiencing unprecedented </em><em>vulnerability. This study presents a systematic evaluation of contemporary fraud </em><em>detection and prevention systems across major financial institutions, analyzing </em><em>their accuracy, efficacy, and scalability in high-volume transaction environments. </em><em>The mixed-methods approach combined quantitative performance metrics from </em><em>financial institutions with qualitative assessments from cybersecurity specialists to </em><em>evaluate detection algorithms across four dimensions: detection accuracy (false </em><em>positive/negative rates), computational efficiency, adaptability to emerging </em><em>threats, and implementation feasibility. Results demonstrate that hybrid </em><em>approaches combining supervised machine learning with unsupervised anomaly </em><em>detection achieved superior performance (92.7% detection accuracy) compared to </em><em>traditional rule-based systems (78.3%). Notably, models integrating graph-based </em><em>network analysis with deep learning techniques showed particular promise in </em><em>identifying sophisticated organized fraud schemes, reducing false positives by 34% </em><em>while increasing true positive rates by 27% compared to standalone approaches. </em><em>The rise of cloud computing and mobile transactions has fundamentally altered </em><em>the fraud landscape, requiring detection systems that can process and analyze real- </em><em>time streaming data at unprecedented scale. The comprehensive classification </em><em>framework categorizes existing detection systems based on algorithmic approach, </em><em>fraud typology, and quantitative performance metrics across diverse financial </em><em>contexts. The study identify critical challenges in current implementations, </em><em>including the increasing sophistication of adversarial attacks, computational </em><em>constraints in real-time environments, and the dynamic nature of fraudulent </em><em>behaviors. Based on our findings, we propose a next-generation architectural </em><em>framework for financial fraud detection that emphasizes real-time adaptability, </em><em>explainable AI components, and cross-institutional collaboration, potentially </em><em>reducing overall fraud losses by an estimated 41% when implemented at scale.</em></p>2025-03-25T00:00:00+02:00Copyright (c) 2025 https://sesjournal.com/index.php/1/article/view/221OPTIMIZING PREFABRICATED BUILDING INDUSTRY INTEGRATION: A STUDY OF CONSTRUCTION THROUGH INDUSTRIAL SUPPLY CHAIN DYNAMICS AND UPSTREAM/DOWNSTREAM ENTERPRISE ACCESS STANDARDS2025-03-25T08:54:50+02:00Ahmad Wisalalkish@yahoo.comShasha Xiealkish@yahoo.com<p><em>This study examines the supply chain integration in the prefabricated building </em><em>industry, focusing on the relationship between upstream and downstream </em><em>enterprises. The research identifies critical risk factors across the project lifecycle </em><em>using an Importance-Performance Analysis. Key findings reveal that major risks </em><em>like high costs and policy changes, are more prevalent in the early project stages, </em><em>while risk management is weakest in later stages, particularly in manufacturing </em><em>and construction. The study highlights challenges in standardization, quality </em><em>control, and technology adoption, emphasizing the importance of government </em><em>policies and industry standards in shaping supply chain integration. Strategies for </em><em>enhancing integration are proposed, including the development of industry-wide </em><em>standards, investment in skills training, and adopting a lifecycle approach to </em><em>project management.</em></p>2025-03-25T00:00:00+02:00Copyright (c) 2025 https://sesjournal.com/index.php/1/article/view/222ADVANCES OF MACHINE LEARNING: A SURVEY OF METHODS, BENCHMARKS, MODELS AND DATASETS IN INDUSTRY APPLICATIONS2025-03-26T10:01:24+02:00Santosh Kumar Banbhranialkish@yahoo.comMuhammad Naeem Akhteralkish@yahoo.comFozia Noureenalkish@yahoo.comMir Sajjad Hussain Talpuralkish@yahoo.com<p><em>This study explores the fundamentals of Machine Learning (ML), a sub-discipline </em><em>of Artificial Intelligence (AI) that enables systems to learn and make decisions </em><em>based on new data without explicit programming. It provides an introduction to </em><em>the various types and approaches to ML, highlighting the models' ability to </em><em>improve over time as they process more data. Additionally, the paper traces the </em><em>historical evolution of ML, from statistical learning theory to neural networks, </em><em>and examines its relevance in modern society, driven by the availability of big data </em><em>and advances in computational power. Furthermore, the study investigates the </em><em>application of ML across major industries such as healthcare, finance, and retail, </em><em>demonstrating its potential to solve complex problems, enhance decision-making </em><em>processes, and transform industries.</em></p>2025-03-26T00:00:00+02:00Copyright (c) 2025 https://sesjournal.com/index.php/1/article/view/223CLOUD COMPUTING ADOPTION IN SMES: AN EMPIRICAL STUDY USING PLS-SEM"2025-03-26T10:06:44+02:00Laviza Asif Memonalkish@yahoo.comNaeem Akbar Channaralkish@yahoo.comDr. Ali Raza Rangalkish@yahoo.comJaved Ahmed Dahrialkish@yahoo.com<p><em>Cloud computing is game changing technology for these small and medium-sized </em><em>enterprises (SMEs) as they can now avail cheap and scalable IT solutions. This </em><em>study examines the relationship from perceived usefulness, security concern and </em><em>cost efficiency to SMEs cloud adoption, and used organization readiness as the </em><em>mediator in the process. Using a quantitative explanatory research design, data </em><em>were </em><em>collected through a 7-point Likert-type scale from a sample of </em><em>209information technology (IT) managers, system administrators, and decision-</em><em>makers in SMEs of Karachi. A Structural Equation Modeling (SEM) was applied </em><em>on the data using Smart PLS, which explored both direct and indirect </em><em>relationships. It found that both perceived usefulness and cost efficiency had a </em><em>significant impact on cloud adoption, while security concerns had a significant </em><em>deterrent effect. Moreover, the finding demonstrated that organizational readiness </em><em>has a significant mediating role about the relationships between the independent </em><em>variables and cloud access. And the findings of the study can support the decision-</em><em>makers in the SME sector, as well as policymakers with investment towards cloud </em><em>technology sentiment, especially IT infrastructure improvements and more </em><em>managerial involvement in cloud adoption.</em></p>2025-03-26T00:00:00+02:00Copyright (c) 2025 https://sesjournal.com/index.php/1/article/view/226THE DESIGN OF HIGH PERFORMANCE PHOTO-TRANSISTOR BASED ON SEMICONDUCTOR NANO-MATERIALS2025-03-27T11:13:50+02:00Zia Un Nabialkish@yahoo.comSalman Khanalkish@yahoo.com<p><strong><em>Background: </em></strong><em>Phototransistors are key components in modern optoelectronics due </em><em>to their high sensitivity and wide spectral response. However, enhancing </em><em>performance metrics such as responsivity, detectivity and response time remains a </em><em>significant challenge. Semiconductor nanomaterials offer promising solutions </em><em>owing to their tunable band gaps, high carrier mobility and strong light-matter </em><em>interaction. </em><strong><em>Objective: </em></strong><em>This study aimed to design and fabricate high- </em><em>performance phototransistors using GaN-ZnO solid solution nanowires and WS</em><em>₂</em><em>– </em><em>InGaZnO heterojunctions and to evaluate the impact of band gap engineering, </em><em>synthesis parameters, plasmonic enhancement and heterostructure formation on </em><em>device performance. Methods: GaN-ZnO nanowires with varying ZnO </em><em>concentrations were synthesized and deposited onto Si/SiO</em><em>₂ </em><em>substrates to form the </em><em>phototransistor channel. Device performance was evaluated under different </em><em>synthesis temperatures and durations. Ag nanoparticles were introduced for </em><em>plasmonic enhancement. Separately, WS</em><em>₂</em><em>–InGaZnO heterojunctions were </em><em>fabricated via CVD and sputtering techniques. Phototransistor architecture </em><em>employed bottom-gate configuration with Ti/Au source-drain electrodes. Key </em><em>parameters such as photocurrent, responsivity, detectivity, response time and </em><em>operational stability were analyzed. Results: Band gap tuning from 3.4 eV (GaN) </em><em>to 2.6 eV (Zn-rich nanowires) enhanced visible light absorption. Optimal synthesis </em><em>at 850 °C yielded highest responsivity (95.3 A/W) and detectivity (2.1 × </em><em>10¹¹ Jones). Ag nanoparticle decoration further improved responsivity to </em><em>131.7 A/W and reduced response time to 5.9 ms. The WS</em><em>₂</em><em>–InGaZnO </em><em>heterojunction device exhibited superior performance with responsivity of </em><em>122.5 A/W, detectivity of 3.8 × 10¹¹ Jones, and excellent stability (91.7% </em><em>retention over 50 cycles). </em><strong><em>Conclusion: </em></strong><em>The integration of band gap-engineered </em><em>nanowires, plasmonic enhancements and heterojunction structures significantly </em><em>advances phototransistor performance. These findings provide a strong foundation </em><em>for developing next-generation, broadband and high-sensitivity photodetectors for </em><em>practical optoelectronic applications.</em></p>2025-03-27T00:00:00+02:00Copyright (c) 2025 https://sesjournal.com/index.php/1/article/view/227LEVERAGING AI TO IDENTIFY ANOMALIES IN ELECTRICAL SYSTEMS AND COMMUNICATION NETWORKS, SAFEGUARDING CRITICAL INFRASTRUCTURE AGAINST CYBER-ATTACKS2025-03-27T11:41:43+02:00Syeda Sidra Batoolalkish@yahoo.comDr Waqar Ahmed Adilalkish@yahoo.comRameez Akbar Talanialkish@yahoo.comRamez Raja alkish@yahoo.comSara Abbasalkish@yahoo.comSyed Muhammad Shakir Bukharialkish@yahoo.com<p><em>Every year the dependency on essential infrastructure systems keeps growing thus </em><em>making them more vulnerable to complex cyber-attacks. The contemporary and </em><em>multifaceted terrorist threats can rarely be handled effectively through </em><em>conventional cybersecurity protocols. The paper evaluates how Artificial </em><em>Intelligence (AI) coupled with Machine Learning (ML) performs forecasting and </em><em>mitigation of security threats which affect critical infrastructure systems. Machine </em><em>Learning together with Artificial Intelligence methods perform exceptionally well </em><em>in real-time extensive data processing functions while discovering patterns that </em><em>indicate cyber-attack occurrences. The research investigates sophisticated AI and </em><em>ML algorithms including supervised learning and unsupervised learning as well as </em><em>reinforcement learning because they demonstrate their ability to detect intrusions </em><em>and assess vulnerabilities and predict threats. Primary analysis evaluates essential </em><em>hurdles that involve AI model adversarial attacks as well as privacy concerns and </em><em>data requirements for high-quality training samples. This research evaluates XAI </em><em>as a key factor for enhancing transparency and reliability in security systems built </em><em>using ML so they can be properly deployed in critical infrastructure environments. </em><em>The paper evaluates this integration process between threat intelligence systems </em><em>based on AI with present-day cyber frameworks while focusing on both real-time </em><em>threat mitigation and flexible responses toward shifting attack routes. A.I.-driven </em><em>problem recognition systems within Industrial Control Systems (ICS) demonstrate </em><em>their ability to shorten operational stoppages while reducing financial damage and </em><em>preventing infrastructure breakdowns according to a studied implementation. The </em><em>outcomes demonstrate AI together with ML can boost critical infrastructure's </em><em>cyber-attack resilience therefore establishing proactive cybersecurity practices </em><em>instead of reactive ones. The study finishes by outlining projects for future research </em><em>to create robust AI algorithms that defend against attacks along with standardized </em><em>data accumulations for crucial infrastructure defense and strengthened </em><em>cooperation between experts from different fields involving AI and cybersecurity </em><em>specialists and managers of critical infrastructure systems. Vital infrastructure </em><em>cybersecurity can achieve significant enhancement through the use of AI and ML </em><em>technologies which will maintain key services dependable and safe and </em><em>operational.</em></p>2025-03-27T00:00:00+02:00Copyright (c) 2025 https://sesjournal.com/index.php/1/article/view/228NEXT-GENERATION BIODEGRADABLE POLYMERS: INNOVATIONS FOR A GREENER PLANET2025-03-28T08:57:02+02:00Abdul Wahhabalkish@yahoo.comZain Ul Abideenalkish@yahoo.comWaqas Afzalalkish@yahoo.comAbdul Samadalkish@yahoo.comHidayat Ullah Farooqialkish@yahoo.comRaheel Ahmadalkish@yahoo.comMuhammad Farhan Amjadalkish@yahoo.comMuhammad Umairalkish@yahoo.com<p><em>The global demand for sustainable materials has driven significant advancements </em><em>in next-generation biodegradable polymers, offering promising solutions for </em><em>reducing environmental pollution. This study explores recent innovations in </em><em>biodegradable polymer development, emphasizing eco-friendly synthesis, enhanced </em><em>performance, and diverse applications. Modern approaches focus on utilizing </em><em>renewable resources such as plant-derived polysaccharides, proteins, and microbial </em><em>biopolymers to create materials with tailored mechanical properties and controlled </em><em>degradation rates. The integration of nanotechnology and bio-based additives has </em><em>further enhanced polymer stability, strength, and biodegradability, making them </em><em>suitable for packaging, agriculture, medicine, and textiles. Additionally, </em><em>advancements in polymer processing techniques, including 3D printing and green </em><em>chemistry methods, have facilitated scalable and energy-efficient production. These </em><em>next-generation polymers not only minimize reliance on fossil fuels but also reduce </em><em>plastic waste accumulation through accelerated degradation in natural </em><em>environments. Challenges such as cost, production scalability, and end-of-life </em><em>management remain, but ongoing research focuses on optimizing performance </em><em>while ensuring environmental compatibility. The paper highlights emerging trends, </em><em>lifecycle assessments, and future perspectives for integrating these materials into </em><em>circular economies. Ultimately, next-generation biodegradable polymers represent a </em><em>transformative shift towards a more sustainable and resilient planet, addressing </em><em>the urgent need for eco-conscious material innovations.</em></p>2025-03-28T00:00:00+02:00Copyright (c) 2025 https://sesjournal.com/index.php/1/article/view/229AN EFFICIENT METHOD TO LOCATE LICENSE PLATES UNDER DIVERSE ENVIRONMENTS2025-03-28T10:06:46+02:00Izhar Khanalkish@yahoo.comHarris Sarfrazalkish@yahoo.comMuhammad Bilalalkish@yahoo.comMuhammad Masood Ur Raheemalkish@yahoo.comRabia Farooqalkish@yahoo.com<p><em>Advances in artificial intelligence (AI) have made car and road object </em><em>identification more efficient. Researchers face a difficult problem in detecting </em><em>license plates (LPD), which necessitates the use of a dependable and precise </em><em>automatic detection method. Recent approaches to deep learning have showed </em><em>promise, although they are frequently limited to specific locales or private datasets. </em><em>This study focuses on accurately finding license plate locations using machine </em><em>vision and deep learning approaches, especially under adverse weather situations </em><em>such as blurriness, nighttime, and high brightness. A modified RCNN model is </em><em>developed for LPD, which uses the China City Parking Dataset (CCPD) to </em><em>forecast nine different stages. The suggested method includes data preprocessing, </em><em>weight generation, and model training. The model is taught using self-generated </em><em>weights rather than pre-learned weights, and it detects number plates with 98% </em><em>accuracy under a variety of weather situations. After 50 epochs of training, the </em><em>detection module predicts suitable bounding boxes. The Region Convolutional </em><em>Neural Network (RCNN) is highly effective in detecting number plates under </em><em>diverse environments.</em></p>2025-03-28T00:00:00+02:00Copyright (c) 2025 https://sesjournal.com/index.php/1/article/view/230Federated Learning for Distributed Anomaly Detection in Network Traffic Using GRU-Based Models2025-03-31T11:55:09+03:00Hamad Riazabc@yahoo.comMuhammad Zunnurain Hussainabc@yahoo.com Muhammad Zulkifl Hasanabc@yahoo.com Muzzamil Mustafaabc@yahoo.com<p>In this work, we present a novel machine learning method for anomaly detection in network traffic based on GRU based federated learning. Our decentralized method is supported by extensive experimental results and comparisons with existing techniques, and successfully addresses scenarios where centralized servers are not feasible due to privacy concerns or other constraints, and successfully detects anomalies in the distributed environments..</p>2025-03-31T00:00:00+03:00Copyright (c) 2025 https://sesjournal.com/index.php/1/article/view/232A NEW REAL-WORLD HAZY IMAGE DATASET FOR IMAGE ENHANCEMENT AND RECOGNITION2025-04-02T09:58:06+03:00Sanaullah Memonmehmoodjan54403@gmail.comRafaqat Hussain Arainkhubaib.khan0311@gmail.comGhulam Ali Mallahmehmoodjan54403@gmail.comSagar Lohanamehmoodjan54403@gmail.comFarheen Mirzamehmoodjan54403@gmail.com<p><em>Many computer vision tasks are benefited significantly from deep learning. However, research in the field of single image dehazing is still needed. The unclear image boundaries and dense haze degrade the visible quality of haze-free images. For measuring the efficiency of techniques, many deep learning-based approaches are evaluated on the real-world hazy image datasets for more credibility. Moreover, this study discusses on creation of a dataset that includes real-world hazy images. The dataset is valuable for computer vision and image processing research. It offers training resource for deep neural networks and machine learning models to handle more hazy circumstances.</em></p>2025-03-30T00:00:00+02:00Copyright (c) 2025