Franklin OpenPub Date : 2026-03-01Epub Date: 2026-01-19DOI: 10.1016/j.fraope.2025.100482
Tyene Zoraski Zanella, Giberto Reynoso-Meza
{"title":"Control signal based fault detection in streaming employing Principal Component Analysis and soft sensor in linear actuators","authors":"Tyene Zoraski Zanella, Giberto Reynoso-Meza","doi":"10.1016/j.fraope.2025.100482","DOIUrl":"10.1016/j.fraope.2025.100482","url":null,"abstract":"<div><div>The complexity of industrial systems has increased significantly, with many interconnected components, multiple control mechanisms, and a wide range of process variables and operational data. It is crucial to keep track of how these systems are functioning, as any deviation from normal operation due to a malfunction can result in significant financial losses and safety risks. Linear actuators are an essential component in many industrial and technological applications. Used for a wide range of tasks, such as moving, positioning, and controlling objects, they are a key component in many automated systems. This study presents a proposal for fault detection in streaming in linear actuators using Principal Component Analysis (PCA), Hotteling <span><math><msup><mrow><mi>T</mi></mrow><mrow><mn>2</mn></mrow></msup></math></span> (<span><math><msup><mrow><mi>T</mi></mrow><mrow><mn>2</mn></mrow></msup></math></span>), with a Bayesian soft sensor setup. Two different setups were tested: using a fixed threshold, and with an adaptive threshold. Results show that the two strategies were able to identify the three categories of faults, Lack of lubrication, Backlash, and Spalling in some degradation stage or load.</div></div>","PeriodicalId":100554,"journal":{"name":"Franklin Open","volume":"14 ","pages":"Article 100482"},"PeriodicalIF":0.0,"publicationDate":"2026-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146188028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Franklin OpenPub Date : 2026-03-01Epub Date: 2025-12-17DOI: 10.1016/j.fraope.2025.100473
Yong Zhang , Zheng Sun , Chenxiao Cai
{"title":"Real-time adaptive hybrid energy management for hybrid-electric UAVs: Offline–online DP-ECMS collaborative strategy in low-altitude inspection","authors":"Yong Zhang , Zheng Sun , Chenxiao Cai","doi":"10.1016/j.fraope.2025.100473","DOIUrl":"10.1016/j.fraope.2025.100473","url":null,"abstract":"<div><div>This paper proposes an energy management strategy that integrates dynamic programming (DP) offline global optimization and equivalent consumption minimization strategy (ECMS) online dynamic optimization. First, based on a given route of the UAV, using the predicted flight data of the power system, the demanded power is input into the DP algorithm, and a multi-objective cost function considering the efficiency and loss is established to realize the global offline energy allocation strategy optimization and derive the reference value of the SOC of the lithium battery. Second, the ECMS uses the DP result as the initial reference to design the equivalent factor based on the reference SOC. Third, the ECMS collects flight information in real time and corrects the power output online when the actual demand power deviates from the predicted power; when the SOC of the lithium battery is close to the lower limit due to a strong sudden perturbation, the weight of lithium battery protection is increased through the optimization cost function. Finally, the hardware-in-the-loop simulation platform is constructed to verify the effectiveness of the proposed algorithm. Compared with the traditional ECMS, this strategy reduces hydrogen consumption by 7.2% and improves overall system efficiency by 5.7%, thereby demonstrating its superiority in optimizing energy utilization and ensuring safe system operation.</div></div>","PeriodicalId":100554,"journal":{"name":"Franklin Open","volume":"14 ","pages":"Article 100473"},"PeriodicalIF":0.0,"publicationDate":"2026-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145939512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Franklin OpenPub Date : 2026-03-01Epub Date: 2025-12-15DOI: 10.1016/j.fraope.2025.100465
Biswarup Yogi , Ajoy Kumar Khan
{"title":"Efficient shared secret key distribution using Cellular Automata for hybrid cryptosystems","authors":"Biswarup Yogi , Ajoy Kumar Khan","doi":"10.1016/j.fraope.2025.100465","DOIUrl":"10.1016/j.fraope.2025.100465","url":null,"abstract":"<div><div>The present work demonstrates that combining Elliptic Curve Cryptography and Cellular Automata Rule 90 for AES shared session key generation improves randomness, security strength, and computational efficiency. The proposed method uses ECC to generate a shared secret in binary form. CA Rule 90 expands this binary sequence into the key stream. AES then encrypts the input image using this hybrid session key. The system is developed and executed with standard benchmark images in Python. The results show that the mechanism is highly resistant to statistical and differential attacks. For example, the NPCR achieves 99.6916%, UACI reaches 49.5214% with the encrypted images having high entropy and high MSE values with almost no pixel correlation. The method is relatively fast, with an average encryption time of 0.000248 s, and has low memory and CPU utilisation. Based on the presented information, the ECC-CA hybrid model offers an efficient approach for providing lightweight security for IoT and resource-constrained devices.</div></div>","PeriodicalId":100554,"journal":{"name":"Franklin Open","volume":"14 ","pages":"Article 100465"},"PeriodicalIF":0.0,"publicationDate":"2026-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145798983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Franklin OpenPub Date : 2026-03-01Epub Date: 2025-12-17DOI: 10.1016/j.fraope.2025.100468
Anoop Kumar, Vishal Kumar
{"title":"Simulation based evaluation of neutrosophic exponential imputations of population mean using neutrosophic ranked set sampling","authors":"Anoop Kumar, Vishal Kumar","doi":"10.1016/j.fraope.2025.100468","DOIUrl":"10.1016/j.fraope.2025.100468","url":null,"abstract":"<div><div>The prevalence of missing values and uncertainty in real-world dataset often hinders accurate analysis and reliable conclusions. Existing approaches often struggle to effectively address both aspects simultaneously. To handle both these aspects simultaneously, this paper proposes an approach that combines neutrosophic theory with exponential imputation and provides neutrosophic exponential imputations for estimating population mean using neutrosophic ranked set sampling (NRSS) framework. Neutrosophic imputation structures utilize the strengths of neutrosophic logic to manage uncertainty inherent in the data and incorporates NRSS to improve the efficiency of the imputation process. The mathematical properties such as bias and mean square error (MSE) of the proposed neutrosophic exponential estimators are obtained. The proposed neutrosophic exponential imputations are compared with some adapted prominent neutrosophic imputations. A thorough simulation study demonstrates that neutrosophic exponential imputations outperform the adapted prominent imputation structures in terms of both accuracy and robustness in handling datasets characterized by both missingness and uncertainty. A real data application of the proposed imputation structures is also presented in support of the mathematical results as well as simulation findings.</div></div>","PeriodicalId":100554,"journal":{"name":"Franklin Open","volume":"14 ","pages":"Article 100468"},"PeriodicalIF":0.0,"publicationDate":"2026-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145798928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An efficient spectral algorithm for non-linear astrophysical Lane–Emden problem using pseudo-Chebyshev wavelets with error analysis","authors":"Susheel Kumar , Satish Kumar , Sudhir Kumar Mishra , Shyam Lal","doi":"10.1016/j.fraope.2025.100459","DOIUrl":"10.1016/j.fraope.2025.100459","url":null,"abstract":"<div><div>Mother wavelets play a crucial role in wavelet analysis, leading to the development of several well-known families such as Haar, Morlet, Legendre, and Chebyshev wavelets. In this work, we introduce the concept of <em>Pseudo-Chebyshev Wavelets</em>, which, unlike classical wavelet families, are specifically designed to enhance approximation accuracy through the exploitation of pseudo-Chebyshev function. This novel construction yields wavelets that preserve the spectral convergence properties of Chebyshev methods while providing greater flexibility in handling boundary conditions and singularities. Extending our earlier efforts, we define pseudo-Chebyshev wavelets on the generalized interval <span><math><mfenced><mrow><mi>a</mi><mo>,</mo><mi>b</mi></mrow></mfenced></math></span>, <span><math><mrow><mn>0</mn><mo>≤</mo><mi>a</mi><mo>≤</mo><mi>b</mi><mo>≤</mo><mi>l</mi></mrow></math></span>, rather than restricting to the standard interval <span><math><mfenced><mrow><mn>0</mn><mo>,</mo><mn>1</mn></mrow></mfenced></math></span>. This generalization is particularly significant since many engineering and astrophysical models, including Lane–Emden-type differential equations, are naturally posed on arbitrary finite domains. The proposed <em>pseudo-Chebyshev wavelet operational matrix of integration</em> is developed and incorporated into a new spectral algorithm, reducing Lane–Emden-type equations to tractable systems of algebraic equations. The novelty of our method lies in (i) its distinction from existing spectral and wavelet-based approaches by combining pseudo-polynomial structures with wavelet operational techniques, (ii) its capacity to achieve higher numerical stability and precision in nonlinear problems using pseudo-Chebyshev wavelets, (iii) for this specific wavelet with <span><math><mrow><mi>k</mi><mo>=</mo><mn>1</mn></mrow></math></span> and <span><math><mrow><mi>μ</mi><mo>=</mo><mn>2</mn></mrow></math></span>, the operational matrix of integration for an arbitrary <span><math><mi>M</mi></math></span> is, to the best of our knowledge, developed and introduced here for the first time as a novel contribution to the existing framework. This matrix provides an effective tool for the accurate and efficient solution of Lane–Emden differential equations, as well as a wide class of related differential and integral equations, and it further offers significant potential for broader applications in applied mathematics and physics, (iv) its applicability to computational mathematics and astrophysics, where accurate and efficient solvers for Lane–Emden-type equations remain a central challenge. Numerical experiments and graphical comparisons with exact solutions confirm the effectiveness and reliability of the proposed approach. This study thus establishes pseudo-Chebyshev wavelets as a powerful new tool for spectral approximation and applied problem-solving.</div></div>","PeriodicalId":100554,"journal":{"name":"Franklin Open","volume":"14 ","pages":"Article 100459"},"PeriodicalIF":0.0,"publicationDate":"2026-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145885152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Franklin OpenPub Date : 2026-03-01Epub Date: 2025-12-15DOI: 10.1016/j.fraope.2025.100467
Walaa A. El-Sharkawy , Khalid Ul Islam Rather
{"title":"Novel flexible two-parameter sine modified Lindley distribution: Properties and application","authors":"Walaa A. El-Sharkawy , Khalid Ul Islam Rather","doi":"10.1016/j.fraope.2025.100467","DOIUrl":"10.1016/j.fraope.2025.100467","url":null,"abstract":"<div><div>In this paper, we introduce a two-parameter sine modified Lindley distribution derived as a special case of the sine-exp-G family. Some statistical properties of the proposed distribution, including the quantile function; linear representations of the cumulative distribution, probability density function, and survival function; moments; moment generating function; incomplete moments; and order statistics are investigated. Parameter estimation is studied using both the maximum likelihood and method of moments approaches under complete and type II censored samples. A Monte Carlo simulation is conducted to compare the performance of the obtained estimates. Finally, two real data sets are presented to demonstrate the distribution’s flexibility and its superiority compared to competing Lindley-based distributions.</div></div>","PeriodicalId":100554,"journal":{"name":"Franklin Open","volume":"14 ","pages":"Article 100467"},"PeriodicalIF":0.0,"publicationDate":"2026-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145885151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Franklin OpenPub Date : 2026-03-01Epub Date: 2025-12-13DOI: 10.1016/j.fraope.2025.100466
Ali kadhim Jasim , Fuqdan Abdul Fadil Al-ibeahimi , Hussein Alaa Alkaabi
{"title":"Explainable AI for SMS spam filtering: A novel hybrid architecture combining fuzzy logic and bidirectional LSTM networks","authors":"Ali kadhim Jasim , Fuqdan Abdul Fadil Al-ibeahimi , Hussein Alaa Alkaabi","doi":"10.1016/j.fraope.2025.100466","DOIUrl":"10.1016/j.fraope.2025.100466","url":null,"abstract":"<div><div>SMS spam filtering has become a critical application in modern telecommunications, where unsolicited and fraudulent text messages compromise user security, erode trust, and burden network resources. To address these challenges, this study proposes a novel hybrid architecture that integrates fuzzy logic with a bidirectional long short-term memory (BiLSTM) network to achieve high classification performance and transparent decision-making. The fuzzy logic module captures linguistic uncertainty using Gaussian membership functions, while the BiLSTM effectively models sequential dependencies in text. To further enhance interpretability, token-level attention highlights influential words, and rule-based explanations provide human-understandable justifications for each classification outcome. The proposed framework was evaluated on two benchmark datasets: the UCI SMS Spam Collection and the ExAIS_SMS dataset. Experimental results demonstrate strong performance, with accuracies of 99.4 % and 95.8 %, respectively, outperforming several baseline approaches. Notably, the model also achieves high discriminative capability, with AUC values of 0.994 and 0.980 across the two datasets. Beyond accuracy, the framework is computationally efficient, requiring <2.5 GB of memory and averaging under 7 ms per message during inference on a consumer-grade GPU. This ensures feasibility for real-time, large-scale deployment. By balancing accuracy, interpretability, and efficiency, the proposed fuzzy-deep hybrid approach offers a practical and trustworthy solution for SMS spam detection in telecom environments.</div></div>","PeriodicalId":100554,"journal":{"name":"Franklin Open","volume":"14 ","pages":"Article 100466"},"PeriodicalIF":0.0,"publicationDate":"2026-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145885255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Franklin OpenPub Date : 2026-03-01Epub Date: 2025-12-14DOI: 10.1016/j.fraope.2025.100470
R Sudha , M Premkumar
{"title":"Securing wireless sensor networks: A survey of challenges and innovations","authors":"R Sudha , M Premkumar","doi":"10.1016/j.fraope.2025.100470","DOIUrl":"10.1016/j.fraope.2025.100470","url":null,"abstract":"<div><div>WSNs are a significant component of the modern technology systems. They find application in numerous sectors such as environmental monitoring, health care, agriculture and intelligent constructions. Although they possess low power, have low processing capacity and can readily be influenced by unsafe environments, they are still very important. They are therefore usually the victims of various forms of security threats as a result of that. The more advanced these threats become, the higher is the need to have strong and flexible security measures. The survey examines a broad spectrum of studies on the security of WSN. It encompasses numerous fields, such as how to transmit data safely, how to deal with keys, trust and reputation management systems and how to check and authenticate users. It also considers novel concepts such as applying blockchain and machine learning to identify security problems. Some of the studies in the research are based on straightforward solutions that can be applied effectively with the available limited resources of WSNs, whereas others attempt to achieve the balance between security and efficiency. Despite these developments, there are issues. The solutions are mostly energy consuming or are rigid to adapt to changing network conditions. The disconnect between the concepts in studies and their practical implementation is also present, in particular, the use of complex technologies, such as AI, in practice. This review aims to unite significant conclusions of the recent research, to emphasize the main issues that are not resolved yet, and to propose the useful directions in the further investigations. This survey provides an up-to-date and clear image of the current trends in WSN security, as it allows the researcher and developers to develop more efficient and profound strategies on how to make the system stronger and more reliable.</div></div>","PeriodicalId":100554,"journal":{"name":"Franklin Open","volume":"14 ","pages":"Article 100470"},"PeriodicalIF":0.0,"publicationDate":"2026-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145798985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Franklin OpenPub Date : 2026-03-01Epub Date: 2025-12-17DOI: 10.1016/j.fraope.2025.100458
Kazi Hafizur Rahman , Chandra N. Podder
{"title":"Dynamic analysis of stochastic SE2I2T model with saturation incidence rate","authors":"Kazi Hafizur Rahman , Chandra N. Podder","doi":"10.1016/j.fraope.2025.100458","DOIUrl":"10.1016/j.fraope.2025.100458","url":null,"abstract":"<div><div>Tuberculosis (TB) remains one of the world’s deadliest infectious diseases, responsible for numerous deaths annually despite being preventable and treatable. In this paper, we propose and analyze a novel stochastic SE2I2T epidemiological model that accounts for two strains of tuberculosis (TB): drug-sensitive and drug-resistant under a saturation incidence rate. This model reflects realistic transmission dynamics by incorporating treatment inefficacy and environmental fluctuations modeled via Gaussian white noise. By creating an appropriate Lyapunov function, we first establish the existence of a unique global positive solution to the underlying problem. Sufficient conditions for extinction and persistence of the disease are investigated. Conditions for the existence of a stationary distribution is also found. The theoretical findings are then validated through numerical simulations using the Milstein scheme. Notably, the results indicate that higher noise intensities and reduced contact between treated individuals and drug-sensitive strains significantly increase the likelihood of disease eradication. Our threshold analysis reveals that increased environmental noise can drive the system toward extinction even in the presence of high transmission, while elevated resistance probabilities can undermine treatment success, leading to the persistence of the resistant strain.</div></div>","PeriodicalId":100554,"journal":{"name":"Franklin Open","volume":"14 ","pages":"Article 100458"},"PeriodicalIF":0.0,"publicationDate":"2026-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145885081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Franklin OpenPub Date : 2026-03-01Epub Date: 2026-01-09DOI: 10.1016/j.fraope.2026.100490
Simon Yusuf Enoch , Muhammad Lawan Jibril , Yusuf Musa Malgwi , Gregory Maksha Wajiga
{"title":"A comprehensive survey of applications, techniques, threats, and security countermeasures in smart farming","authors":"Simon Yusuf Enoch , Muhammad Lawan Jibril , Yusuf Musa Malgwi , Gregory Maksha Wajiga","doi":"10.1016/j.fraope.2026.100490","DOIUrl":"10.1016/j.fraope.2026.100490","url":null,"abstract":"<div><div>The technological breakthrough that smart farming has seen recently has greatly changed the ways and manners of work for all farmers. Modern technologies such as the Internet of Things (IoT), the Internet of Underground Things (IoUT), Unmanned Aerial Vehicles (UAV), Big Data Analytics, and Machine Learning techniques, <em>etc</em>, make farm operations happen at a rapid pace. However, there is a lack of a comprehensive survey that includes fundamental techniques, applications, security issues, security countermeasures, and the challenges of smart agriculture in the state-of-the-art literature. Consequently, there is a need for a paper that will provide a comprehensive survey of the techniques, applications, and challenges of smart farming, including security issues and their countermeasures. In this paper, we provide an in-depth survey of the techniques, applications, security, and countermeasures of smart agriculture, among others. This will provide a guide to identifying the different technologies for farmers to adopt. Besides, farmers will understand the security issues (such as data breaches, cyberattacks on IoT devices, and unauthorized system access that threaten the reliability of smart agricultural systems) of smart farming and how to mitigate them. In addition, it will provide a platform for identifying the directions for future research, especially for future commercial agricultural systems. The findings of this research offer valuable insights for multiple stakeholders. Farmers can use this study as a guide to adopting secure and efficient agricultural technologies, while researchers can leverage the identified gaps to develop enhanced security frameworks and innovative solutions. Furthermore, this paper outlines future directions for smart farming, emphasizing the importance of cybersecurity, sustainable technology integration, and policy development to support agricultural digitization. By addressing these critical aspects, our research aims to contribute to a safer and more resilient smart farming ecosystem.</div></div>","PeriodicalId":100554,"journal":{"name":"Franklin Open","volume":"14 ","pages":"Article 100490"},"PeriodicalIF":0.0,"publicationDate":"2026-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145977468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}