{"title":"Optimisation decision of machining process parameters considering milling energy consumption and specific cutting energy","authors":"Yang Xie , Shulong Mei , Chaoyong Zhang","doi":"10.1016/j.aej.2025.07.034","DOIUrl":"10.1016/j.aej.2025.07.034","url":null,"abstract":"<div><div>To address the challenges of high energy consumption and specific cutting energy in CNC milling operations, this study proposes a predictive–optimization integrated framework for multi-objective process parameter optimization. A high-fidelity energy-efficiency prediction model is first established by combining the Whale Optimization Algorithm (WOA) with a Backpropagation Neural Network (BP), enabling accurate estimation of milling power and specific cutting energy based on spindle speed, feed rate, depth of cut, and milling width. On this basis, a multi-objective optimization scheme is developed using the second-generation Non-dominated Sorting Genetic Algorithm (NSGA-II), targeting the simultaneous minimization of the two energy indicators. The entropy-weighted TOPSIS method is subsequently employed to rank the Pareto-optimal solutions and determine the most favorable parameter combination. Experimental validation demonstrates that the optimized parameters result in reductions of 12.33 % in milling power and 20.01 % in specific cutting energy compared to empirical settings. The proposed method not only realizes the synergistic optimization of energy-related objectives but also demonstrates the effectiveness and robustness of WOA-BP and NSGA-II in addressing complex process optimization problems, offering a promising approach to support energy-efficient and sustainable CNC milling.</div></div>","PeriodicalId":7484,"journal":{"name":"alexandria engineering journal","volume":"128 ","pages":"Pages 786-795"},"PeriodicalIF":6.8,"publicationDate":"2025-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144739607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rakesh Kumar Mahendran , Arafat Khan , Fasee Ullah , Farman Ali , Ahmad Ali AlZubi
{"title":"PRISM-IIoT: A holistic approach for privacy preservation in industrial IoT using advanced cryptography and blockchain-enabled auditability framework","authors":"Rakesh Kumar Mahendran , Arafat Khan , Fasee Ullah , Farman Ali , Ahmad Ali AlZubi","doi":"10.1016/j.aej.2025.07.027","DOIUrl":"10.1016/j.aej.2025.07.027","url":null,"abstract":"<div><div>Security in Industrial IoT (IIoT) is paramount, as the interconnected nature of devices, systems, and processes introduces significant vulnerabilities to cyber threats. The importance of secure IIoT lies in safeguarding sensitive data, ensuring operational continuity, and protecting critical infrastructure in sectors like manufacturing, healthcare, and energy. Existing works, while addressing aspects such as encryption, authentication, and intrusion detection, exhibit limitations including high computational overhead, centralized vulnerabilities, limited adaptability, and scalability challenges. To address these issues, we propose a comprehensive privacy-preservation model for Industrial IoT (IIoT) environments, named PRISM-IIoT (Privacy-preservation, Reliable Intrusion detection, Secure transmission, and auditable Mechanism for Industrial IoT). PRISM-IIoT ensures secure data transmission using a New Lightweight Cryptographic Algorithm (LiCrypyt) (designed for cloud applications, employing a 128-bit block cipher with efficient logical operations for enhanced encryption complexity. A novel authentication mechanism enables fine-grained access control and device verification. Real-time intrusion detection is achieved through Cascaded Deep Learning CasDL), offering high accuracy against evolving threats. Additionally, an incentive mechanism-based blockchain supports secure data usage, traceability, and regulatory compliance by maintaining an immutable ledger of access and usage activities. The model combines cryptography, authentication, threat detection, and blockchain-enabled auditability into a scalable and adaptable system with flexible key lengths and encryption rounds. By addressing existing limitations, PRISM-IIoT ensures confidentiality, integrity, and auditability, providing a holistic solution to IIoT privacy and security challenges while maintaining operational efficiency and scalability.</div></div>","PeriodicalId":7484,"journal":{"name":"alexandria engineering journal","volume":"128 ","pages":"Pages 816-832"},"PeriodicalIF":6.8,"publicationDate":"2025-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144750108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rujie Zhang , Jianwei Wang , Haijiang Li , Xinhua Mao
{"title":"A comprehensive review of semantic web technologies supported life cycle management for road infrastructures","authors":"Rujie Zhang , Jianwei Wang , Haijiang Li , Xinhua Mao","doi":"10.1016/j.aej.2025.07.037","DOIUrl":"10.1016/j.aej.2025.07.037","url":null,"abstract":"<div><div>Aiming at a comprehensive understanding of semantic web technologies in enhancing digital intelligence of road infrastructure, 141 papers were selected for scientometric analysis and critical review. Research trends were visualized through co-authorship, co-citation, and co-word analyses, while critical reviews identified themes and limitations. Publication trends revealed growth peaks in 2016 and 2021 and shift toward journal-dominated outputs signaling maturation from exploratory methodologies to robust theoretical frameworks and practical validations. Co-authorship analysis revealed growing engineering-computer science collaborations, while co-citation analysis stressed foundational ontology methodologies. Keyword analysis identified essential themes including building information modeling, digital twins, and deep learning. Data exchange and semantic integration, knowledge management, and reasoning and simple querying were identified pivotal roles of semantic web technologies in road infrastructure. Subsequently, a preliminary framework was proposed synthesizing core components and key processes. Five limitations were identified: lack of comprehensive guiding framework and ontology development protocols; limited information integration and synchronization; insufficient automation; and weak capacity of logical inference and decision support. This paper contributes to the current knowledge body by providing insights into how semantic web technologies support the management of road infrastructures throughout life cycle and addressing concerns and limitations faced therein to offer suggestions for future advancement.</div></div>","PeriodicalId":7484,"journal":{"name":"alexandria engineering journal","volume":"128 ","pages":"Pages 796-815"},"PeriodicalIF":6.8,"publicationDate":"2025-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144750106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
VK Ashwin Karthik , GC Kamaleshwar , A Saravana Kumar , Sandeep Krishna V , Sanjith Ram V , Yogesh P , SM Verappan , A Prathiba
{"title":"Tower field construction of power attack resistant 4 × 4 substitutions in lightweight SPN ciphers for implantable medical devices","authors":"VK Ashwin Karthik , GC Kamaleshwar , A Saravana Kumar , Sandeep Krishna V , Sanjith Ram V , Yogesh P , SM Verappan , A Prathiba","doi":"10.1016/j.aej.2025.07.030","DOIUrl":"10.1016/j.aej.2025.07.030","url":null,"abstract":"<div><div>This paper introduces the design of a masked 4 × 4 S-box over a finite field using a polynomial basis to enhance resilience against Power Analysis Attacks (PAA). It unveils an additive-masked lightweight S-box tailored for the SPN-64/128 cipher engine, specifically designed to counteract side-channel power attacks. The proposed design represents the first masked nibble-sized finite field S-box, incorporating an optimized affine transformation that minimizes the XOR gate count for a compact design and low Transparency Order (TO), thereby enhancing resistance to PAA. The masking technique employed strengthens security by randomizing power consumption patterns of the non-linear inverse operations. This innovative S-box design achieves reduced area occupancy, ranging from 2 × to 11 × less than existing masked lightweight S-box implementations. Further, it reduces area overhead by 40 % compared to round-based lightweight cipher architectures employing multi-share Threshold Implementation (TI) techniques. The paper also details a streamlined mask removal process for efficient decryption, enabling secure encryption and decryption. This work sets a new benchmark for integrating effective masking techniques in real-world applications including sensitive systems like Implantable Medical Devices (e.g., pacemakers) which are particularly vulnerable to PAA, a cost-effective and non-invasive threat to Integrated Circuits (ICs).</div></div>","PeriodicalId":7484,"journal":{"name":"alexandria engineering journal","volume":"128 ","pages":"Pages 767-785"},"PeriodicalIF":6.8,"publicationDate":"2025-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144722964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Urban identity: A bibliometric review, 1969–2024","authors":"Zaker Alesaily , Ahmed Albialy","doi":"10.1016/j.aej.2025.07.016","DOIUrl":"10.1016/j.aej.2025.07.016","url":null,"abstract":"<div><div>Urban identity has global, national, local, and spatial dimensions, and its concept is multifaceted, including landmarks, history, heritage, culture, language, memory, and music. There is only one comprehensive review of urban identity, and it does not cover all aspects. As a result, the authors conducted a bibliometric review, which included documents from the most important scientific classifications between 1969 and 2024. It identified research trends and their evolution; collaboration networks for leading organizations, authors, and countries in the field; and influential citations for authors, journals, and key documents. The study focused on the works that established the intellectual structure, created the conceptual framework for identity, and identified future research gaps and potential directions. The analysis of the conceptual structure yielded four main groups: first, \"identity, globalization, culture, and migration\"; second, \"urban identity, public spaces, cities, and architecture\"; third, \"local identity, cultural heritage, and tourism\"; and fourth, \"place identity and space.\" The findings indicate that future research should focus on connecting artificial intelligence technologies to identity issues, as well as the importance of classification research. The study concludes with practical contributions for decision-makers and policymakers. It also includes a valuable reference for planners, architects, and specialized arts.</div></div>","PeriodicalId":7484,"journal":{"name":"alexandria engineering journal","volume":"128 ","pages":"Pages 724-746"},"PeriodicalIF":6.8,"publicationDate":"2025-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144721318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Usman Shehzad , Samina Batul , Dur-e-Shehwar Sagheer , Hassen Aydi , Ahmed Al Rawashdeh
{"title":"Existence of solutions to integral and fractional differential equations via common fixed points of extended contractions","authors":"Usman Shehzad , Samina Batul , Dur-e-Shehwar Sagheer , Hassen Aydi , Ahmed Al Rawashdeh","doi":"10.1016/j.aej.2025.07.007","DOIUrl":"10.1016/j.aej.2025.07.007","url":null,"abstract":"<div><div>Our research develops innovative fixed point results for coupled <span><math><mi>α</mi></math></span>-dominated multivalued, orbitally lower semi-continuous mappings in orbital controlled metric spaces. The task is achieved by further introducing an extended rational type advanced Nashine–Wardowski–Feng–Liu-type contraction. Moreover, we establish new fixed point results for two <span><math><mi>α</mi></math></span>-dominated multivalued maps in ordered orbitally complete controlled metric spaces. The main contributions include new common fixed point theorems that generalize prior findings by accommodating wider classes of mappings and spaces. Our findings are substantiated by illustrative examples and applied to demonstrate the existence of solutions to nonlinear Volterra-type integral equations and fractional differential equations. The novelty of our approach lies in utilizing extended rational type advanced Nashine–Wardowski–Feng–Liu contractions and orbitally complete controlled metric spaces, which make the results more widely applicable than previous results.</div></div>","PeriodicalId":7484,"journal":{"name":"alexandria engineering journal","volume":"128 ","pages":"Pages 711-723"},"PeriodicalIF":6.8,"publicationDate":"2025-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144721317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bayesian parameter estimation and failure time prediction under double Type-II hybrid censoring for the generalized inverse exponential distribution","authors":"Shi Wei, Guoyuan He, Dalong Mo","doi":"10.1016/j.aej.2025.07.025","DOIUrl":"10.1016/j.aej.2025.07.025","url":null,"abstract":"<div><div>This study examines parameter estimation and failure time prediction for products following the Generalized Inverse Exponential Distribution (GIED) under double Type-II hybrid censored data. We derive maximum likelihood estimates for parameters and compute Bayesian estimates and E-Bayesian estimates under four loss functions (symmetric and asymmetric). The asymptotic properties of these estimators are established. For failure time prediction, conditional median and Bayesian methods are used to generate point and interval predictions. Monte Carlo simulations compare the performance of maximum likelihood estimates, Bayesian estimates, and E-Bayesian estimates, benchmarked against least squares estimation. Results show that E-Bayesian estimates outperform Bayesian methods by reducing hyperparameter sensitivity, especially in small samples. The framework remains robust under prior mis-specification or deviations from GIED assumptions. Two real-world datasets validate the accuracy of the proposed methods, with predicted failure times and intervals aligning closely with observations.</div></div>","PeriodicalId":7484,"journal":{"name":"alexandria engineering journal","volume":"128 ","pages":"Pages 747-766"},"PeriodicalIF":6.8,"publicationDate":"2025-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144722966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel analytical approach based on graphene-silver nanocomposites for monitoring lung cancer biomarkers in biological fluids","authors":"Wen Dong , Rong Xie , Nan Yang , Shengming Liu","doi":"10.1016/j.aej.2024.10.024","DOIUrl":"10.1016/j.aej.2024.10.024","url":null,"abstract":"<div><div>In this work, we present a novel microfluidic immunosensor for the detection of the lung cancer biomarker epithelial cell adhesion molecule (EpCAM). This sensor leverages the unique properties of graphene oxide (GO), silver nanoparticles (Ag NPs), and their composite (Ag NPs@GO) to achieve enhanced sensitivity and specificity. Ag NPs@GO composite is a sensitive and reasonably priced lung cancer biomarker sensor, and its integration into this sensor is innovative. This represents a major breakthrough in the field of biosensors for cancer detection. By acting as catalysts, the Ag NPs boost the electrochemical signal and enhance the sensor's functionality. The sensor shows a linear range of 0.005–100 pg/mL and a detection limit of 1.12 pg/mL, outperforming commercial ELISA (6.03 pg/mL). It demonstrates excellent sensitivity and specificity for EpCAM detection, with a relative standard deviation of less than 5 % for tampered blood samples, indicating good repeatability. Additionally, the sensor successfully identified circulating tumor cells (CTCs) in lung cancer patients’ blood samples, showing a strong correlation between CTC count and EpCAM concentration. These findings suggest that the microfluidic immunosensor could be a powerful tool for lung cancer surveillance and early diagnosis.</div></div>","PeriodicalId":7484,"journal":{"name":"alexandria engineering journal","volume":"128 ","pages":"Pages 699-710"},"PeriodicalIF":6.8,"publicationDate":"2025-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144721316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Retraction notice to \"Computational and numerical solutions to the Benney–Luke equation: Insights into nonlinear long wave dynamics in dispersive media\" [Alex. Eng. J. 110 (2025) 53–63]","authors":"Mostafa M.A. Khater","doi":"10.1016/j.aej.2025.07.017","DOIUrl":"10.1016/j.aej.2025.07.017","url":null,"abstract":"","PeriodicalId":7484,"journal":{"name":"alexandria engineering journal","volume":"128 ","pages":"Page 697"},"PeriodicalIF":6.2,"publicationDate":"2025-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144704520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}