{"title":"Identifiability analysis of an HIV-Ebola co-infection using the mathematical model and the MLE method","authors":"Muhammad Said , Yunil Roh , Il Hyo Jung","doi":"10.1016/j.aej.2025.03.135","DOIUrl":"10.1016/j.aej.2025.03.135","url":null,"abstract":"<div><div>In this paper, we develop a mathematical model to analyze the identifiability of HIV-Ebola co-infection using the maximum likelihood method. By analyzing real-world data, this research assesses the accuracy of parameter estimation in the epidemic model. We consider various epidemiological factors, including disease transmission, progression, mortality, and recovery rates, to evaluate the model’s identifiability. The maximum likelihood estimation (MLE) method is applied to estimate the parameters, utilizing the Fisher Information Matrix for structural identifiability and profile likelihood analysis for practical identifiability to assess the reliability of the estimated parameters. The results demonstrate that Ebola has a high transmission rate and rapid disease progression, emphasizing the urgent need for prompt and vigorous public health interventions during outbreaks. However, HIV’s gradual spread and chronic nature highlight the importance of ongoing work in preventive and treatment techniques. The nature of co-infection shows synergistic effects, in which the presence of one virus increases susceptibility to the other, thereby aggravating health consequences. The results will help improve knowledge of the co-infection patterns among HIV and EVD, lead future research, and assist in evidence-based decision-making for public health interventions aimed at co-infected individuals.</div></div>","PeriodicalId":7484,"journal":{"name":"alexandria engineering journal","volume":"125 ","pages":"Pages 245-255"},"PeriodicalIF":6.2,"publicationDate":"2025-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143838804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deepfake video detection methods, approaches, and challenges","authors":"Mubarak Alrashoud","doi":"10.1016/j.aej.2025.04.007","DOIUrl":"10.1016/j.aej.2025.04.007","url":null,"abstract":"<div><div>Deepfake technology creates highly realistic manipulated videos using deep learning models, which makes distinguishing between authentic and fake content extremely difficult. This technology can negatively affect society by breaching privacy and spreading misinformation. This paper presents a comprehensive survey of the recent deepfake video detection approaches and methods. Each deepfake video method is analyzed according to its ability to generalize diverse deepfake fabrication techniques and real-world scenes. We reviewed around 103 articles which eventually shrunk down to 73 based on the screening criteria like abstract/title/irrelevant focus/duplication. The study primarily covers audio-based, visual-based, and multi-modal detection methods. Also, it discusses the usage of Convolutional Neural Networks (CNNs), frequency-domain analysis, and audio-visual synchronization in deepfake video detection and evaluates the strengths and shortcomings of these techniques. Moreover, the study explores major issues such as low resolution, video compression, and adversarial attacks, which prove to be a barrier to making deepfake video detection processes robust. By connecting findings from numerous studies, this research draws attention to the development of standard benchmarking SOPs and multi-modal detection techniques to improve detection performance.</div></div>","PeriodicalId":7484,"journal":{"name":"alexandria engineering journal","volume":"125 ","pages":"Pages 265-277"},"PeriodicalIF":6.2,"publicationDate":"2025-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143834684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pingping Fu , Honghao Yang , Wenhao Qian , ELsiddig Idriss Mohamed , Wafa Ali J. Almohri , Huda M. Alshanbari
{"title":"Financial engineering and the digital economy: The implementations of machine learning algorithms","authors":"Pingping Fu , Honghao Yang , Wenhao Qian , ELsiddig Idriss Mohamed , Wafa Ali J. Almohri , Huda M. Alshanbari","doi":"10.1016/j.aej.2025.03.122","DOIUrl":"10.1016/j.aej.2025.03.122","url":null,"abstract":"<div><div>The digital economy is quickly expanding, particularly in developing nations, as digital technologies are widely adopted. These technologies are revolutionizing many sectors, accelerating digitization throughout industries. The digital economy seeks to increase economic productivity and innovation by exploiting digital data, information, and communication technology. Within the area of digital currencies, bitcoin has developed as a significant subgroup. Its quick growth and adoption have had a profound impact on financial markets around the world. The purpose of this study is to forecast financial market trends by considering variables like bitcoin prices, coal pricing, hydroelectric power, and thermal energy. The timeframe of our study includes monthly data during the period from February 2016 to March 2024. The study utilizes comprehensive tools that integrate machine learning (ML) techniques with classical time series models. By applying such sophisticated tools, we aim to deliver forecasts that are both accurate and actionable, thereby empowering stakeholders to make informed decisions in increasingly digital and interconnected economy. The empirical results indicate that ANN outperforms other models, achieving the lowest RMSE (0.339) and MAE (0.271), making it the most accurate for predicting the Pakistan stock market. These findings highlight the potential of advanced ML models in financial forecasting.</div></div>","PeriodicalId":7484,"journal":{"name":"alexandria engineering journal","volume":"125 ","pages":"Pages 311-319"},"PeriodicalIF":6.2,"publicationDate":"2025-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143838805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sanaullah Saqib , Yin-Tzer Shih , Muhammad Wajahat Anjum , Mutasem Z. Bani-Fwaz , Adnan
{"title":"AI driven RNN approach for investigation of thermal features in magneto-radiative nanofluid under random microbial movement","authors":"Sanaullah Saqib , Yin-Tzer Shih , Muhammad Wajahat Anjum , Mutasem Z. Bani-Fwaz , Adnan","doi":"10.1016/j.aej.2025.04.036","DOIUrl":"10.1016/j.aej.2025.04.036","url":null,"abstract":"<div><div>Recurrent neural network (RNN) applications in fluid dynamics have transformed the field by making it possible to model complex fluid behaviors with previously unattainable accuracy, thereby significantly improving the ability to forecast. Recurrent Neural Networks (RNN) has been employed as an AI tool to study thermal radiation in the MHD flow of gyrotactic organisms with nanoparticles and velocity slips. This investigation reports the bioconvective-MHD inspired flow of Casson fluid under certain physical effects. The model discussed through RNN approach. Different scenarios are examined to investigate how convergence parameters affect chemical reactions and heat generation/absorption. The significant results for thermal radiations, MHD and slip effects are analyzed. The Bvp4c approach is used to solve the transformed ODEs computationally. The synthetic datasets are obtained using mathematical simulation of the bvp4c numerical approach for TR-MHD-FGONV. Then, the supervised computing RNN approach is applied to the synthetic datasets for every model variant; the RNN findings exhibit tiny errors and closely match numerical observations. The effectuality of RNNs is meticulously proven through holistic experiments, validating iterative convergence rates for mean squared error (MSE), optimization controlling measurements, and error distribution using histograms. The fundamental consequence illustrates the contribution of the various parameters to the fluid's flow.</div></div>","PeriodicalId":7484,"journal":{"name":"alexandria engineering journal","volume":"125 ","pages":"Pages 152-166"},"PeriodicalIF":6.2,"publicationDate":"2025-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143834818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Majeed Ahmad Yousif , Dumitru Baleanu , Mohamed Abdelwahed , Shrooq Mohammed Azzo , Pshtiwan Othman Mohammed
{"title":"Finite difference β-fractional approach for solving the time-fractional FitzHugh–Nagumo equation","authors":"Majeed Ahmad Yousif , Dumitru Baleanu , Mohamed Abdelwahed , Shrooq Mohammed Azzo , Pshtiwan Othman Mohammed","doi":"10.1016/j.aej.2025.04.035","DOIUrl":"10.1016/j.aej.2025.04.035","url":null,"abstract":"<div><div>This study presents a numerical approach for addressing the time-fractional FitzHugh–Nagumo (TFFHN) equation, a key equation in physics. The method integrates <span><math><mi>β</mi></math></span>-fractional derivatives s with the finite difference technique. Stability analysis confirms that the proposed method is conditionally stable. Numerical experiments demonstrate its effectiveness, outperforming the cubic B-spline method regarding norm errors. The experimental order of convergence is also presented, highlighting the accuracy and efficiency of the approach, and emphasizing its potential for solving time-fractional differential equations across various physical applications.</div></div>","PeriodicalId":7484,"journal":{"name":"alexandria engineering journal","volume":"125 ","pages":"Pages 127-132"},"PeriodicalIF":6.2,"publicationDate":"2025-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143834816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deep neural network-based music user preference modeling, accurate recommendation, and IoT-enabled personalization","authors":"Jing Lin , Siyang Huang , Yujun Zhang","doi":"10.1016/j.aej.2025.03.057","DOIUrl":"10.1016/j.aej.2025.03.057","url":null,"abstract":"<div><div>With the popularity of personalized recommendation systems, how to better satisfy users’ emotional needs has become a key issue in the recommendation field, especially in the Internet of Things environment, where real-time access to users’ emotional data brings new challenges to recommendation systems. Existing recommendation methods primarily depend on users’ historical behavior or content-based features. However, they often overlook the impact of emotional states on recommendation effectiveness, which limits the adaptability and personalization of traditional systems. To solve this problem, this study proposes an emotional music recommendation system based on deep neural networks, which combines emotion modeling and hybrid recommendation strategies to provide more accurate recommendations. By combining user emotion data and music emotion features acquired by IoT devices in real time, our model can adjust the recommended content in real time, which significantly improves the emotion matching and recommendation accuracy. Experimental results demonstrate that the hybrid recommendation model significantly outperforms traditional content-based filtering (CBF) and collaborative filtering (CF) methods across multiple evaluation metrics, particularly in emotion matching (0.82) and recommendation accuracy (0.83). This study provides new ideas for emotion-driven personalized recommendation and technical support for future implementation of emotional recommendation systems in IoT environments.</div></div>","PeriodicalId":7484,"journal":{"name":"alexandria engineering journal","volume":"125 ","pages":"Pages 232-244"},"PeriodicalIF":6.2,"publicationDate":"2025-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143834683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sajjad Shaukat Jamal , Rashad Ali , Muhammad Kamran Jamil , Sameer Abdullah Nooh , Fahad Alblehai , Gulraiz
{"title":"Secure S-box construction with 1D chaotic maps and finite field theory for block cipher encryption","authors":"Sajjad Shaukat Jamal , Rashad Ali , Muhammad Kamran Jamil , Sameer Abdullah Nooh , Fahad Alblehai , Gulraiz","doi":"10.1016/j.aej.2025.03.109","DOIUrl":"10.1016/j.aej.2025.03.109","url":null,"abstract":"<div><div>Information security studies are crucial for the digital era since technology advances quickly. Cryptography is essential for maintaining data secrecy, integrity, and authentication. The substitution box (S-box) is a key consideration when designing block ciphers. The S-box improves cryptographic security by introducing nonlinearity and confusion into the encryption process. This approach defends against cryptanalytic attacks such as differential and linear cryptanalysis by altering input data in an unexpected and complex way. Existing S-box systems feature flaws such as fixed and reverse fixed points and short-period rings. This work provides a rigorous design technique that meets S-box performance and security requirements. The paper offers a unique 1D hybrid chaotic map, which is then used to build an S-box design with finite fields of degree 4 and 8. A simple algorithm is created to eliminate potential flaws in the proposed method. The suggested approach generates <span><math><mrow><mn>6</mn><mo>.</mo><mn>6446</mn><mo>×</mo><mn>1</mn><msup><mrow><mn>0</mn></mrow><mrow><mn>40</mn></mrow></msup></mrow></math></span> strong S-boxes with an average nonlinearity of more than 111.5. The numerical findings show that the recommended S-boxes surpass earlier designs in the literature. The article also includes an image encryption approach utilizing S-boxes. Finally, we believe that the strategy for developing long-lasting and reliable s-box solutions for block cipher systems contributes significantly to subsequent studies on architectural principles.</div></div>","PeriodicalId":7484,"journal":{"name":"alexandria engineering journal","volume":"125 ","pages":"Pages 278-296"},"PeriodicalIF":6.2,"publicationDate":"2025-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143834685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bayesian inference for the Rayleigh distribution using ordered extreme k-records ranked set sampling with random sample sizes","authors":"Haidy A. Newer , Bader S Alanazi","doi":"10.1016/j.aej.2025.03.081","DOIUrl":"10.1016/j.aej.2025.03.081","url":null,"abstract":"<div><div>This study presents an enhanced framework for statistical inference and prediction of the Rayleigh distribution using ordered extreme k-records ranked set sampling with both fixed and random sample sizes. We employ Bayesian methodologies to estimate the unknown parameter and develop predictive estimates under type II censoring, evaluating performance across three loss functions: Al-Bayyati, general entropy, and squared error. The approach extends to interval estimation via Bayesian probability intervals and highest posterior density intervals, as well as predictive frameworks for both point and interval forecasts. To validate our theoretical framework, we conduct extensive Monte Carlo simulations to evaluate the precision of our estimates and the reliability of confidence intervals. The practical applicability of these methodologies is demonstrated through their application to two empirical datasets, providing tangible evidence of their effectiveness in real-data scenarios.</div></div>","PeriodicalId":7484,"journal":{"name":"alexandria engineering journal","volume":"125 ","pages":"Pages 214-231"},"PeriodicalIF":6.2,"publicationDate":"2025-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143834682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Effect of variable viscosity and wall porosity on the transport of chemically active solute in a three-layered blood flow model","authors":"Ajith M. , Sachin Shaw , Sudip Debnath","doi":"10.1016/j.aej.2025.03.128","DOIUrl":"10.1016/j.aej.2025.03.128","url":null,"abstract":"<div><div>The rheology of blood flow is more complex in microvessels. Because of the accumulation of blood cells (RBCs) at the center of the axis, it behaves as Casson fluid in the core region, while in the absence of blood particles, it behaves as a Newtonian fluid in the outer region. Beyond the clear region, close to the artery, a peripheral region (porous region) is observed. The study plans to understand the effect of variable viscosity, wall porosity, and irreversible absorptive type of reaction (at the tube wall) on solute dispersion through a narrow tube with a three-layered blood flow model. Governing equations are solved analytically, and the dispersion of solute clouds is explained with the help of transport coefficients (exchange coefficient, advection coefficient, and dispersion coefficient), mean concentration, and two-dimensional distribution of solute concentration. The exchange coefficient is solely dependent on the wall absorption rate. The advection coefficient is largely influenced by yield stress, viscosity parameter, viscosity index, viscosity ratio, stress jump factor, permeability parameter, and absorption rate. The axial dispersion coefficient is primarily governed by yield stress, absorption rate, and viscosity parameters, though it is also weakly influenced by the viscosity index, stress jump factor, and permeability parameter.</div></div>","PeriodicalId":7484,"journal":{"name":"alexandria engineering journal","volume":"125 ","pages":"Pages 198-213"},"PeriodicalIF":6.2,"publicationDate":"2025-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143834633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ayman E. Khedr , Mostafa M. Abdel-Aziz , Faisal S. Alsubaei , Mohamed Meselhy Eltoukhy , Khalid M. Hosny
{"title":"Securing color medical images using data hiding method based on modified Octa-PVD and hyperchaotic system","authors":"Ayman E. Khedr , Mostafa M. Abdel-Aziz , Faisal S. Alsubaei , Mohamed Meselhy Eltoukhy , Khalid M. Hosny","doi":"10.1016/j.aej.2025.04.025","DOIUrl":"10.1016/j.aej.2025.04.025","url":null,"abstract":"<div><div>This paper proposes an enhanced data-hiding method using PVD that combines LSB and a hyperchaotic system to embed textual data inside a color medical image without causing any observable image distortions. We first select the host color image and then compress it by leveraging the rapid and an effective vector quantization (VQ) method to ensure relevance and fidelity during the data-hiding process. Based on the joint permutation and diffusion (JPD) system, a hyperchaotic system encrypts the compressed image blocks to safeguard the concealed image data from unauthorized access during the data-hiding process. The LSB replacement conceals the text data within the transformed central pixel blocks. Afterward, determine directly the following outer pixels for embedding using Octa-PVD for each direction where the values of branch conditions (BCs) are smaller. Otherwise, it uses LSB insertion. The secret message is extracted directly from the stego image without referencing the host image, which preserves the stego image's quality and reduces extraction time. The experimental results demonstrate that the proposed method outperforms traditional PVD and multidimensional PVD-based methods. It has significantly higher PSNR and SSIM values and RS and PDH exhibiting resilience against.</div></div>","PeriodicalId":7484,"journal":{"name":"alexandria engineering journal","volume":"125 ","pages":"Pages 133-151"},"PeriodicalIF":6.2,"publicationDate":"2025-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143834817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}