IJLRET provides individual hard copy of certificates to all authors after online publication. w.e.f. 01/11/2015
Log in || Register editor@ijlret.com
IJLRET Menu

Vol. 11, No. 07 [July 2025]


Paper Title :: Optimizing Machine Tool Assembly Stiffness Using CAE-Based Analysis and Simulation
Author Name :: Ravi Kumar L || Nagesh N2, K Ganesh
Country :: India
Page Number :: 01-11
Machine tool manufacturers are working hard to keep their competitive advantage in the current unstable economy and global marketing environment by creating creative designs that meet the demands of modern production, such as high precision, accuracy, and dependability. Therefore, the construction of machine tool structures is crucial since they have a direct impact on the factors that determine a machine's capability, motion accuracy, productivity, and machining quality. By building the structure with the ideal amount of static and dynamic stiffness, this can be accomplished. Nowadays, when developing machine structural components, the goal is to minimize the weight of the machine structure while maintaining the appropriate threshold values for both static and dynamic mechanical qualities. Finite Element Analysis is a technique used to do this.
In the present study structural analysis of the Double Column Vertical Machining Centre is carried out using Cosmo works software. The analysis involves static deformations and strain in structure that is bearing the static forces and design solutions are proposed to optimize the machine structure with maximum deformation in order to have optimum static stiffness, so that balance between productivity and accuracy is achieved. Stiffness of the machine structure for static loads is evaluated by modelling the columns, cross-beam, and cross-slide and ram assembly. Percentage contribution of all the structural members towards the overall deflection at the tool tip is determined. Ram is found to be the important member contributing to the overall deflection at tool tip.
Hence detailed analysis of the ram carried out. Various design alternatives are studied to optimize the ram with the objective of increasing its stiffness with minimum weight addition or maintaining same weight w.r.t existing ram and decreasing the tool point deflection which in turn increases the stiffness of machine.
Keywords: VMC, steel, Ductile cast-iron, Cosmos, software and optimization
[1]. Y. Atlantis, C. Brecher, M. Weck, S. Witt, Virtual machine tool technology, proc 25th MTDR, 2008.
[2]. D. Spath, W. Neithardt, C. Bangert, he structural optimization of micro milling machine, Machines and Mechanism ,1999.
[3]. A. Cowley and S. Hinduja, Finite Element method for analysis of machine tool structures, proc 10th conf 1969.
[4]. A. C. Stepehen and S. Taylor, Computer analysis of machine tool structure by Finite Element Method. proc 5th Machine Tool Design and research conference 1965.
[5]. Masamitsu Nakminami, Tsutomu Tokuma, Kazuhiko Matsumoto and Keiichi Nakamoto, the design methodology for compound multiaxis machine tools, proc15th, machine tool design and research conference 1999.

 

Paper Title :: Selecting Storage Infrastructure for Distinct Stages of the AI Machine-Learning Pipeline
Author Name :: Megha Aggarwal
Country :: USA
Page Number :: 12-16
The study analyzes the characteristics of selecting data storage infrastructure for individual stages of the AI machine learning pipeline. The necessity of this analysis is driven by the intensive accumulation of data and the increasing complexity of artificial intelligence (AI) models, which impose fundamentally new requirements on storage systems; without proper adaptation, a critical bottleneck emerges: costly compute resources remain idle, time-to-market for ML solutions is extended, and the total cost of ownership of the infrastructure grows. The research aims to analyze the features inherent in the process of selecting infrastructure for data storage at the individual stages of the AI machine learning pipeline. As a methodological basis, a comprehensive analysis of scientific publications in the relevant field was employed. The study's result is a unified decision-making model that maps workload profiles to specific storage classes and configurations, optimizing the choice among object, block, and file systems. Key evaluation criteria include performance, manageability, compatibility with GPU accelerators, fault tolerance, and cost efficiency. The presented materials will be of interest to infrastructure engineers, MLOps specialists, and AI researchers seeking to improve efficiency and reduce costs across the entire model lifecycle.
Keywords: storage infrastructure, machine learning, ML pipeline, AI storage, storage performance, IOPS, AWS EBS, data preparation, model training, inference.
[1]. Chan, K. T. (2022). Emergence of the "digitalized self" in the age of digitalization. Computers in Human Behavior Reports, 6, 100191. https://doi.org/10.1016/j.chbr.2022.100191
[2]. Lee, S., et al. (2024). Check-QZP: A lightweight checkpoint mechanism for deep learning frameworks. Applied Sciences, 14(19), Article 8848. https://doi.org/10.3390/app14198848
[3]. Amazon Web Services. (2023). Architecting scalable checkpoint storage for large-scale ML training on AWS. AWS Storage Blog. Retrieved from https://aws.amazon.com/blogs/storage/architecting-scalable-checkpoint-storage-for-large-scale-ml-training-on-aws/ (date accessed: 18.05.2025).
[4]. Serverion. (2025). Top 7 storage solutions for low-latency AI workloads [Blog post]. Serverion Blog. Retrieved from https://www.serverion.com/uncategorized/top-7-storage-solutions-for-low-latency-ai-workloads/ (date accessed: 20.05.2025).
[5]. ISG. (2025). AI-powered cost optimization: How smart companies are slashing expenses and boosting efficiency in 2025. ISG. Retrieved from https://isg-one.com/articles/ai-powered-cost-optimization--how-smart-companies-are-slashing-expenses-and-boosting-efficiency-in-2025 (date accessed: 10.06.2025).

 

Paper Title :: A Solution to Nonlinear Ordinary Differential Equations using the Adomian Decomposition Method and the ZJ Transform
Author Name :: M. Sc. Zenteno Jiménez José Roberto
Country :: México
Page Number :: 17-26
In this article, we will explore the Adomian Decomposition Method, its theoretical foundation, and the computation of Adomian polynomials. Furthermore, we will investigate the application of the ZJ transform in conjunction with MDA for the solution of first- and second-order nonlinear ODEs. Through illustrative examples, we will analyze the effectiveness and potential of this hybrid approach for obtaining approximate analytical solutions to relevant nonlinear problems.
Keywords: ZJ transform, Laplace transform, Adomian decomposition method, Adomianpolynomials, Nonlinear differential equations, Series
[1]. Adomian, G. (1988). Nonlinear stochastic operator equations. Academic Press. (Aunque se enfoca en ecuaciones estocásticas, este libro sienta las bases del método de descomposición para operadores no lineales en general).
[2]. Adomian, G. (1994). Solving nonlinear partial differential equations with Adomian's decomposition method. Journal of Mathematical Analysis and Applications, 186(3), 802-814. (Un artículo clave que extiende el método a PDEs, pero los principios para EDOs son análogos).
[3]. Cherruault, Y. (1989). Convergence of Adomian's method. Kybernetes, 18(2), 31-38. (Discute aspectos importantes sobre la convergencia del método).
[4]. Wazwaz, A. M. (2009). The Adomian decomposition method for nonlinear integral equations. Applied Mathematics and Computation, 207(1-2), 228-234. (Aunque sobre ecuaciones integrales, ilustra bien la aplicación del método a no linealidades).
[5]. Rach, R. (1984). On the Adomian decomposition method and some related topics. Journal of Mathematical Analysis and Applications, 99(2), 431-450. (Un análisis más profundo del método y sus fundamentos).

 

Paper Title :: Securing Cloud AI Workloads from Adversarial Attacks: Challenges and Defense Mechanisms
Author Name :: Dr. S. Subitha
Country :: India
Page Number :: 27-28
Cloud-based AI workloads are increasingly exposed to adversarial threats due to their distributed, large-scale, and shared-resource nature. This paper presents a comprehensive overview of vulnerabilities in AI models deployed in the cloud and surveys the existing defense mechanisms. We classify attacks into evasion, poisoning, and inference threats and explore cloud-specific implications. Furthermore, the paper proposes a hybrid security framework that combines adversarial training, explainable AI, secure model serving, and zero-trust access control to improve robustness against malicious behaviors. Experimental validation is proposed as future work to evaluate the effectiveness of these approaches in real-world cloud environments.
Keywords: Cloud AI, Adversarial Attacks, Security, Explainable AI, Adversarial Training, Model Poisoning, Cloud Security
[1]. J. Goodfellow, J. Shlens, and C. Szegedy, ―Explaining and harnessing adversarial examples,‖ arXiv preprint arXiv:1412.6572, 2015
[2]. N. Carlini and D. Wagner, ―Towards evaluating the robustness of neural networks,‖ in IEEE Symposium on Security and Privacy, 2017, pp. 39–57.
[3]. K. Simonyan et al., ―Deep Inside Convolutional Networks: Visualising Image Classification Models and Saliency Maps,‖ ICLR Workshop, 2014.
[4]. T. Chen, et al., "Adversarial Examples Improve Model Interpretability," IEEE Transactions on Neural Networks and Learning Systems, vol. 32, no. 8, pp. 3724–3735, 2021.

 

Paper Title :: The Role of Artificial Intelligence in the Field of Education
Author Name :: Dr. S. Subitha
Country :: India
Page Number :: 29-30
Artificial Intelligence (AI) has emerged as a transformative force across numerous industries, and the field of education is no exception. This research paper explores the applications, benefits, and challenges of AI in teaching and learning environments. It discusses AI-powered tools like intelligent tutoring systems, automated grading, personalized learning platforms, and AI-driven analytics. The study further evaluates how AI supports both educators and learners in enhancing educational experiences while addressing ethical considerations and potential limitations.
[1]. Baker, R. S., & Inventado, P. S. (2014). Educational Data Mining and Learning Analytics.
[2]. Holmes, W., Bialik, M., & Fadel, C. (2019). Artificial Intelligence in Education: Promises and Implications for Teaching and Learning.
[3]. Luckin, R., Holmes, W., Griffiths, M., & Forcier, L. B. (2016). Intelligence Unleashed: An Argument for AI in Education.
[4]. UNESCO. (2021). AI and Education: Guidance for Policymakers.

 

Paper Title :: AI-Powered Automation of Voice-of-Customer (VoC) Analysis for Scalable Insight Generation
Author Name :: Dr. S. Subitha
Country :: India
Page Number :: 31-32
Voice-of-Customer (VoC) analysis plays a crucial role in understanding customer expectations, preferences, and pain points. Traditional manual methods for analyzing VoC data are time-consuming, error-prone, and limited in scalability. This research explores the use of Artificial Intelligence (AI), specifically large language models and natural language processing techniques, to automate the VoC analysis process. We present an AI-driven pipeline capable of extracting, clustering, and interpreting customer feedback from various sources. The paper demonstrates how automation enhances accuracy, reduces manual workload, and enables real-time decision-making. This approach enables organizations to systematically scale their customer experience strategies using AI insights.
Keywords: Voice-of-Customer, AI, NLP, Automation, Customer Feedback, Sentiment Analysis, Machine Learning
[1]. S. Bird, E. Klein, and E. Loper, "Natural Language Processing with Python," O'Reilly Media, 2009.
[2]. J. Devlin et al., “BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding,” NAACL, 2019.
[3]. T. Mikolov et al., “Efficient Estimation of Word Representations in Vector Space,” arXiv: 1301.3781, 2013.
[4]. M. Grootendorst, “BERTopic: Neural topic modeling with class-based TF-IDF,” arXiv: 2203.05794, 2022.

 

Paper Title :: Integrating Artificial Intelligence with Data Science: Transforming Decision-Making in the Digital Age
Author Name :: Dr. S. Subitha
Country :: India
Page Number :: 33-34
Artificial Intelligence (AI) and Data Science are two synergistic fields reshaping the landscape of modern computation and analytics. This paper explores the convergence of AI and Data Science, highlighting their integrated applications across industries. It discusses key methodologies, frameworks, and real-world use cases where AI augments the predictive power of data science workflows. The study also identifies current challenges and future directions in developing intelligent, data-driven systems
[1]. Y. Zhang, M. Chen, and L. Wang, “Machine learning with data science: A systematic review,” IEEE Access, vol. 8, pp. 123456–123470, 2023.
[2]. A. Kumar and R. Bansal, “AI in healthcare: Data-driven insights and applications,” IEEE Trans. Med. Informatics, vol. 10, no. 2, pp. 45–55, 2024.
[3]. S. Lee, J. Kim, and T. Park, “Smart cities and AI: A data science approach,” IEEE Internet Things J., vol. 9, no. 1, pp. 101–110, Jan. 2025.

 

Paper Title :: The Role of Machine Learning in Modern Computing: Techniques, Applications, and Challenges
Author Name :: Dr. S. Subitha
Country :: India
Page Number :: 35-36
Machine Learning (ML) has emerged as a transformative force in modern computing, enabling systems to learn from data and make predictions or decisions without being explicitly programmed. This paper explores the fundamental techniques of machine learning, including supervised, unsupervised, and reinforcement learning, and their real-world applications across various domains such as healthcare, finance, transportation, and cybersecurity. We also examine the challenges associated with ML, including data privacy, model interpretability, and algorithmic bias. Finally, we discuss future directions and research opportunities that aim to make ML more robust, ethical, and accessible.
Keywords: Machine Learning, Supervised Learning, Unsupervised Learning, Deep Learning, Artificial Intelligence, Data Science
[1]. Good fellow, Y. Bengio, and A. Courville, Deep Learning. MIT Press, 2016.
[2]. T. Mitchell, Machine Learning. McGraw Hill, 1997.
[3]. C. M. Bishop, Pattern Recognition and Machine Learning. Springer, 2006.
[4]. S. Russell and P. Norvig, Artificial Intelligence: A Modern Approach. Prentice Hall, 2020.

 

Paper Title :: A Study on Cultural Shifts in Hybrid Workplace Implications for Organizational Growth in IT Industry
Author Name :: Mrs. J. Manjula || M. Madhu
Country :: India
Page Number :: 37-46
The hybrid workplace model has turned into a disruptive factor in the IT field that shifts the cultural peculiarities and organizational patterns. The study explores the impact of cultural changes on the organizational growth in IT businesses and especially the cultural changes related to autonomy, collaboration, engagement, driven leadership, and organization alignment. The underlying cultural factors affecting the hybrid work environment were determined by the exploration factor analysis (EFA) based on survey-derived data of IT workers with a structured survey. Various Linear Regression (MLR) was then done on the components retrieved and the extent to which they were predictive of organizational growth was established. Results indicate that engagement and driven leadership were considered as the most relevant factors in developing hybrid culture by high performance and second to them is organizational alignment and autonomy. Collaboration should not be overlooked too, though its influence appears to be moderate. The report claims that empowering the staff members together with the arrangement of the leadership styles and the reaffirmation of the company values might all lead to growth in the rapidly developing digital workplace. Such observations can give HR directors and those who develop legislation in the IT sector an effective strategy of transitioning into establishing hybrid models that can lead to the long-term development of the organization, as well as job satisfaction in employees.
Keywords: Autonomy, Collaboration, Engagement Driven-based, Leadership and alignment of the Organization.
[1]. Choudhury, P., Foroughi, C., & Larson, B. Z. (2021). Work-from-anywhere: The productivity effects of geographic flexibility. Strategic Management Journal, 42(4), 655–683.
[2]. Gartner. (2021). Future of Work Trends: 2021. Gartner Research.
[3]. Sull, D., Sull, C., & Bersin, J. (2022). 10 things great bosses do to manage a hybrid workforce. MIT Sloan Management Review, 63(2), 1–8.
[4]. Waizenegger, L., McKenna, B., Cai, W., & Bendz, T. (2020). An affordance perspective of team collaboration and enforced working from home during COVID-19. European Journal of Information Systems, 29(4), 429–442.
[5]. Allen, T. D., Golden, T. D., & Shockley, K. M. (2015). How effective is telecommuting? Assessing the status of our scientific findings. Psychological Science in the Public Interest, 16(2), 40–68. https://doi.org/10.1177/1529100615593273

 

Paper Title :: NIST Regulatory Requirements in Ensuring National Cybersecurity
Author Name :: Elshad Neymatov
Country :: USA
Page Number :: 47-52
The study focuses on conducting an analysis of the regulatory mandates of the National Institute of Standards and Technology of the United States (NIST) as an element in constructing a comprehensive national cybersecurity system. The objective of the article is to systematize and evaluate the effectiveness of implementing the NIST Cybersecurity Framework (CSF) for the protection of strategically significant sectors: healthcare, energy, and transport complex.
The methodological basis consisted of a retrospective system-synthetic analysis of current scientific publications for 2021–2025, relevant regulatory acts, and statistical reports reflecting practices of NIST standards implementation.
As a result of the study, the main advantages and bottlenecks in adapting NIST CSF in various sectors were identified, and recommendations for further improvement of the framework model were formulated.
In particular, with regard to the protection of electronic medical records (EHR), it is proposed to implement a multi-level approach combining AES-256 encryption, role-based access control (RBAC), and continuous monitoring for strict compliance with HIPAA requirements.
The scientific novelty lies in reconceiving NIST CSF not as a static set of prescriptions, but as a dynamic, adaptive system capable of integrating sectoral specificity and timely responding to new technological challenges.
The practical significance of the obtained conclusions is determined by their value for cybersecurity specialists, representatives of regulatory authorities, and leaders of critical infrastructure organizations responsible for developing strategic measures for the protection of information assets.
Keywords: cybersecurity, NIST, cybersecurity framework, critical infrastructure, national security, data protection, healthcare, energy, transport, risk management
[1]. IBM Security. (2023). Cost of a data breach report 2023. https://www.ibm.com/reports/data-breach (date of request: 05.05.2025).
[2]. Almomani, I., Ahmed, M., & Maglaras, L. (2021). Cybersecurity maturity assessment framework for higher education institutions in Saudi Arabia. PeerJ Computer Science, 7,1-26. https://doi.org/10.7717/peerj-cs.703
[3]. Reyes-Acosta, R. E., García-Alcaraz, J. L., Martínez-González, A., Acevedo-Chedid, J. A., & Rodríguez-Borbon, M. I. (2025). Cybersecurity conceptual framework applied to edge computing and Internet of Things environments. Electronics, 14(11), 10–35. https://doi.org/10.3390/electronics14112109
[4]. Sani, M. (2024). Assessing the effectiveness of current cybersecurity regulations and policies for resilience in healthcare data protection,1-9.
[5]. Alghassab, M. (2021). Analyzing the impact of cybersecurity on monitoring and control systems in the energy sector. Energies, 15(1), 1–21. https://doi.org/10.3390/en15010218

 

Paper Title :: Real-time Individual Tracking Solution for Intrusion Detection and Monitoring System using 24-GHz mm Wave Radar Technology
Author Name :: Nghiem Le Phan Gia || Linh Ho Khanh || Tuan Do-Hong
Country :: Vietnam
Page Number :: 53-58
Now a days, a wide range of solutions is available for monitoring and tracking human within a defined area, employing diverse technologies. Among these, solutions that utilize cameras or image sensors are predominant, owing to their straight forward integration, scalability, and ease of development, particularly with the remarkable advancements in Artificial Intelligence (AI) algorithms for visual data processing. However, these vision-based approaches pose inherent risks related to the theft or unauthorized disclosure of sensitive data. In this study, the design of a novel solution for effective intrusion detection and monitoring system using 24 GHz mm Wave radar technology is presented. The proposed system incorporates advanced edge-based signal processing and machine learning algorithms to achieve high accuracy while facilitating easy integration, scalability, and future development. This approach also ensures the information security and confidentiality of sensitive user data.
Keywords: mmWave, radar, HLK-LD2410, IoT, individual monitoring, edge processing.
[1] Raju A Nadaf , S.M. Hatture, Vasudha M Bonal and Susen P Naik, Home Security against Human Intrusion using Raspberry Pi, Procedia Computer Science, 167 (4), 2020, 1811-1820, https://doi.org/10.1016/j.procs.2020.03.200.
[2] Kunai Deo, Rishi Deedwania and Swati Bairagi, Human Intrusion And Motion Detection System, International Journal of Computer Application, 167 (28), 2020, 46-49 https://doi.org/10.5120/ijca2020920315.
[3] Zhongmin Wang, Tianying Chang and Hong-Liang Cui, Review of Active Millimeter Wave Imaging Techniques for Personnel Security Screening, IEEE Access, 7, 2019, 148336-148350, https://doi.org/10.1109/ACCESS.2019.2946736.
[4] Yahya S. H. Khraisat, Simulation of the 24GHz short range, wide band automative radar, European Journal of Scientific of Research, Euro Journals Publishing, 2011, 75-82.

 

Paper Title :: Preparation of (Au2O) By Green Synthesis
Author Name :: Surour A. Khlaf || Maithm A.Obaid
Country :: Iraq
Page Number :: 59-64
Since the increased drug efficacy and lower toxicity in nano-mediateddrug delivery model have led to various applications in current science, the ecologically friendly synthesis regarding nanoparticles (NPs) by the green route from plant extracts has gained favor. In the presented work, we looked into the biosynthesis regarding goldoxide nanoparticles (NPs) from Au2O NPs green tea that are both stable and reasonably priced. The approach used for preparing Au NPs using green synthesis is demonstrated in this work to be straightforward and affordable. This was accomplished by combining an aqueous solution of goldnitrate with an olive extract, and visual spectroscopy as well as color change were employed to demonstrate the preparation ofAu2O NPs. Through using UV spectroscopy, the nature regarding the synthesized AgNPs was determined to be 2.5 mM. According to the research,aqueous extract is a good material for makingAu2O NPs, and by modifying the factors influencing this study, moreAu2ONPs in smaller sizes could be produced. After that, it was established that the extracted gold oxide had antibacterial characteristics, allowing it to be employed in a variety of pharmaceutical preparations for treating infections brought on by both negative and positive bacteria. As it wasdemonstrated to have a bactericidal effect on bacteria like the ones utilized in this research-namely, Staphylococcus aureus Staphylococcus pneumoniae, and Escherichi
Keywords: Au2O NPs, nanostructure, green tea, bacteria, XRD examination
[1]. Ahmed, S., Ahmad, M., Swami, B. L., & Ikram, S. (2016). A review on plants extracts mediated synthesis of silver nanoparticles for antimicrobial applications: A green expertise. Journal of Advanced Research, 7(1), 17–28. https://doi.org/10.1016/j.jare.2015.02.007
[2]. Iravani, S., Korbekandi, H., Mirmohammadi, S. V., & Zolfaghari, B. (2014). Synthesis of silver nanoparticles: chemical, physical and biological methods. Research in Pharmaceutical Sciences, 9(6), 385–406.
[3]. Narayanan, K. B., & Sakthivel, N. (2010). Biological synthesis of metal nanoparticles by microbes. Advances in Colloid and Interface Science, 156(1–2), 1–13. https://doi.org/10.1016/j.cis.2010.02.001
[4]. Song, J. Y., & Kim, B. S. (2009). Rapid biological synthesis of silver nanoparticles using plant leaf extracts. Bioprocess and Biosystems Engineering, 32, 79–84. https://doi.org/10.1007/s00449-008-0224-6
[5]. Singh, P., Kim, Y. J., Zhang, D., & Yang, D. C. (2016). Biological synthesis of nanoparticles from plants and microorganisms. Trends in Biotechnology, 34(7), 588–599. https://doi.org/10.1016/j.tibtech.2016.02.006

 

Paper Title :: Gamification of Educational Virtual Worlds in the Metaverse
Author Name :: Dimitrios Magetos || Sarandis Mitropoulos
Country :: Greece
Page Number :: 65-77
The rapid advancement of digital technologies has transformed the landscape of education, with the metaverse emerging as a new and immersive learning platform. At the same time, gamification has proven to be a powerful pedagogical strategy for enhancing student engagement and motivation. The convergence of these two fields - educational virtual worlds and game-based learning - opens new avenues for experiential and interactive education. This study explores the integration of gamification into educational virtual environments in the metaverse, focusing on how game design elements, such as points, badges, levels, and collaborative missions, can be incorporated to support pedagogical goals. Building on the existing literature, this research proposes a methodology for designing immersive, game-enriched educational experiences. The study examines both the benefits and limitations of such applications, highlighting the potential of collaborative design as a means to enhance creativity, motivation, and deeper engagement.
Keywords: Education, Gamification, Metaverse, Minecraft, Virtual Worlds, Roblox
[1]. Lingio. (n.d.). All you need to know about gamification in education. https://www.lingio.com/blog/gamification-in-education
[2]. EdApp. (n.d.). Gamification in education: Using games to enhance learning. https://staging-site.edapp.com/elearning-gamification
[3]. Nudge. (2025). Top 10 gamification tools in education for 2025. https://www.nudgenow.com/blogs/gamification-strategies
[4]. TeachThought. (2023). 20 uses for virtual worlds in the classroom.https://www.teachthought.com/the-future-of-learning-posts/virtual-worlds/
[5]. TalentLMS. (n.d.). Gamification in education: Pros, cons, and practical insights.

 

Paper Title :: Human-Centered Design Approach for Digitalizing Child Health Data Management and Reporting in Community Health Services
Author Name :: Harsono || Sigit Sugiharto || Rinayati || Hargianti Dini Iswandari
Country :: Indonesia
Page Number :: 78-83
Posyandu (Integrated Health Post) serves as a crucial frontline service for maternal and child health in Indonesia, especially in rural and low-resource communities. However, the effectiveness of Posyandu is often hindered by its continued reliance on paper-based data collection and reporting systems. These manual methods lead to common challenges such as data inaccuracies, inefficiencies in service delivery, and delays in reporting that undermine timely health interventions for toddlers. To address these issues, this study adopts a Human-Centered Design (HCD) approach to develop a digital application specifically tailored to the workflows and needs of Posyandu cadres. The research engaged 15 active Posyandu cadres in a participatory design process, which included interviews, co-design workshops, and iterative prototype testing. The final application includes key features such as digital KartuMenujuSehat (KMS), automated growth chart visualization, offline data entry capability, and a user interface adapted to local culture and digital literacy levels. Usability testing using the System Usability Scale (SUS) revealed a mean score of 81.4, indicating a high level of user satisfaction and ease of use. The study highlights that involving end-users throughout the design cycle can overcome major barriers such as digital illiteracy and limited internet infrastructure. Moreover, it demonstrates that community-driven co-creation can result in practical, acceptable, and scalable digital health solutions. The findings underscore the potential of HCD-based approaches in supporting digital transformation of maternal and child health programs, particularly in underserved areas. This approach not only enhances the quality and accuracy of health data but also improves operational efficiency and sustainability in primary health services.
Keywords: Human-Centered Design. Digital Health Innovation, Child Nutrition Monitoring, Community Health System, Posyandu Application
[1] Kemenkes RI, "Survei Status Gizi Indonesia (SSGI) 2022," 2022. https://layanandata.kemkes.go.id/katalog-data/ssgi/ketersediaan-data/ssgi-2022.
[2] R. K. O. D. R. Syifa Sofia Wibowo1*, Nayla Rani Khoirun Nisa2, "Pengembangan dan Pelatihan Sistem Pengukuran Antropometri Digital kepada Kader Posyandu sebagai Upaya Peningkatan Pelayanan Posyandu Balita dan Pencegahan Dini Stunting," J. Pengabdian, Riset, Kreat. Inovasi, dan Teknol. Tepat Guna, vol. 5, no. 1, pp. 141–152, 2025, doi: 10.22146/parikesit.v2i1.9617.
[3] T. Herlambang et al., "Digitalisasi Sistem Manajemen Posyandu ‗Bocahcare‘ Sebagai Upaya Pemantauan Dan Pencegahan Stunting Di Desa Pongangan Kecamatan Manyar Kabupaten Gresik," Community Dev. J. J. Pengabdi. Masy., vol. 5, no. 4, pp. 8019–8024, 2024.
[4] F. R. Rinawan et al., "Understanding mobile application development and implementation for monitoring Posyandu data in Indonesia: a 3-year hybrid action study to build 'a bridge' from the community to the national scale," BMC Public Health, vol. 21, no. 1, pp. 1–17, 2021, doi: 10.1186/s12889-021-11035-w.
[5] F. Sinlae, D. Alfauzi Hidayatullah, H. Rizqi Sanjaya, and L. Situmorang, "Application of Human-Centered Design Principles in WebMed Application UI/UX Development," Siber J. Adv. Multidiscip., vol. 2, no. 2, pp. 194–203, 2024, doi: 10.38035/sjam.v2i2.163

 

Paper Title :: Stagnant Masculinities and Missing Awareness of the Gender Gap in STEM
A Situated Qualitative Analysis on Past-Present-Future
Author Name :: Grit Kirstin Koeltzsch
Country :: Argentina
Page Number :: 84-91
The engineering disciplines, or careers rooted in the field of STEM, struggle with the gender gap because they are embedded in a sociocultural and historical context in which hierarchically organized masculinities are derived and reproduced within the structures of an unequal society. This paper aims to critically discuss why male engineering students often fail to recognize the dissimilar gender relationships in society and engineering. Based on qualitative research regarding the future time perspective and an intersectional gender analysis, preliminary results are presented, derived from a survey conducted with a sample of 40 undergraduate students from the Engineering Faculty of the National University of Jujuy (UNJu) in Argentina. The analysis reveals that male students are not widely aware of the history of gender relations, are unfamiliar with female scientists, and do not recognize the importance of gender equity. In conclusion, I suggest rethinking educational strategies and redefining masculinity, thereby allowing new models to emerge for a more inclusive environment and culture in engineering.
Keywords: Engineering students, future, gender gap, intersectionality, masculinities.
[1] S. M. Merchán-Rubiano, K. B. Villalba, G. K. Koeltzsch. & G. Pascal, Analysis of gender-based violence as cause of the gap situation in engineering in Latin America, Proceedings World Engineering Education Forum-Global Engineering Deans Council (WEEF-GEDC), 1-6. IEEE, Monterrey, Mexico, 2023, 1-6. DOI: 10.1109/WEEF-GEDC59520.2023.10344034
[2] E. N. Cruz, Mujeres en la Colonia. Dominación colonial, diferencias étnicas y de género en cofradías y fiestas religiosas en Jujuy, Jujuy, Río de la Plata, Anthropologica 23(23), 2005, 127–150.
[3] G. K Koeltzsch, Construyendo puentes desde la perspectiva de género en el aula. El diálogo docente-estudiante y los primeros resultados. In M. T. Garibay & L. E. Rathmann (Eds.), Matilda y las mujeres en ingeniería en América Latina, 6 (Bogotá: CONFEDI, ACOFI, Y LACCEI, 2004) 53-57.
[4] K. Lewin, A dynamic theory of personality (NY: McGraw-Hill, 1935).
[5] J. Nuttin, Future Time Perspective and motivation: theory and research method (Hillsdale, NJ: Erlbaum, 1985).

 

Paper Title :: Cybersecurity and the Necessity of Its Regulation by the EU Law
Author Name :: Martin Janku
Country :: Czech Republic
Page Number :: 92-108
To ensure cybersecurity in all its complexity, the role of a legal framework setting out rights and obligations of responsible entities and providing for appropriate procedures and practices cannot be underestimated. It is increasingly frequent to refer to this area of legislation as the Cybersecurity Law. The paper opens with an overview of existing definition of cybersecurity and the role of its legal regulation. Then we focus to the role of the EU law in providing the legal framework of the cybersecurity and legal acts in this area represented by the EU secondary legislation. Attention is drawn on the two main acts in this area - the Cyber Security Act II (EU Regulation of 2019) and the Directive on measures for a high common level of cybersecurity across the Union (known as NIS2, 2022). Cybersecurity provides a perfect example of an area where corresponding legal rules need to be adopted bythe EU law and harmonized on the Member State state level.
Keywords: cybersecurity law; EU cybersecurity legislation; cybersecurity certification scheme; EU Cybersecurity Act
[1]. EU: Working conditions and sustainable work.. Eurofound, Updated 01/2023. Available online at https://www.eurofound.europa.eu/cs/publications/2022/rozsireni-prace-na-dalku-dopad-na-pracovni-podminky-predpisy
[2]. GSMA.2022. Estimate published in a document by the Telecommunications Trade Association. Available online at https://www.gsma.com/iot/wp-content/uploads/2018/08/GSMA-IoT-Infographic-2022.pdf
[3]. ENISA. Main Incidents in the EU and worldwide. 2020. ENISA. Online at https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/etl-review-folder/etl-2020-main-incidents
[4]. Lagarde, C. Estimating cyber risk for the financial sector, IMF, 2022. Available online at https://blogs.imf.org/2022/06/22/estimating-cyber-risk-for-the-financial-sector/
[5]. Gřivna, T. et al. Kyberkriminalita a právo [Cybercrime and law]. 1st ed. Prague : Auditorium, 2008

 

Paper Title :: Integrated Agricultural Management through Environmentally Friendly Waste Processing
Author Name :: Siwi Hardiastuti Endang Kawuryan || Didi Saidi || Dyah Sugandini || Farhvisa Muzakka Abdillah || Rahajeng Arundati
Country :: Indonesia
Page Number :: 109-116
This study aims to analyze the adoption of Integrated Farming Systems (IFS) using the Technology–Organization–Environment (TOE) framework. IFS integrates agricultural, livestock, and aquaculture practices to support sustainability and improve household livelihoods. Using a quantitative approach, data were collected from farming households in Sumberagung Village, Sleman, Yogyakarta, and analyzed using Partial Least Squares Structural Equation Modeling (PLS-SEM). The results show that the TOE model effectively explains 91.7% of the variance in IFS adoption. All three components—technology, organization, and environment—significantly influence the implementation of IFS, with technology having the strongest effect. These findings suggest that advancing agricultural technology, strengthening organizational capacity, and improving environmental support are essential for promoting sustainable farming practices.
Keywords: Integrated Farming System, Technology–Organization–Environment (TOE), sustainable agriculture, adoption model, PLS-SEM, rural development
[1]. Al-Dailami, A., Ahmad, I., Kamyab, H., Abdullah, N., Koji, I., Ashokkumar, V., Zabara,B. (2022). Sustainable solid waste management in Yemen: environmental, social aspects, and challenges. Biomass Conversion and Biorefinery. 1–27. https://doi.org/10.1007/s13399-022-02871-w
[2]. Ates, H. (2020). Merging theory of planned behavior and value identity personal norm model to explain pro-environmental behaviors. Sustainable Production and Consumption. 24, 169–180. https://doi.org/10.1016/j.spc.2020.07.006
[3]. Axsen, J., Tyree Hageman, J., & Lentz, A. (2012). Lifestyle practices and pro- environmental technology. Ecological Economics. 82, 64–74. https://doi.org/10.1016/j. ecolecon.2012.07.013
[4]. Azevedo, B.D., Scavarda, L.F., Caiado, R.G.G., & Fuss, M. (2021). Improving urban household solid waste management in developing countries based on the German experience. Waste Management. 120, 772–783. https://doi.org/10.1016/j. wasman.2020.11.001
[5]. Bamberg, S., M¨oser, G. (2007). Twenty years after Hines, Hungerford, and Tomera: a new meta-analysis of psycho-social determinants of pro-environmental behaviour. Journal of Environmental Psychology. 27 (1), 14–25. https://doi.org/10.1016/j.jenvp.2006.12.002

 

Paper Title :: Importance of Quantum Security in AI Systems
Author Name :: Rasheena Imtiyaz || Sanam Preet Kour || Diya Choudhary
Country :: India
Page Number :: 117-122
This chapter looks at how combining quantum cryptography and artificial intelligence (AI) can help solve new cyber security problems caused by powerful quantum computers. It first explains the basics of quantum cryptography, focusing on Quantum Key Distribution (QKD), which uses the rules of quantum physics to create secure communication channels. The chapter also shows how AI can make these systems even stronger by handling large amounts of data, finding patterns, and helping security systems adapt to new threats. The research is based on two methods: direct data from organizations like NIST and a detailed review of existing studies. It also explains how quantum computing, using ideas like superposition and entanglement, can lead to new ways to protect data and detect cyber threats quickly. In the end, the chapter shows that using AI and quantum technologies together is a smart and necessary step to keep our digital world safe.
Keywords: Quantum Cryptography, Artificial Intelligence, Quantum Computing, Cybersecurity, QKD, Data Protection.
[1]. Aurangzeb, A., et al., 2024. The economic and societal ramifications of cyberattacks. Journal of Cybersecurity Studies, 12(3), pp.45–58.
[2]. Bei, H., 2023. Entanglement and its applications in quantum computing. Quantum Computing Advances, 8(2), pp.119–136.
[3]. Broadbent, A., et al., 2015. Quantum technology applications: Key insights and challenges. Quantum Science and Technology Review, 5(4), pp.221–240.
[4]. Conversation, 2023. Quantum computing principles and advancements. The Quantum Report, 10(1), pp.15–25.
[5]. Elaziz, M. & Raheman, F., 2022. The societal impacts of quantum technology: A comprehensive analysis. Global Technology and Society, 7(3), pp.67–81.

 

Paper Title :: Effective Implementation of CI/CD Pipelines in Banking Development
Author Name :: Bolgov Sergei
Country :: Russia
Page Number :: 123-126
The implementation of CI/CD in the banking sector enables faster development, improves software quality, and enhances security. However, this process comes with challenges such as regulatory compliance requirements, integration with legacy systems, and ensuring data protection. This article examines the theoretical aspects of CI/CD, successful case studies of its application in the banking sector, and key risks associated with its adoption. Additionally, it proposes methods for overcoming challenges in the implementation of automated development and deployment processes in financial organizations.
Keywords: CI/CD, banking, automation, security, regulatory compliance, software.
[1]. J. Fluri, F. Fornari, and E. Pustulka, on the importance of CI/CD practices for database applications, Journal of Software: Evolution and Process, 36(12), 2024, e2720. DOI: 10.1002/smr.2720
[2]. E.V. Ponomarev, Development of credit applications: features and challenges, Vestniknauki, 2(9[78]), 2024, 319–327.
[3]. Balgimbayev, Development of innovative interfaces to enhance user experience in digital banking products, International Research Journal of Modernization in Engineering Technology and Science, 6(12), 2024, 2348–2353.
[4]. R.F. J. Shabina Ali, H. Jahankhani, Y. Siddiqi, and B. Hassan, Ensuring securing PII data in the AWS cloud: A comprehensive guide to PCI DSS compliance, in H. Jahankhani (Ed.), Cybersecurity and Artificial Intelligence: Transformational Strategies and Disruptive Innovation (2024) 185–216.
[5]. S. Mooghala, Strategic technical debt management: An in-depth analysis of its consequences and mitigation strategies in the financial industry, Journal of Economics & Management Research, 203, 2022, 2–5. DOI: 10.47363/JESMR/2022(3)203

 

Copyright © 2015 IJLRET. All Right Reseverd Home   Editorial Board   Current Issue   Contact Us