Submitted:
11 January 2026
Posted:
12 January 2026
You are already at the latest version
Abstract
Keywords:
1. Introduction
1.1. Overview of Third-Party Library Usage in Modern Software
1.2. Rising Security and Compliance Challenges in OSS Dependencies
1.3. Need for Automated Governance and Secure Framework Integration
2. Literature Survey
2.1. Common Risks Associated with External Libraries
2.2. Case Studies of Dependency-Based Breaches
2.3. Licensing Issues and Legal Implications of OSS Misuse
| Focus Area | Key Findings | Approach |
|---|---|---|
| Dependency usage and risks | High risk from outdated & unused dependencies | Empirical analysis of Java projects |
| Updates and breach cases | Many breaches exploit known vulnerabilities | Case-based empirical study |
| License compliance | License violations cause significant legal risks | Compliance report with recommendations |
| Secure dependency management | Emphasizes secure framework integration | Industry best practices |
| Library update practices | Majority of libraries remain outdated in apps | Security impact assessment |
3. Secure Framework for Third-Party Library Integration
3.1. Architecture of the Secure Integration Framework
3.2. Policy-Driven Dependency Validation
3.3. Automated Version Verification and Vulnerability Checks
4. OSS Governance Automation Mechanisms
4.1. Automated License Detection and Compliance Enforcement
4.2. Integration of SBOM (Software Bill of Materials)
4.3. CI/CD Pipeline Integration for Continuous Compliance
4.4. Role of AI/ML in Predictive Vulnerability Assessment
5. Security Controls and Best Practices
5.1. Secure Dependency Selection and Whitelisting

5.2. Sandboxing, Isolation, and Trust Boundaries
5.3. Continuous Monitoring Using SCA (Software Composition Analysis) Tools
5.4. Mitigating Dependency Confusion & Typo squatting Attacks
- Secure Package Management: Enforce strict access controls on private repositories and implement explicit package version pinning or hashing in lock files to ensure the integrity and authenticity of installed packages.
- Package Naming Strategies: Use unique, non-guessable names for internal packages and claim corresponding package names in public repositories to prevent attacker squatting.
- Metadata Verification: When adding a dependency, show the developer package metadata such as download counts, maintainers, and update history so that they can verify them.
- Continuous Monitoring and Alerts: Use automated tools that scan public repos for potential typos versus or conflicting package names to notify teams on time.
6. Implementation Methodology
6.1. Step-by-Step Framework Deployment
6.2. Integration with DevSecOps Workflows
6.3. Tooling Recommendations: SCA Platforms, Automation Engines, License Scanners
7. Experimental Setup and Evaluation
7.1. Testbed Configuration
| Phase | Number of Vulnerabilities (Baseline) | Number of Vulnerabilities (Post Implementation) | Reduction (%) |
|---|---|---|---|
| Initial Dependency Scan | 150 | 150 | 0 |
| Post Governance Setup | 150 | 40 | 73.3 |
| After Continuous Monitoring (3 months) | 40 | 10 | 75 |

7.2. Metrics: Vulnerability Reduction, License Compliance Rate, Build-Time Optimization
- Vulnerability Reduction: Measured as the decrease in known and newly detected vulnerabilities in third-party dependencies after applying the secure framework and automated governance tools. Quantified as:
| Project ID | Total Dependencies |
Compliant Dependencies | Compliance Rate (%) |
|---|---|---|---|
| Project A | 120 | 115 | 95.8 |
| Project B | 85 | 80 | 94.1 |
| Project C | 200 | 192 | 96 |
| Average | 135 | 129 | 95.3 |
- License Compliance Rate: The percentage of dependencies that fully comply with organizational license policies during the build and deployment phases, defined as:

- Build-Time Optimization: The impact of governance automation on build duration is assessed by comparing average build times before and after framework implementation, to ensure that security enforcement does not unduly affect developer productivity [82].
7.3. Results and Discussion
| Build Stage | Average Build Time (Before) | Average Build Time (After) | Time Overhead (%) |
|---|---|---|---|
| Code Compilation | 8 minutes | 8.2 minutes | 2.5 |
| Dependency Validation | 0 minutes | 1.5 minutes | 100 |
| Security & License Scanning | 0 minutes | 1 minute | 100 |
| Total Build Time | 8 minutes | 10.7 minutes | 33.8 |

| Issue Type | Number Detected | Percentage of Total Dependencies (%) |
|---|---|---|
| License Violations | 25 | 5 |
| Known Vulnerabilities | 60 | 12 |
| Outdated Versions | 80 | 16 |
| Dependency Conflicts | 30 | 6 |

Conclusion and Future Enhancements
References
- Jayalakshmi, N.; Sakthivel, K. A Hybrid Approach for Automated GUI Testing Using Quasi-Oppositional Genetic Sparrow Search Algorithm. 2024 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems (ICSES), 2024, December; IEEE; pp. 1–7. [Google Scholar]
- Sharma, A.; Gurram, N. T.; Rawal, R.; Mamidi, P. L.; Gupta, A. S. G. Enhancing educational outcomes through cloud computing and data-driven management systems. Vascular and Endovascular Review 2025, 8(11s), 429–435. [Google Scholar]
- Tatikonda, R.; Thatikonda, R.; Potluri, S. M.; Thota, R.; Kalluri, V. S.; Bhuvanesh, A. Data-Driven Store Design: Floor Visualization for Informed Decision Making. 2025 International Conference in Advances in Power, Signal, and Information Technology (APSIT), 2025, May; IEEE; pp. 1–6. [Google Scholar]
- Rajgopal, P. R. Secure Enterprise Browser-A Strategic Imperative for Modern Enterprises. International Journal of Computer Applications 2025, 187(33), 53–66. [Google Scholar] [CrossRef]
- Chowdhury, P. Sustainable manufacturing 4.0: Tracking carbon footprint in SAP digital manufacturing with IoT sensor networks. Frontiers in Emerging Computer Science and Information Technology 2025, 2(09), 12–19. [Google Scholar] [CrossRef]
- Sayyed, Z. Development of a simulator to mimic VMware vCloud Director (VCD) API calls for cloud orchestration testing. International Journal of Computational and Experimental Science and Engineering 2025, 11(3). [Google Scholar] [CrossRef]
- Gupta, A.; Rajgopal, P. R. Cybersecurity platformization: Transforming enterprise security in an AI-driven, threat-evolving digital landscape. International Journal of Computer Applications 2025, 186(80), 19–28. [Google Scholar] [CrossRef]
- Rajgopal, P. R. MDR service design: Building profitable 24/7 threat coverage for SMBs. International Journal of Applied Mathematics 2025, 38(2s), 1114–1137. [Google Scholar] [CrossRef]
- Sharma, P.; Naveen, S.; JR, M. D.; Sukla, B.; Choudhary, M. P.; Gupta, M. J. Emotional Intelligence And Spiritual Awareness: A Management-Based Framework To Enhance Well-Being In High-Stressed Surgical Environments. Vascular and Endovascular Review 2025, 8(10s), 53–62. [Google Scholar]
- Atheeq, C.; Sultana, R.; Sabahath, S. A.; Mohammed, M. A. K. Advancing IoT Cybersecurity: adaptive threat identification with deep learning in Cyber-physical systems. Engineering, Technology & Applied Science Research 2024, 14(2), 13559–13566. [Google Scholar]
- Ainapure, B.; Kulkarni, S.; Janarthanan, M. Performance Comparison of GAN-Augmented and Traditional CNN Models for Spinal Cord Tumor Detection. In Sustainable Global Societies Initiative; Vibrasphere Technologies, December 2025; Vol. 1, No. 1. [Google Scholar]
- Ainapure, B.; Kulkarni, S.; Chakkaravarthy, M. TriDx: a unified GAN-CNN-GenAI framework for accurate and accessible spinal metastases diagnosis. Engineering Research Express 2025, 7(4), 045241. [Google Scholar] [CrossRef]
- Shanmuganathan, C.; Raviraj, P. A comparative analysis of demand assignment multiple access protocols for wireless ATM networks. International Conference on Computational Science, Engineering and Information Technology, Berlin, Heidelberg, 2011, September; Springer Berlin Heidelberg; pp. 523–533. [Google Scholar]
- Mulla, R.; Potharaju, S.; Tambe, S. N.; Joshi, S.; Kale, K.; Bandishti, P.; Patre, R. Predicting Player Churn in the Gaming Industry: A Machine Learning Framework for Enhanced Retention Strategies. Journal of Current Science and Technology 2025, 15(2), 103–103. [Google Scholar] [CrossRef]
- Shinkar, A. R.; Joshi, D.; Praveen, R. V. S.; Rajesh, Y.; Singh, D. Intelligent solar energy harvesting and management in IoT nodes using deep self-organizing maps. 2024 International Conference on Emerging Research in Computational Science (ICERCS), 2024, December; IEEE; pp. 1–6. [Google Scholar]
- Ainapure, B.; Appasani, B. Machine Learning Algorithms and Sustainable AI-Driven IoT Systems: Paving the Way toward Environmental Stewardship. In Leveraging Artificial Intelligence in Cloud, Edge, Fog and Mobile Computing; Auerbach Publications, 2025; pp. 217–234. [Google Scholar]
- Raja, M. W.; Nirmala, D. K. Agile development methods for online training courses web application development. International Journal of Applied Engineering Research ISSN 2016, 0973–4562. [Google Scholar]
- Vikram, V.; Soundararajan, A. S. Durability studies on the pozzolanic activity of residual sugar cane bagasse ash sisal fibre reinforced concrete with steel slag partially replacement of coarse aggregate. Caribb. J. Sci 2021, 53, 326–344. [Google Scholar]
- Sayyed, Z. Application level scalable leader selection algorithm for distributed systems. International Journal of Computational and Experimental Science and Engineering 2025, 11(3). [Google Scholar] [CrossRef]
- Inamdar, S. V.; Kumar, R.; Chow, S. U.S. Patent No. 11,727,327, 2023.
- Siddiqui, A.; Chand, K.; Shahi, N. C. Effect of process parameters on extraction of pectin from sweet lime peels. Journal of The Institution of Engineers (India): Series A 2021, 102(2), 469–478. [Google Scholar] [CrossRef]
- Palaniappan, S.; Joshi, S. S.; Sharma, S.; Radhakrishnan, M.; Krishna, K. M.; Dahotre, N. B. Additive manufacturing of FeCrAl alloys for nuclear applications-A focused review. Nuclear Materials and Energy 2024, 40, 101702. [Google Scholar] [CrossRef]
- Chowdhury, P. Global MES Rollout Strategies: Overcoming Localization Challenges in Multi-Country Deployments. Emerging Frontiers Library for The American Journal of Applied Sciences 2025, 7(07), 30–38. [Google Scholar] [CrossRef]
- Inbaraj, R.; Ravi, G. Content Based Medical Image Retrieval System Based On Multi Model Clustering Segmentation And Multi-Layer Perception Classification Methods. Turkish Online Journal of Qualitative Inquiry 2021, 12(7). [Google Scholar]
- Kumar, N.; Kurkute, S. L.; Kalpana, V.; Karuppannan, A.; Praveen, R. V. S.; Mishra, S. Modelling and Evaluation of Li-ion Battery Performance Based on the Electric Vehicle Tiled Tests using Kalman Filter-GBDT Approach. 2024 International Conference on Intelligent Algorithms for Computational Intelligence Systems (IACIS), 2024, August; IEEE; pp. 1–6. [Google Scholar]
- Saravanan, V.; Sumalatha, A.; Reddy, D. N.; Ahamed, B. S.; Udayakumar, K. Exploring Decentralized Identity Verification Systems Using Blockchain Technology: Opportunities and Challenges. 2024 5th IEEE Global Conference for Advancement in Technology (GCAT), 2024, October; IEEE; pp. 1–6. [Google Scholar]
- Akat, G. B. OPTICAL AND ELECTRICAL STUDY OF SODIUM ZINC PHOSPHATE GLASS. MATERIAL SCIENCE 2022, 21(05). [Google Scholar]
- Approximation of Coefficients Influencing Robot Design Using FFNN with Bayesian Regularized LMBPA.
- Naveen, S.; Sharma, P. Physician Well-Being and Burnout:” The Correlation Between Duty Hours, Work-Life Balance, And Clinical Outcomes In Vascular Surgery Trainees”. Vascular and Endovascular Review 2025, 8(6s), 389–395. [Google Scholar]
- Rajgopal, P. R. SOC Talent Multiplication: AI Copilots as Force Multipliers in Short-Staffed Teams. International Journal of Computer Applications 2025, 187(48), 46–62. [Google Scholar] [CrossRef]
- Atmakuri, A.; Sahoo, A.; Mohapatra, Y.; Pallavi, M.; Padhi, S.; Kiran, G. M. Securecloud: Enhancing protection with MFA and adaptive access cloud. In Advances in Electrical and Computer Technologies; CRC Press, 2025; pp. 147–152. [Google Scholar]
- Sharma, N.; Gurram, N. T.; Siddiqui, M. S.; Soorya, D. A. M.; Jindal, S.; Kalita, J. P. Hybrid Work Leadership: Balancing Productivity and Employee Well-being. Vascular and Endovascular Review 2025, 8(11s), 417–424. [Google Scholar]
- Mahesh, K.; Balaji, D. P. A Study on Impact of Tamil Nadu Premier League Before and After in Tamil Nadu. International Journal of Physical Education Sports Management and Yogic Sciences 2022, 12(1), 20–27. [Google Scholar] [CrossRef]
- Sultana, R.; Ahmed, N.; Sattar, S. A. HADOOP based image compression and amassed approach for lossless images. Biomedical Research 2018, 29(8), 1532–1542. [Google Scholar] [CrossRef]
- Venkiteela, P. Strategic API modernization using Apigee X for enterprise transformation. Journal of Information Systems Engineering and Management 2024. [Google Scholar]
- Kumar, J. D. S. Investigation on secondary memory management in wireless sensor network. Int J Comput Eng Res Trends 2015, 2(6), 387–391. [Google Scholar]
- Lopez, S., Sarada, V., Praveen, R. V. S., Pandey, A., Khuntia, M., & Haralayya, D. B. (2024). Artificial intelligence challenges and role for sustainable education in india: Problems and prospects. Sandeep Lopez, Vani Sarada, RVS Praveen, Anita Pandey, Monalisa Khuntia, Bhadrappa Haralayya (2024) Artificial Intelligence Challenges and Role for Sustainable Education in India: Problems and Prospects. Library Progress International, 44(3), 18261-18271.
- Joshi, S.; Kumar, A. Multimodal biometrics system design using score level fusion approach. Int. J. Emerg. Technol 2020, 11(3), 1005–1014. [Google Scholar]
- Thota, R.; Potluri, S. M.; Kaki, B.; Abbas, H. M. Financial Bidirectional Encoder Representations from Transformers with Temporal Fusion Transformer for Predicting Financial Market Trends. 2025 International Conference on Intelligent Computing and Knowledge Extraction (ICICKE), 2025, June; IEEE; pp. 1–5. [Google Scholar]
- Dachawar, M.; Ainapure, B.; Tong, V.; Hegde, M. The Evolution of Artificial Intelligence Enhanced Enterprise Resource Planning in Higher Education: A Comprehensive Meta-Data Analysis. 2025 3rd International Conference on Sustainable Computing and Data Communication Systems (ICSCDS), 2025, August; IEEE; pp. 1574–1582. [Google Scholar]
- ROBERTS, T. U.; Polleri, A.; Kumar, R.; Chacko, R. J.; Stanesby, J.; Yordy, K. U.S. Patent No. 11,321,614, 2022.
- Kumar, J.; Radhakrishnan, M.; Palaniappan, S.; Krishna, K. M.; Biswas, K.; Srinivasan, S. G.; Dahotre, N. B. Cr content dependent lattice distortion and solid solution strengthening in additively manufactured CoFeNiCrx complex concentrated alloys–a first principles approach. Materials Today Communications 2024, 40, 109485. [Google Scholar] [CrossRef]
- Parasar, D.; Rathod, V. R. Particle swarm optimisation K-means clustering segmentation of foetus ultrasound image. International Journal of Signal and Imaging Systems Engineering 2017, 10(1-2), 95–103. [Google Scholar] [CrossRef]
- Venkiteela, P. Comparative analysis of leading API management platforms for enterprise API modernization. International Journal of Computer Applications 2025. [Google Scholar] [CrossRef]
- Sultana, R.; Bilfagih, S. M.; Sabahath, S. A. A Novel Machine Learning system to control Denial-of-Services Attacks. Design Engineering 2021, 3676–3683. [Google Scholar]
- Praveen, R. V. S.; Hemavathi, U.; Sathya, R.; Siddiq, A. A.; Sanjay, M. G.; Gowdish, S. AI Powered Plant Identification and Plant Disease Classification System. 2024 4th International Conference on Sustainable Expert Systems (ICSES), 2024, October; IEEE; pp. 1610–1616. [Google Scholar]
- Appaji, I.; Raviraj, P. Vehicular Monitoring Using RFID. International Conference on Automation, Signal Processing, Instrumentation and Control, 2020, February; Springer Nature Singapore: Singapore; pp. 341–350. [Google Scholar]
- Nimma, D.; Rao, P. L.; Ramesh, J. V. N.; Dahan, F.; Reddy, D. N.; Selvakumar, V.; Jangir, P. Reinforcement Learning-Based Integrated Risk Aware Dynamic Treatment Strategy for Consumer-Centric Next-Gen Healthcare. IEEE Transactions on Consumer Electronics, 2025. [Google Scholar]
- Raja, M. W. Artificial intelligence-based healthcare data analysis using multi-perceptron neural network (MPNN) based on optimal feature selection. SN Computer Science 2024, 5(8), 1034. [Google Scholar] [CrossRef]
- Mukherjee, D.; Mani, S.; Sinha, V. S.; Ananthanarayanan, R.; Srivastava, B.; Dhoolia, P.; Chowdhury, P. AHA: Asset harvester assistant. 2010 IEEE International Conference on Services Computing, 2010, July; IEEE; pp. 425–432. [Google Scholar]
- Patil, P. R.; Parasar, D.; Charhate, S. Wrapper-based feature selection and optimization-enabled hybrid deep learning framework for stock market prediction. International Journal of Information Technology & Decision Making 2024, 23(01), 475–500. [Google Scholar]
- Zahir, S. Custom Email Template Creation Using Mustache for Scalable Communication. International journal of signal processing, embedded systems and VLSI design 2025, 5(01), 35–61. [Google Scholar] [CrossRef]
- Naveen, S.; Sharma, P.; Veena, A.; Ramaprabha, D. Digital HR Tools and AI Integration for Corporate Management: Transforming Employee Experience. In Corporate Management in the Digital Age; IGI Global Scientific Publishing, 2025; pp. 69–100. [Google Scholar]
- Satheesh, N.; Sakthivel, K. A Novel Machine Learning-Enhanced Swarm Intelligence Algorithm for Cost-Effective Cloud Load Balancing. 2024 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems (ICSES), 2024, December; IEEE; pp. 1–7. [Google Scholar]
- Radhakrishnan, M.; Sharma, S.; Palaniappan, S.; Pantawane, M. V.; Banerjee, R.; Joshi, S. S.; Dahotre, N. B. Influence of thermal conductivity on evolution of grain morphology during laser-based directed energy deposition of CoCrxFeNi high entropy alloys. Additive Manufacturing 2024, 92, 104387. [Google Scholar] [CrossRef]
- Sahoo, A. K.; Prusty, S.; Swain, A. K.; Jayasingh, S. K. Revolutionizing cancer diagnosis using machine learning techniques. In Intelligent Computing Techniques and Applications; CRC Press, 2025; pp. 47–52. [Google Scholar]
- Praveen, R. V. S. Data Engineering for Modern Applications; Addition Publishing House, 2024. [Google Scholar]
- Nimavat, K. K.; Kumar, R. U.S. Patent No. 12,260,303; U.S. Patent and Trademark Office: Washington, DC, 2025. [Google Scholar]
- Sahoo, P. A. K.; Aparna, R. A.; Dehury, P. K.; Antaryami, E. Computational techniques for cancer detection and risk evaluation. Industrial Engineering 2024, 53(3), 50–58. [Google Scholar]
- Gurram, N. T.; Narender, M.; Bhardwaj, S.; Kalita, J. P. A Hybrid Framework for Smart Educational Governance Using AI, Blockchain, and Data-Driven Management Systems. Advances in Consumer Research 2025, 2(5). [Google Scholar]
- Inbaraj, R.; Ravi, G. Multi Model Clustering Segmentation and Intensive Pragmatic Blossoms (Ipb) Classification Method based Medical Image Retrieval System. Annals of the Romanian Society for Cell Biology 2021, 25(3), 7841–7852. [Google Scholar]
- Juneja, M.; Juneja, P. The Rise of The Tech-Business Translator in The Age Of AI. International Research Journal of Advanced Engineering and Technology 2025, 2(06), 05–15. [Google Scholar] [CrossRef]
- Jadhav, Y.; Patil, V.; Parasar, D. Machine learning approach to classify birds on the basis of their sound. 2020 International Conference on Inventive Computation Technologies (ICICT), 2020, February; IEEE; pp. 69–73. [Google Scholar]
- Suman, P.; Parasar, D.; Rathod, V. R. Seeded region growing segmentation on ultrasound image using particle swarm optimization. 2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), 2015, December; IEEE; pp. 1–6. [Google Scholar]
- Akat, G. B. EFFECT OF ATOMIC NUMBER AND MASS ATTENUATION COEFFICIENT IN Ni-Mn FERRITE SYSTEM. MATERIAL SCIENCE 2021, 20(06). [Google Scholar]
- Boopathy, D.; Balaji, P. Effect of different plyometric training volume on selected motor fitness components and performance enhancement of soccer players. Ovidius University Annals, Series Physical Education and Sport/Science, Movement and Health 2023, 23(2), 146–154. [Google Scholar]
- Venkiteela, P. Real-Time Identity Federation: Replacing File-Based Sync with Okta APIs for GDPR-Compliant. European Journal of Information Technologies and Computer Science 2025, 5(5), 7–13. [Google Scholar] [CrossRef]
- Joshi, S.; Kumar, A. Correlation Filter based on Fingerprint Verification System. International Conference on VLSI, Communication and Instrumentation, 2011; pp. 19–22. [Google Scholar]
- Ganeshan, M. K.; Vethirajan, C. Trends and future of human resource management in the 21st century. Review of Management, Accounting, and Business Studies 2021, 2(1), 17–21. [Google Scholar] [CrossRef]
- Samal, D. A.; Sharma, P.; Naveen, S.; Kumar, K.; Kotehal, P. U.; Thirulogasundaram, V. P. Exploring the role of HR analytics in enhancing talent acquisition strategies. South Eastern European Journal of Public Health 2024, 23(3), 612–618. [Google Scholar] [CrossRef]
- Kamatchi, S.; Preethi, S.; Kumar, K. S.; Reddy, D. N.; Karthick, S. Multi-Objective Genetic Algorithm Optimised Convolutional Neural Networks for Improved Pancreatic Cancer Detection. 2025 3rd International Conference on Data Science and Information System (ICDSIS), 2025, May; IEEE; pp. 1–7. [Google Scholar]
- Gupta, I. A. K. Blockchain-Based Supply Chain Optimization For Eco-Entrepreneurs: Enhancing Transparency And Carbon Footprint Accountability. International Journal of Environmental Sciences 2025, 11(17s). [Google Scholar]
- Praveen, R. V. S.; Hundekari, S.; Parida, P.; Mittal, T.; Sehgal, A.; Bhavana, M. Autonomous Vehicle Navigation Systems: Machine Learning for Real-Time Traffic Prediction. 2025 International Conference on Computational, Communication and Information Technology (ICCCIT), 2025, February; IEEE; pp. 809–813. [Google Scholar]
- Mohammed Nabi Anwarbasha, G. T.; Chakrabarti, A.; Bahrami, A.; Venkatesan, V.; Vikram, A. S. V.; Subramanian, J.; Mahesh, V. Efficient finite element approach to four-variable power-law functionally graded plates. Buildings 2023, 13(10), 2577. [Google Scholar] [CrossRef]
- Juneja, M. Mentr: A Modular, On Demand Mentorship Platform for Personalized Learning and Guidance. The American Journal of Engineering and Technology 2025, 7(06), 144–152. [Google Scholar] [CrossRef]
- Polleri, A.; Kumar, R.; Bron, M. M.; Chen, G.; Agrawal, S.; Buchheim, R. S. U.S. Patent Application No. 17/303,918, 2022.
- Sayyed, Z. Optimizing Callback Service Architecture for High-Throughput Applications. International journal of data science and machine learning 2025, 5(01), 257–279. [Google Scholar] [CrossRef]
- Vidyabharathi, D.; Mohanraj, V.; Kumar, J. S.; Suresh, Y. Achieving generalization of deep learning models in a quick way by adapting T-HTR learning rate scheduler. Personal and Ubiquitous Computing 2023, 27(3), 1335–1353. [Google Scholar] [CrossRef]
- Radhakrishnan, M.; Sharma, S.; Palaniappan, S.; Dahotre, N. B. Evolution of microstructures in laser additive manufactured HT-9 ferritic martensitic steel. Materials Characterization 2024, 218, 114551. [Google Scholar] [CrossRef]
- Chowdhury, P. GENERATIVE AI FOR MES OPTIMIZATION LLM-DRIVEN DIGITAL MANUFACTURING CONFIGURATION RECOMMENDATION. International Journal of Applied Mathematics 2025, 38(7s), 875–890. [Google Scholar] [CrossRef]
- Nasir, G.; Chand, K.; Azaz Ahmad Azad, Z. R.; Nazir, S. Optimization of Finger Millet and Carrot Pomace based fiber enriched biscuits using response surface methodology. Journal of Food Science and Technology 2020, 57(12), 4613–4626. [Google Scholar] [CrossRef]
- Akat, G. B.; Magare, B. K. Mixed Ligand Complex Formation of Copper (II) with Some Amino Acids and Metoprolol. Asian Journal of Organic & Medicinal Chemistry 2022. [Google Scholar]
- Thota, R.; Potluri, S. M.; Alzaidy, A. H. S.; Bhuvaneshwari, P. Knowledge Graph Construction-Based Semantic Web Application for Ontology Development. 2025 International Conference on Intelligent Computing and Knowledge Extraction (ICICKE), 2025, June; IEEE; pp. 1–6. [Google Scholar]
- RAJA, M. W.; PUSHPAVALLI, D. M.; BALAMURUGAN, D. M.; SARANYA, K. ENHANCED MED-CHAIN SECURITY FOR PROTECTING DIABETIC HEALTHCARE DATA IN DECENTRALIZED HEALTHCARE ENVIRONMENT BASED ON ADVANCED CRYPTO AUTHENTICATION POLICY. TPM–Testing, Psychometrics, Methodology in Applied Psychology 2025, 32, 241–255. [Google Scholar]
- Venkiteela, P. A Vendor-Agnostic Multi-Cloud Integration Framework Using Boomi and SAP BTP. Journal of Engineering Research and Sciences 2025, 4(12), 1–14. [Google Scholar] [CrossRef]
- Akat, G. B. Structural Analysis of Ni1-xZnxFe2O4 Ferrite System. MATERIAL SCIENCE 2023, 22(05). [Google Scholar]
- Sivakumar, S.; Prakash, R.; Srividhya, S.; Vikram, A. V. A novel analytical evaluation of the laboratory-measured mechanical properties of lightweight concrete. Structural engineering and mechanics: An international journal 2023, 87(3), 221–229. [Google Scholar]
- Inbaraj, R., John, Y. M., Murugan, K., & Vijayalakshmi, V. (2025). Enhancing medical image classification with cross-dimensional transfer learning using deep learning. 1, 10(4), 389.
- Chand, K.; Singh, A.; Kulshrestha, M. Jaggery quality effected by hilly climatic conditions. Indian Journal of Traditional Knowledge 2012, 11(1), 172–176. [Google Scholar]
- ROBERTS, T. U.; Polleri, A.; Kumar, R.; Chacko, R. J.; Stanesby, J.; Yordy, K. U.S. Patent No. 11,775,843; U.S. Patent and Trademark Office: Washington, DC, 2023. [Google Scholar]
- Reddy, D. N.; Venkateswararao, P.; Vani, M. S.; Pranathi, V.; Patil, A. HybridPPI: A Hybrid Machine Learning Framework for Protein-Protein Interaction Prediction. Indonesian Journal of Electrical Engineering and Informatics (IJEEI) 2025, 13(2). [Google Scholar] [CrossRef]
- Balakumar, B.; Raviraj, P. Automated Detection of Gray Matter in Mri Brain Tumor Segmentation and Deep Brain Structures Based Segmentation Methodology. Middle-East Journal of Scientific Research 2015, 23(6), 1023–1029. [Google Scholar]
- Praveen, R. V. S.; Raju, A.; Anjana, P.; Shibi, B. IoT and ML for Real-Time Vehicle Accident Detection Using Adaptive Random Forest. 2024 Global Conference on Communications and Information Technologies (GCCIT), 2024, October; IEEE; pp. 1–5. [Google Scholar]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2026 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).