Forthcoming and Online First Articles

International Journal of Web Engineering and Technology

International Journal of Web Engineering and Technology (IJWET)

Forthcoming articles have been peer-reviewed and accepted for publication but are pending final changes, are not yet published and may not appear here in their final order of publication until they are assigned to issues. Therefore, the content conforms to our standards but the presentation (e.g. typesetting and proof-reading) is not necessarily up to the Inderscience standard. Additionally, titles, authors, abstracts and keywords may change before publication. Articles will not be published until the final proofs are validated by their authors.

Forthcoming articles must be purchased for the purposes of research, teaching and private study only. These articles can be cited using the expression "in press". For example: Smith, J. (in press). Article Title. Journal Title.

Articles marked with this shopping trolley icon are available for purchase - click on the icon to send an email request to purchase.

Online First articles are published online here, before they appear in a journal issue. Online First articles are fully citeable, complete with a DOI. They can be cited, read, and downloaded. Online First articles are published as Open Access (OA) articles to make the latest research available as early as possible.

Open AccessArticles marked with this Open Access icon are Online First articles. They are freely available and openly accessible to all without any restriction except the ones stated in their respective CC licenses.

Register for our alerting service, which notifies you by email when new issues are published online.

International Journal of Web Engineering and Technology (17 papers in press)

Regular Issues

  • Service Recommendation Method based on Text View and Interaction View   Order a copy of this article
    by Shuaijia Lin, Ting Yu, Yaqi Wang, Jie Xu, Fangying Cheng, Tian Liang 
    Abstract: With the increasing prosperity of web service-sharing platforms, more and more software developers are reusing web services when developing applications. Existing web service recommendation systems often face two challenges. Firstly, developers discover services by inputting requirements, but the user's input is arbitrary and it cannot fully reflect the user's intention. Secondly, the application-service interaction records are too sparse, making it particularly difficult to find services that meet the requirements. To address the above challenges, in this paper, we propose a service recommendation method based on text and interaction views (SRTI). Firstly, SRTI employs graph neural network to deeply mine the features of applications and services. Secondly, SRT uses transformer and fully connected neural networks to deeply mine the matching degree between candidate services and requirements. Finally, we integrate the above two to obtain the final service list. Extensive experiments on real-world datasets have shown that SRTI outperforms several state-of-the-art methods.
    Keywords: service recommendation; text view; interaction view; application; recommendation algorithm.
    DOI: 10.1504/IJWET.2024.10064249
     
  • Authentication of Musical Speech Devices Based on RF Fingerprint Recognition   Order a copy of this article
    by Zitian Liao, Xiaoqun Liao 
    Abstract: Music-voice devices are becoming more and more abundant and diverse with the development of technology; their security and privacy issues have also attracted widespread attention Therefore, the research aims to explore the authentication method of music voice devices based on RF fingerprinting, and to propose an efficient and accurate authentication method combining the time-domain features and frequency-domain features of RF signals through in-depth analysis of RF signal features The research results indicated that the feature fusion RF fingerprint identification technology is significantly better than the single algorithm, deep learning and neural network methods in terms of accuracy, precision rate, operation efficiency and anti-interference ability.The research has practical applications in enhancing the security of music voice devices, protecting user privacy, and improving user experience. It is significant in promoting the development of RF fingerprint identification technology.
    Keywords: Radio frequency fingerprint identification; Musical voice devices; Authentication; Feature fusion.
    DOI: 10.1504/IJWET.2025.10068323
     
  • Fusion of Visual Attention Model and SVM for Sentiment Analysis of Planar Images   Order a copy of this article
    by Yongsong Liu 
    Abstract: The sentiment analysis of images is actually a classification problem. However, a common classifier is unable to handle the emotion classification of images. This study proposes a planar image sentiment analysis recognition method that simulates the human eye recognition process to enhance the accuracy of sentiment analysis in planar images. This method utilises an improved block wise adaptive weighted colour histogram and a cognitive feature extraction model that integrates visual attention models to extract features from images. Finally, this method combines several extracted features of the image and uses support vector machines for sentiment recognition and classification. The results showed that when the words in the dictionary were 90, the algorithm performed the best, with the highest accuracy of 69%. In emotion recognition classification, the more image features were fused, the better the emotion classification recognition effect of the image. When integrating four features, the highest classification accuracy of the algorithm was 72.9%. The research proposes a planar image sentiment analysis method that integrates visual attention models and support vector machines, which can effectively simulate the changes in the focus area features of the human eye when observing images. This can achieve accurate recognition of emotions expressed in images.
    Keywords: Visual attention; SVM; Flat image; Emotional analysis; Feature extraction.
    DOI: 10.1504/IJWET.2025.10068655
     
  • Digital Education Mining Technology Based on Composite Collaborative Filtering and Eclat Algorithm   Order a copy of this article
    by Jingya Wang, Qi Han, Kunkun Ma, Li Xu 
    Abstract: The field of digital education is rapidly growing, demanding effective resource utilisation. Traditional collaborative filtering (CF) algorithms face challenges with large, complex datasets. This study addresses these limitations by integrating CF with association rule mining, using a novel IBCF-UBCF composite CF algorithm and Eclat technology. Data was collected from multiple sources and fused for enhanced educational mining. Results show Eclat outperforms apriori, reducing CPU usage by 55% and physical memory usage by 51.9%, while the composite filtering algorithm achieved over 99% accuracy. The Eclat-IBCF-UBCF algorithm offers robust support for digital education, advancing educational data mining and personalised recommendations. It is recommended for implementation in digital education systems due to its efficiency and accuracy. Further research should focus on enhancing and integrating this algorithm with other educational technologies.
    Keywords: Eclat; IBCF algorithm; UBCF algorithm; Composite collaborative filtering; Digital education.
    DOI: 10.1504/IJWET.2025.10068762
     
  • Clustrosearch: A Novel, Intent-Aware, and Anomalous Reducing Meta-Search Engine Optimisation Algorithm based on User Scoring System and Clustering   Order a copy of this article
    by Parsa Parsafar 
    Abstract: This paper introduces Clustrosearch, a novel meta-search engine optimization algorithm integrating a machine learning-based user scoring system to enhance search result accuracy and efficiency. In response to the shortcomings of traditional search engines in delivering tailored content, Clustrosearch innovatively addresses these challenges by prioritizing user-centric information retrieval. Unlike existing approaches, it focuses on optimizing result relevance without explicit intent awareness, making it versatile across various search scenarios. Clustrosearch incorporates advanced anomaly reduction techniques to minimize the impact of outlier results, thereby enhancing the overall quality of search outcomes. This approach is evaluated through comprehensive benchmarking against established meta-search algorithms, demonstrating its capability to significantly reduce irrelevant results and improve retrieval precision. This research underscores its scalability and effectiveness in enhancing user satisfaction through advanced information filtering techniques.
    Keywords: Search Engine Optimization (SEO); Meta-Search Engine Optimization; Optimization; Linear Search; Rank-Biased Overlap (RBO).
    DOI: 10.1504/IJWET.2025.10068922
     
  • A Sanda Action Recognition Using CNN-LSTM Network Model   Order a copy of this article
    by Jingying Ouyang, Jisheng Zhang, Yuxin Zhao, Shenghai Chen 
    Abstract: This study presents an action recognition algorithm based on convolutional long short-term memory (CNN-LSTM) to enhance the movement analysis precision. The model takes the joint position as the recognition node, and combines with the cylindrical coordinate system with random sliding window to effectively capture the angle and position information of the action frame. The algorithm groups joints, selects root nodes, and extracts local features through a multi-stream network, with classification completed in the pooling and fully connected layers. The proposed model achieves an average accuracy of 98.89%, with a recognition time of 0.61s and a minimal deviation of 0.035 in Sanda movements, demonstrating superior performance in action recognition.
    Keywords: Action recognition; Convolution; Long short-term memory network; Joint; Sanda.
    DOI: 10.1504/IJWET.2025.10068998
     
  • Smart Campus Integration System based on SLAM and Digital Twin Drive Technology   Order a copy of this article
    by Weihua Feng 
    Abstract: Building a smart campus integration platform can help colleges and universities solve the difficult and painful problems in the early stage of informatization construction, such as inconvenient sharing of educational resources, poor experience of service system, insufficient utilisation rate of equipment, and risks of information security In order to improve the performance effect of smart campus system in university operation and teaching management, this paper establishes a standard information model of smart campus data, and adopts structured data to fuse data to improve the efficiency and accuracy of the system Moreover, through the integration of big data and digital twin technology, this paper solves the problems of information island, real-time, intelligent service and poor experience in university information system by combining twin data for virtual and real-time integration and real-time interaction In addition, this paper verifies the effect of the smart campus integration system through experimental verification methods The experimental results show that the comprehensive performance of this system is strong, so it can be seen that the system proposed in this paper is reliable and effective in the smart campus integration system, and the smart campus system can be continuously improved through data mining and digital twinning technology in the follow-up research.
    Keywords: data mining; digital twinning; drive; smart campus; integration system.
    DOI: 10.1504/IJWET.2025.10069445
     
  • Combined Jelly-Snake Optimisation with Deep Learning Architecture for Task Offloading and Resource Allocation in Edge Computing   Order a copy of this article
    by RAJA A, Prathibhavani P. M, Venugopal K. R 
    Abstract: Edge computing allows devices to transfer their computational tasks to nearby edge servers. However, effectively managing offloading decisions and optimising resource remains challenge. To tackle this issue, this paper proposes an innovative method for task offloading and resource allocation in edge computing. In this, CNN-based task offloading method is utilised, incorporates WBAN, ES, and a medical center integrated into edge computing for offloading structure. The GUN handles task-related data scaling, which serves as input for CNN. The CNN produces result ranging from zero to one, where "0"-local task execution and "1"- task offloading to ES. Then, hybrid algorithm combines JSO and SOA is proposed to effectively manage workload demands. The SUJO method optimises resource allocation by considering factors-makespan, task priority, execution time, and energy consumption. The comparative analysis demonstrates SUJO's superiority, achieving execution time of less than 50 seconds and proves effective for optimising task offloading and resource allocation.
    Keywords: WBAN; GUN; Edge computing; Resource allocation; Task offloading; CNN; SUJOA.
    DOI: 10.1504/IJWET.2025.10069446
     
  • Optimisation Algorithm for Distributed Economic Dispatching Problems in Smart Grid   Order a copy of this article
    by Yan Li, Zhibang Ruan 
    Abstract: The development of smart grids faces many problems. The urgent problem is the dispatch of smart grids. To address this, a smart grid economic dispatch model based on a second-order consistency algorithm is proposed. The model transforms dispatch into an unconstrained optimisation problem using convex optimisation theory and integrates a multi-agent consistency algorithm with the internal penalty function method. According to the experimental results, when the training set was 900, the energy saving efficiency of the traditional dispatch model, the dispatch model based on the first-order consistency algorithm, and the second-order consistency algorithm during peak electricity consumption periods were 0.38, 0.55, and 0.64, respectively. During the low power consumption period, when the training set size was 900, the energy saving efficiency of the three models was 0.32, 0.41, and 0.49. The proposed method can effectively solve the power grid dispatch issues, providing a certain reference for relevant research.
    Keywords: Smart grid; Economic dispatch; Distributed second-order consistency algorithm; Internal penalty function method.
    DOI: 10.1504/IJWET.2025.10069681
     
  • Industrial Design Pattern Optimisation Research based on 3D Deep Learning algorithm   Order a copy of this article
    by Yao Wang 
    Abstract: The appearance design of industrial products is mainly done manually, which is time-consuming and inconsistent. To improve efficiency and quality, an intelligent design model based on Generative Adversarial Networks (GAN) was developed. The model converts 3D input data into a scene diagram to represent component relationships and hierarchical structures, making it suitable for complex product layouts. By incorporating the variational autoencoder (VAE) principle, the richness of design information is enhanced. GraphVAE is utilised to learn graph features and generate new structures that meet industrial design needs. Experimental results show that with 1000 test samples, the average information entropy of the proposed model, GoogLeNet, and Fast R-CNN is 35.79, 26.17, and 31.25, respectively, indicating high information richness and similarity to input data. This method optimises the design process, enhances output quality, and reduces computational costs, though its efficiency is lower, making it suitable for less time-sensitive applications.
    Keywords: Keywords: Industrial products; Appearance design; GAN; Artificial intelligence.
    DOI: 10.1504/IJWET.2025.10069713
     
  • Sentiment Analysis using Deep Learning Algorithms Based on Chat Records and Product Reviews   Order a copy of this article
    by Haili Lu, Lin He 
    Abstract: With globalisation and the popularity of the internet, consumer evaluation and product feedback are no longer limited to traditional channels, but expressed through online chat and product reviews. These comments contain a wealth of emotional information and viewpoints, which are of great value to the enterprise. In response to the difficulty of traditional sentiment analysis models in handling complex emotional expressions and semantic information, a method combining support vector machines with bidirectional long short-term memory networks is proposed. The experimental results show that the average classification error of this model is less than 2.4% on the LAMAZON and Yelp datasets, which is superior to other schemes. In contrast, the fitting degree of this model is 99.7%, ranking the highest among all algorithms, and the accuracy of emotion classification exceeds 90%. Therefore, the model combining SVM and BiLSTM performs well in sentiment analysis tasks with high accuracy, providing valuable decision support for enterprises.
    Keywords: Support vector machine; Long short-term memory network algorithm; Sentimental analysis techniques; Chat records; Product reviews.
    DOI: 10.1504/IJWET.2025.10069715
     
  • Assessment of Efficient Machine Learning Algorithms for Enhancing Road Safety and Predicting Accident Severity   Order a copy of this article
    by Akshi Bharadwaj, Sudesh Kumar, Pawan Singh 
    Abstract: In response to the pressing need for road safety enhancement, this study explores the implementation of Machine Learning (ML) methods to forecast the severity of accidents. The research aims to uncover the intricate factors underlying accidents and provide actionable insights for proactive measures. Utilising algorithms including Random Forest, Support Vector Classification (SVC), XGBoost, Balanced Bagging, and Voting Classifier, the study evaluates performance using standard metrics such as F1 score, recall, precision, and accuracy. Notably, the Soft Voting Classifier, comprising XGBoost, Balanced Bagging, and Gradient Boosting, emerges as the leading model with an accuracy rate of 85.7%, demonstrating its efficacy in accident severity prediction.
    Keywords: Accident predictions; Machine learning; ITS; XGBoost; Random Forest.
    DOI: 10.1504/IJWET.2025.10069725
     
  • Development strategy of rural e-commerce in the context of new media: construction of traceability system based on improved DPoS algorithm   Order a copy of this article
    by Jingjing Yang 
    Abstract: In response to the shortcomings of cold chain traceability of rural e-commerce products in new media, this paper constructs a rural e-commerce product traceability system based on improving the consensus mechanism of entrusted rights and the Merkle Patricia tree. Firstly, aiming at the shortcomings of the consensus mechanism for entrusted equity, the witness committee model and Shapley value are introduced to select block nodes and allocate node values. It is used to efficiently identify and eliminate malicious nodes, thereby improving the consensus mechanism for entrusted rights. After applying the system proposed in this study, the complaints and negative reviews of rural e-commerce enterprises significantly decreased. The above results demonstrate that the rural e-commerce product traceability system can efficiently and accurately trace the origin of rural e-commerce products, thereby ensuring product quality and promoting the development of rural e-commerce.
    Keywords: new media background; rural e-commerce; development strategy; consensus mechanism for entrusted rights and interests; traceability system.
    DOI: 10.1504/IJWET.2025.10067604
     
  • Cross-chain data exchange and information security protection management in blockchain   Order a copy of this article
    by Qiong Li, Lei Wang 
    Abstract: To enhance the security and privacy of cross-chain data exchange, a data exchange and security management protocol based on blockchain is proposed. It utilises a cross-chain channel matching model, employing communication protocols between relay chains and licensed blockchains. A communication protocol based on payment script hashes is designed. Experimental verification demonstrated that the peer matched consensus mechanism of this model has advantages in energy efficiency, decentralisation, and scalability. The proposed communication protocol completed calculations within 3 ms with 10 participants, using a maximum communication overhead of 6 KB. The cross-chain data protection protocol reduced the average exchange time by 9.08% at different problem nodes, achieving a 79% protection effect. Results indicate that the proposed model achieves data information protection during cross-chain exchange, while the communication exchange protocol enhances information security through decentralisation. The data security management protocol reinforces privacy and security in cross-chain exchange processes.
    Keywords: internet of things; IoT; blockchain; cross-chain technology; CCT; data information security; consensus mechanism; communication protocol.
    DOI: 10.1504/IJWET.2025.10067668
     
  • Evaluation of students' innovation and entrepreneurship based on genetic neural network algorithm under sustainable development in higher education institutions   Order a copy of this article
    by Xuanyuan Wu, Yi Xiao, Anhua Liu 
    Abstract: The study aims to assess the innovation and entrepreneurship ability of higher vocational students to support the sustainable development of higher education institutions. This paper investigates the key factors influencing students' innovation and entrepreneurship and establishes a comprehensive evaluation system. A combined weight model is constructed using the AHP and entropy method to determine the weight of the evaluation index. Genetic algorithms are used to optimise backpropagation neural networks to improve learning speed and reduce the risk of overfitting. The results showed that the proposed model exhibited lower mean square error and higher accuracy under different sample sizes and training set ratios. The comprehensive weight of evaluation indicators 1, 2 and 5 was higher, and the score of scheme A was the highest (0.536). GA-BP algorithm was superior to BPNN, random forest, and decision tree algorithms in performance. The paper presents a scientific and objective evaluation system for students' innovation and entrepreneurship abilities, which is beneficial for higher education institutions to cultivate students' innovation and entrepreneurship more effectively. In addition, the GA-BP model provides a new perspective for solving complex educational evaluation problems and promotes the development of educational evaluation methods.
    Keywords: higher education institutions; HEIs; genetic algorightm; GA; innovation and entrepreneurship; In/En; sustainability; backpropagation neural network; BPNN.
    DOI: 10.1504/IJWET.2025.10067194
     
  • Cloud storage framework for multivariate regression-based data mining: optimised LIFR and FIFR model   Order a copy of this article
    by Saswati Sarkar, Anirban Kundu 
    Abstract: Authors propose a cloud-based storage framework to search data using optimised mapping. Multivariate regression-based data mining mechanism shows the utility of map tables, storage partitions, and data storage in cloud. The paper exhibits complexity of cloud-based searching algorithms in real-time scenario. The proposed cloud-based storage framework represents parallel disk searching technique to search data with less time consumption. Proposed technique exhibits linear time complexity. Drive partition concepts and map table concepts have been incorporated in this work for searching data in less time. It is observed that the overall execution time is inversely proportional to the number of drive partitions. Sequential and several parallel situations exhibit the comparisons using time graphs. The paper presents comparison graphs for execution time and time complexity between existing techniques and proposed approach with respect to storage partitions. Experimental observations and analysis using statistical data have been shown in this paper.
    Keywords: optimised mapping; last in first read search; LIFR; first in first read search; FIFR; cloud storage; redundant array of independent drives; RAIDs; map table; multivariate regression.
    DOI: 10.1504/IJWET.2025.10070076
     
  • Intelligent interior design based on deep learning and CF algorithm   Order a copy of this article
    by Yuan Ren 
    Abstract: The application of recommendation algorithms in interior design helps users quickly determine their preferred design style and improve the efficiency. In response to the low personalisation and low recommendation accuracy in current home matching and style recommendation systems, research has been conducted on modelling interior design on the foundation of deep learning and collaborative filtering algorithms. Firstly, the collaborative filtering algorithm was optimised by combining content-based recommendation methods and principal component analysis. Meanwhile, a home matching recommendation model based on improved collaborative filtering algorithm was constructed. Then, a neural collaborative filtering style recommendation model based on channel attention was constructed by combining attention mechanism, convolutional neural network, and generalised matrix decomposition. These results confirmed that the improved home matching recommendation model had a higher accuracy of 88.4%. In the collected dataset of bedroom home matching schemes, the accuracy of the home matching recommendation model in home recommendations can reach 92.14%. The neural collaborative filtering style recommendation model on the foundation of channel attention had a hit rate of 0.8865. In summary, the constructed model has good application effects in interior design, which helps to promote the development of interior design.
    Keywords: collaborative filtering; CF; neural network; NN; interior design; attention mechanism; recommendation algorithm.
    DOI: 10.1504/IJWET.2025.10068568