Pub Date : 2026-01-01DOI: 10.1016/j.ject.2025.09.002
Jiayao Wang , Hao Dong , Junwu Zhu , Yizhang Wang , Qilin Wu , Dongfang Zhao
User segmentation is a marketing strategy that allows companies to more accurately position their products and services, thereby enhancing marketing efficiency and customer satisfaction. However, existing user segmentation approaches continue to face significant challenges related to personal information leakage and data security. To address these issues, this study proposes a data storage architecture that integrates localized differential privacy mechanisms with blockchain technology to ensure user data security and reduce the risk of privacy breaches. Building on this foundation, a clustering algorithm based on a density distance metric, referred to as the KDE-KMeans algorithm, is designed and implemented. In this algorithm, a density distance score is introduced as the core metric for measuring the similarity between samples and cluster centers. This scoring mechanism comprehensively considers the traditional distance as the primary factor in similarity evaluation, while also incorporating the density difference between samples as a secondary factor. Together, these elements form a more detailed and robust similarity evaluation framework.Experimental results demonstrate that the KDE-KMeans algorithm significantly outperforms baseline algorithms in clustering accuracy. Its advantages are especially pronounced when processing datasets with substantial density variations between clusters, highlighting the algorithm’s effectiveness and adaptability in complex data environments.
{"title":"User segmentation under blockchain-based privacy protection","authors":"Jiayao Wang , Hao Dong , Junwu Zhu , Yizhang Wang , Qilin Wu , Dongfang Zhao","doi":"10.1016/j.ject.2025.09.002","DOIUrl":"10.1016/j.ject.2025.09.002","url":null,"abstract":"<div><div>User segmentation is a marketing strategy that allows companies to more accurately position their products and services, thereby enhancing marketing efficiency and customer satisfaction. However, existing user segmentation approaches continue to face significant challenges related to personal information leakage and data security. To address these issues, this study proposes a data storage architecture that integrates localized differential privacy mechanisms with blockchain technology to ensure user data security and reduce the risk of privacy breaches. Building on this foundation, a clustering algorithm based on a density distance metric, referred to as the KDE-KMeans algorithm, is designed and implemented. In this algorithm, a density distance score is introduced as the core metric for measuring the similarity between samples and cluster centers. This scoring mechanism comprehensively considers the traditional distance as the primary factor in similarity evaluation, while also incorporating the density difference between samples as a secondary factor. Together, these elements form a more detailed and robust similarity evaluation framework.Experimental results demonstrate that the KDE-KMeans algorithm significantly outperforms baseline algorithms in clustering accuracy. Its advantages are especially pronounced when processing datasets with substantial density variations between clusters, highlighting the algorithm’s effectiveness and adaptability in complex data environments.</div></div>","PeriodicalId":100776,"journal":{"name":"Journal of Economy and Technology","volume":"4 ","pages":"Pages 307-322"},"PeriodicalIF":0.0,"publicationDate":"2026-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146037155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2026-01-01DOI: 10.1016/j.ject.2025.09.001
Yohannes Mekonnen Yesuf , Ziska Fields
Academic literature widely recognizes the importance of entrepreneurial leadership (EL) within agricultural research institutes. However, empirical investigations into how leadership styles influence employees’ innovative work behavior in this sector remain scarce. In particular, scholars have paid limited attention to how leaders in agricultural research institutes shape and enhance employees’ innovation-related behaviors. This study fills that gap by examining how EL influences employees’ innovative behavior (EIB), emphasizing organizational motivation to innovate (OMI) and creativity as the key mechanisms that leaders use to promote innovation among employees in Ethiopian agricultural research institutions. Using a proportionate systematic random sampling method, we drew the sample from the Amhara Agricultural Research Institute (ARARI). The study employed validated questionnaires to examine the hypothesized relationships among EL, EIB, OMI, and employees’ creativity (EC). The findings reveal that OMI serves as a mediator between EL and EIB. Moreover, EC mediates the relationship between OMI and EIB. The study discusses the insights derived from the findings and offers recommendations for fostering creative behavior among staff in agricultural research institutes. Doing so contributes to the literature on entrepreneurial leadership and innovative behavior, particularly relevant to agricultural research institutes in Ethiopia’s developing economy. It also extends previous empirical research by examining how EL influences EIB in agricultural research settings, with OMI and individual creativity as key mediators.
{"title":"Impact of entrepreneurial leadership on employees’ innovative behavior: A mediation analysis of organizational motivation to innovate and employees’ creativity","authors":"Yohannes Mekonnen Yesuf , Ziska Fields","doi":"10.1016/j.ject.2025.09.001","DOIUrl":"10.1016/j.ject.2025.09.001","url":null,"abstract":"<div><div>Academic literature widely recognizes the importance of entrepreneurial leadership (EL) within agricultural research institutes. However, empirical investigations into how leadership styles influence employees’ innovative work behavior in this sector remain scarce. In particular, scholars have paid limited attention to how leaders in agricultural research institutes shape and enhance employees’ innovation-related behaviors. This study fills that gap by examining how EL influences employees’ innovative behavior (EIB), emphasizing organizational motivation to innovate (OMI) and creativity as the key mechanisms that leaders use to promote innovation among employees in Ethiopian agricultural research institutions. Using a proportionate systematic random sampling method, we drew the sample from the Amhara Agricultural Research Institute (ARARI). The study employed validated questionnaires to examine the hypothesized relationships among EL, EIB, OMI, and employees’ creativity (EC). The findings reveal that OMI serves as a mediator between EL and EIB. Moreover, EC mediates the relationship between OMI and EIB. The study discusses the insights derived from the findings and offers recommendations for fostering creative behavior among staff in agricultural research institutes. Doing so contributes to the literature on entrepreneurial leadership and innovative behavior, particularly relevant to agricultural research institutes in Ethiopia’s developing economy. It also extends previous empirical research by examining how EL influences EIB in agricultural research settings, with OMI and individual creativity as key mediators.</div></div>","PeriodicalId":100776,"journal":{"name":"Journal of Economy and Technology","volume":"4 ","pages":"Pages 296-306"},"PeriodicalIF":0.0,"publicationDate":"2026-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145975952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2026-01-01DOI: 10.1016/j.ject.2025.07.004
Ana Claudia de A. Moxotó , Elias Soukiazis , Paulo Melo
This study provides a cross-country analysis of the determinants of Initial Coin Offering (ICO) emergence. Our empirical findings indicate a positive correlation between ICO activity and a country's environmental orientation, as well as the quality of its educational and research institutions. Conversely, the emergence of ICOs is negatively impacted by political instability, high country risk, significant bank concentration, high bank default rates, and restricted financial freedom. These results suggest ICOs are more prevalent in environmentally conscious nations, likely driven by demand for sustainable technology. They also function as alternative assets in politically unstable regions where trust in traditional monetary policy is diminished. The study provides valuable insights for entrepreneurs, investors, and policymakers by identifying the key institutional and economic factors that shape the ICO landscape. Future research is encouraged to explore country-specific characteristics and the evolving regulatory framework governing this financing mechanism.
{"title":"The determinants of the Initial Coin Offering (ICO). A cross-country study","authors":"Ana Claudia de A. Moxotó , Elias Soukiazis , Paulo Melo","doi":"10.1016/j.ject.2025.07.004","DOIUrl":"10.1016/j.ject.2025.07.004","url":null,"abstract":"<div><div>This study provides a cross-country analysis of the determinants of Initial Coin Offering (ICO) emergence. Our empirical findings indicate a positive correlation between ICO activity and a country's environmental orientation, as well as the quality of its educational and research institutions. Conversely, the emergence of ICOs is negatively impacted by political instability, high country risk, significant bank concentration, high bank default rates, and restricted financial freedom. These results suggest ICOs are more prevalent in environmentally conscious nations, likely driven by demand for sustainable technology. They also function as alternative assets in politically unstable regions where trust in traditional monetary policy is diminished. The study provides valuable insights for entrepreneurs, investors, and policymakers by identifying the key institutional and economic factors that shape the ICO landscape. Future research is encouraged to explore country-specific characteristics and the evolving regulatory framework governing this financing mechanism.</div></div>","PeriodicalId":100776,"journal":{"name":"Journal of Economy and Technology","volume":"4 ","pages":"Pages 284-295"},"PeriodicalIF":0.0,"publicationDate":"2026-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145975953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This study investigates neural network performance optimization for New York City taxi trip duration prediction to address critical gaps in transportation machine learning, where reproducibility, comprehensive diagnostics, and computational efficiency remain underreported. The research addresses limitations in prior literature that emphasize accuracy without standardized preprocessing, leakage prevention, or systematic cost-performance analysis. The objective was to develop a unified, reproducible framework combining an auditable, from-scratch NumPy neural network with production-grade Keras MLPs, systematically benchmarked against classical models under identical preprocessing and data splits. Methodology encompasses four independent phases: theoretical validation using XOR classification, statistical benchmarking through rigorous cross-validation on 1.3 million NYC taxi records, systematic architecture optimization across small/medium/large configurations, and advanced optimization achieving state-of-the-art performance. Key results demonstrate perfect XOR convergence validation (loss reduction from 0.7065 to 0.0198), competitive baseline performance against Random Forest (93.3 %±0.013 vs 90.5 %±0.044 accuracy), optimal medium architecture achieving 0.459 RMSLE, and final proposed model reaching 0.3092 RMSLE—representing 31.8 % improvement over Random Forest (0.4536) and 27.4 % over enhanced Keras baselines (0.4261). The framework incorporates comprehensive residual diagnostics, feature importance analysis, and computational profiling with statistical significance testing. Results establish new benchmarks for NYC taxi duration prediction while providing a methodologically replicable framework for future urban mobility analytics and operational ETA systems.
{"title":"Evaluating machine learning performance using python for neural network models in urban transportation in New York city case study","authors":"Mohsen Mohammadagha, Saeed Asadi, Hajar Kazemi Naeini","doi":"10.1016/j.ject.2025.11.001","DOIUrl":"10.1016/j.ject.2025.11.001","url":null,"abstract":"<div><div>This study investigates neural network performance optimization for New York City taxi trip duration prediction to address critical gaps in transportation machine learning, where reproducibility, comprehensive diagnostics, and computational efficiency remain underreported. The research addresses limitations in prior literature that emphasize accuracy without standardized preprocessing, leakage prevention, or systematic cost-performance analysis. The objective was to develop a unified, reproducible framework combining an auditable, from-scratch NumPy neural network with production-grade Keras MLPs, systematically benchmarked against classical models under identical preprocessing and data splits. Methodology encompasses four independent phases: theoretical validation using XOR classification, statistical benchmarking through rigorous cross-validation on 1.3 million NYC taxi records, systematic architecture optimization across small/medium/large configurations, and advanced optimization achieving state-of-the-art performance. Key results demonstrate perfect XOR convergence validation (loss reduction from 0.7065 to 0.0198), competitive baseline performance against Random Forest (93.3 %±0.013 vs 90.5 %±0.044 accuracy), optimal medium architecture achieving 0.459 RMSLE, and final proposed model reaching 0.3092 RMSLE—representing 31.8 % improvement over Random Forest (0.4536) and 27.4 % over enhanced Keras baselines (0.4261). The framework incorporates comprehensive residual diagnostics, feature importance analysis, and computational profiling with statistical significance testing. Results establish new benchmarks for NYC taxi duration prediction while providing a methodologically replicable framework for future urban mobility analytics and operational ETA systems.</div></div>","PeriodicalId":100776,"journal":{"name":"Journal of Economy and Technology","volume":"4 ","pages":"Pages 266-283"},"PeriodicalIF":0.0,"publicationDate":"2025-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145683671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-10-25DOI: 10.1016/j.ject.2025.09.003
Yunfan Zhang , Yifan Su , Yue Chen , Feng Liu
{"title":"Corrigendum to “Asynchronous distributed charging protocol for plug-in electric vehicles” [J. Econ. Technol., (2026) 29–47]","authors":"Yunfan Zhang , Yifan Su , Yue Chen , Feng Liu","doi":"10.1016/j.ject.2025.09.003","DOIUrl":"10.1016/j.ject.2025.09.003","url":null,"abstract":"","PeriodicalId":100776,"journal":{"name":"Journal of Economy and Technology","volume":"4 ","pages":"Page 187"},"PeriodicalIF":0.0,"publicationDate":"2025-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145362189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-10-25DOI: 10.1016/j.ject.2025.09.004
Cheng Ye, Daniel Fabbri
{"title":"Corrigendum to “Next generation of electronic medical record search engines to support chart reviews: A systematic user study and future research direction” [Journal of Economy and Technology (2024) 22–30]","authors":"Cheng Ye, Daniel Fabbri","doi":"10.1016/j.ject.2025.09.004","DOIUrl":"10.1016/j.ject.2025.09.004","url":null,"abstract":"","PeriodicalId":100776,"journal":{"name":"Journal of Economy and Technology","volume":"4 ","pages":"Page 186"},"PeriodicalIF":0.0,"publicationDate":"2025-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145362190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-08-29DOI: 10.1016/j.ject.2025.08.001
Aadit Shah, Surindernath Sivakumar, Prabakaran N
This paper presents a comparative study of various homomorphic encryption models to evaluate their qualitative and quantitative benefits and drawbacks in performing computations on encrypted data. Within the framework of ethical AI, the study focuses on enhancing privacy, secrecy, and security, addressing limitations in existing privacy-preserving solutions such as differential privacy and secure multi-party computation. To provide context, related encryption paradigms such as symmetric, asymmetric, hybrid, and multi-party computation are also discussed. The review synthesizes findings from recent literature, comparing schemes based on key performance metrics including encryption and decryption speed, memory consumption and quantum resistance. Published benchmark results and case studies are used to highlight trade-offs between privacy guarantees and computational feasibility. The study highlights the practicality of homomorphic encryption for real-world applications, providing information on its potential to advance privacy-preserving AI while maintaining computational feasibility. The paper also surveys practical applications of homomorphic encryption in machine learning, secure data analytics, and federated learning, along with emerging challenges such as quantum-safe cryptography and hardware acceleration. This review serves as a consolidated reference for researchers and practitioners seeking to select appropriate encryption techniques for AI applications, providing both a broad overview of the field and a focused discussion on homomorphic encryption’s capabilities and limitations.
{"title":"Encrypted intelligence: A comparative analysis of homomorphic encryption frameworks for privacy-preserving AI","authors":"Aadit Shah, Surindernath Sivakumar, Prabakaran N","doi":"10.1016/j.ject.2025.08.001","DOIUrl":"10.1016/j.ject.2025.08.001","url":null,"abstract":"<div><div>This paper presents a comparative study of various homomorphic encryption models to evaluate their qualitative and quantitative benefits and drawbacks in performing computations on encrypted data. Within the framework of ethical AI, the study focuses on enhancing privacy, secrecy, and security, addressing limitations in existing privacy-preserving solutions such as differential privacy and secure multi-party computation. To provide context, related encryption paradigms such as symmetric, asymmetric, hybrid, and multi-party computation are also discussed. The review synthesizes findings from recent literature, comparing schemes based on key performance metrics including encryption and decryption speed, memory consumption and quantum resistance. Published benchmark results and case studies are used to highlight trade-offs between privacy guarantees and computational feasibility. The study highlights the practicality of homomorphic encryption for real-world applications, providing information on its potential to advance privacy-preserving AI while maintaining computational feasibility. The paper also surveys practical applications of homomorphic encryption in machine learning, secure data analytics, and federated learning, along with emerging challenges such as quantum-safe cryptography and hardware acceleration. This review serves as a consolidated reference for researchers and practitioners seeking to select appropriate encryption techniques for AI applications, providing both a broad overview of the field and a focused discussion on homomorphic encryption’s capabilities and limitations.</div></div>","PeriodicalId":100776,"journal":{"name":"Journal of Economy and Technology","volume":"4 ","pages":"Pages 252-265"},"PeriodicalIF":0.0,"publicationDate":"2025-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145623301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-07-23DOI: 10.1016/j.ject.2025.07.003
Nouri Hicham , Nassera Habbat
This study introduces a new way to analyze financial sentiment by combining advanced transformer-based models with generative artificial intelligence (AI) to better understand the language and context of financial discussions. The objective is to enhance the predictive accuracy of market behavior through improved understanding of investor sentiment. The proposed sentiment analysis framework leverages six domain-specific datasets: Social Sentiment Indices (X-Scores), Fin-SoMe, SemEval-2017 Task 5, Fin-Lin, Sanders, and Taborda. These datasets, primarily sourced from social media, reflect diverse investor perspectives. Generative AI models, like GPT-3.5 and GPT-4, are used to create more data, and the meaning of words is enhanced using techniques like BERT and Word2Vec. The model is trained with a cross-entropy loss function and fine-tuned using Few-shot Learning, Chain-of-Thought reasoning, and ReAct strategies, ensuring computational efficiency. Experimental results show consistent improvements across all datasets in accuracy, precision, recall, specificity, and F1 score. The use of generative AI and transformer architectures makes the model stronger and better at understanding how investors feel in real financial situations. This research contributes to the field of explicable AI in finance by demonstrating the impact of domain-adapted models and generative techniques in advancing sentiment analysis. The findings offer practical value for investors and analysts seeking data-driven insights into market dynamics and decision-making processes.
{"title":"Synergizing transformer-based models and financial sentiment analysis: A framework for generative AI in economic decision-making","authors":"Nouri Hicham , Nassera Habbat","doi":"10.1016/j.ject.2025.07.003","DOIUrl":"10.1016/j.ject.2025.07.003","url":null,"abstract":"<div><div>This study introduces a new way to analyze financial sentiment by combining advanced transformer-based models with generative artificial intelligence (AI) to better understand the language and context of financial discussions. The objective is to enhance the predictive accuracy of market behavior through improved understanding of investor sentiment. The proposed sentiment analysis framework leverages six domain-specific datasets: Social Sentiment Indices (X-Scores), Fin-SoMe, SemEval-2017 Task 5, Fin-Lin, Sanders, and Taborda. These datasets, primarily sourced from social media, reflect diverse investor perspectives. Generative AI models, like GPT-3.5 and GPT-4, are used to create more data, and the meaning of words is enhanced using techniques like BERT and Word2Vec. The model is trained with a cross-entropy loss function and fine-tuned using Few-shot Learning, Chain-of-Thought reasoning, and ReAct strategies, ensuring computational efficiency. Experimental results show consistent improvements across all datasets in accuracy, precision, recall, specificity, and F1 score. The use of generative AI and transformer architectures makes the model stronger and better at understanding how investors feel in real financial situations. This research contributes to the field of explicable AI in finance by demonstrating the impact of domain-adapted models and generative techniques in advancing sentiment analysis. The findings offer practical value for investors and analysts seeking data-driven insights into market dynamics and decision-making processes.</div></div>","PeriodicalId":100776,"journal":{"name":"Journal of Economy and Technology","volume":"4 ","pages":"Pages 146-170"},"PeriodicalIF":0.0,"publicationDate":"2025-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144827816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-07-16DOI: 10.1016/j.ject.2025.07.002
Gazi Nazia Nur, Cameron A. MacKenzie, Kyung Jo Min
An integrated model considering both generation and transmission expansions is needed for long-term planning in the electrical sector because of the interlinked nature of these decisions. Our paper presents a sequential compound option framework to assist decision-makers in the electric power industry in evaluating generation and transmission expansion investments. By incorporating electricity demand uncertainty into the decision-making process, this framework offers a structured approach for assessing short-term generation decisions and long-term transmission decisions in a coordinated manner. Assuming electricity demand follows geometric Brownian motion (GBM), we employ a binomial lattice model to map uncertain demand and evaluate the value of the compound option. The locational marginal price (LMP), which reflects the physical constraints of the power network, is used as the basis for valuation in our model, and reductions in LMP resulting from expansions serve as the measure of project benefit. This integrated approach enables decision-makers to assess the feasibility of generation and transmission expansion projects within a unified framework and determine the optimal timing for exercising the underlying options.
{"title":"Valuation of a sequential compound option considering electricity generation and transmission expansions","authors":"Gazi Nazia Nur, Cameron A. MacKenzie, Kyung Jo Min","doi":"10.1016/j.ject.2025.07.002","DOIUrl":"10.1016/j.ject.2025.07.002","url":null,"abstract":"<div><div>An integrated model considering both generation and transmission expansions is needed for long-term planning in the electrical sector because of the interlinked nature of these decisions. Our paper presents a sequential compound option framework to assist decision-makers in the electric power industry in evaluating generation and transmission expansion investments. By incorporating electricity demand uncertainty into the decision-making process, this framework offers a structured approach for assessing short-term generation decisions and long-term transmission decisions in a coordinated manner. Assuming electricity demand follows geometric Brownian motion (GBM), we employ a binomial lattice model to map uncertain demand and evaluate the value of the compound option. The locational marginal price (LMP), which reflects the physical constraints of the power network, is used as the basis for valuation in our model, and reductions in LMP resulting from expansions serve as the measure of project benefit. This integrated approach enables decision-makers to assess the feasibility of generation and transmission expansion projects within a unified framework and determine the optimal timing for exercising the underlying options.</div></div>","PeriodicalId":100776,"journal":{"name":"Journal of Economy and Technology","volume":"4 ","pages":"Pages 57-76"},"PeriodicalIF":0.0,"publicationDate":"2025-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144703400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-07-01DOI: 10.1016/j.ject.2025.06.003
Sattenapalli Kalyani, Vydeki D
The Internet of Things (IoT) links intelligent devices across various sectors, including healthcare, smart cities, and industrial systems, aiming to improve everyday experiences. Despite its benefits, RPL-based routing is commonly adopted in IoT networks operating under low-power and lossy network conditions, which are susceptible to security vulnerabilities, most notably Rank attacks, which distort the routing structure and reduce network performance. Traditional rule-based defenses struggle to scale with dynamic traffic and complex attack patterns, necessitating more adaptive solutions. This paper presents a lightweight, ensemble-based Intrusion Detection System (IDS) that integrates Support Vector Machine (SVM) and XGBoost algorithms to detect Rank attacks in RPL-based IoT environments. A comprehensive dataset was generated by simulating both static and dynamic Rank attack scenarios. Mutual Information and Recursive Feature Elimination (RFE) methods were employed for feature selection. The developed ensemble model exhibited robust performance, reaching an average accuracy of 98.4 %, a precision of 98.2 %, a recall of 97.1 %, an F1-score of 0.97, and a False Positive Rate (FPR) is 1.8 %, an Area Under the Curve (AUC) greater than 0.96 when evaluated using 5-fold cross-validation. Comparative experiments were conducted with traditional machine learning algorithms such as Support Vector Machine (SVM), Decision Tree (DT), and Random Forest (RF), alongside advanced deep learning architectures including Long Short-Term Memory (LSTM) networks and hybrid models like CNN-LSTM, to effectively demonstrate the superior efficiency and detection capabilities of the proposed approach. Unlike deep models, the proposed solution is resource-efficient and well-suited for deployment on constrained IoT devices. Practical considerations such as latency, computational overhead, and model interpretability are discussed to support real-world applicability. This work introduces one of the initial ensemble learning frameworks tailored for Rank attack detection in RPL, offering both academic insights and engineering relevance for secure IoT deployments.
{"title":"A resource-efficient ensemble machine learning framework for detecting rank attacks in RPL-based IoT networks","authors":"Sattenapalli Kalyani, Vydeki D","doi":"10.1016/j.ject.2025.06.003","DOIUrl":"10.1016/j.ject.2025.06.003","url":null,"abstract":"<div><div>The Internet of Things (IoT) links intelligent devices across various sectors, including healthcare, smart cities, and industrial systems, aiming to improve everyday experiences. Despite its benefits, RPL-based routing is commonly adopted in IoT networks operating under low-power and lossy network conditions, which are susceptible to security vulnerabilities, most notably Rank attacks, which distort the routing structure and reduce network performance. Traditional rule-based defenses struggle to scale with dynamic traffic and complex attack patterns, necessitating more adaptive solutions. This paper presents a lightweight, ensemble-based Intrusion Detection System (IDS) that integrates Support Vector Machine (SVM) and XGBoost algorithms to detect Rank attacks in RPL-based IoT environments. A comprehensive dataset was generated by simulating both static and dynamic Rank attack scenarios. Mutual Information and Recursive Feature Elimination (RFE) methods were employed for feature selection. The developed ensemble model exhibited robust performance, reaching an average accuracy of 98.4 %, a precision of 98.2 %, a recall of 97.1 %, an F1-score of 0.97, and a False Positive Rate (FPR) is 1.8 %, an Area Under the Curve (AUC) greater than 0.96 when evaluated using 5-fold cross-validation. Comparative experiments were conducted with traditional machine learning algorithms such as Support Vector Machine (SVM), Decision Tree (DT), and Random Forest (RF), alongside advanced deep learning architectures including Long Short-Term Memory (LSTM) networks and hybrid models like CNN-LSTM, to effectively demonstrate the superior efficiency and detection capabilities of the proposed approach. Unlike deep models, the proposed solution is resource-efficient and well-suited for deployment on constrained IoT devices. Practical considerations such as latency, computational overhead, and model interpretability are discussed to support real-world applicability. This work introduces one of the initial ensemble learning frameworks tailored for Rank attack detection in RPL, offering both academic insights and engineering relevance for secure IoT deployments.</div></div>","PeriodicalId":100776,"journal":{"name":"Journal of Economy and Technology","volume":"4 ","pages":"Pages 171-185"},"PeriodicalIF":0.0,"publicationDate":"2025-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144911911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}