Journal of Interdisciplinary Innovational Letters https://jiil.org.pk/index.php/Journal <p>Journal of Interdisciplinary Innovational Letters (JIIL) is a leading journal which provide a forum for communication across a wide range of disciplines, including, but not limited to:</p> <ul> <li>Survey Sampling</li> <li>Machine Learning</li> <li>Neural Networking</li> <li>Bio-Statistics</li> <li>Operations Research</li> <li>Geo-Statistics</li> <li>Biological and Biomedical Sciences.</li> <li>Computer Science and Information Technology</li> <li>Data Science</li> <li>Ecology</li> <li>Engineering</li> <li>Genetics and Genomics </li> <li>Medicine and Related Disciplines</li> <li>Mathematics</li> <li>Statistics </li> </ul> en-US editorinchief@jiil.org.pk (Dr. Waseem Iqbal ) khaliqalvi@gmail.com (Abdul Khaliq Alvi) Mon, 30 Jun 2025 00:00:00 +0000 OJS 3.3.0.7 http://blogs.law.harvard.edu/tech/rss 60 Empowering OS Efficiency: A Contemporary Investigation of Paradigms of Process Scheduling Algorithms https://jiil.org.pk/index.php/Journal/article/view/8 <p>In task scheduling, every process that has a processor must be supported in parallel processing. in numerous circumstances. Not every algorithm is more effective on important tasks. Occasionally, different algorithms do work better than others. Scheduling algorithms used in contemporary operating systems are compared and discussed. This study's goal is to assess the efficiency and resource consumption of various scheduling algorithms used in the two most popular operating systems, Windows and Linux. Scheduling algorithms are essential for controlling tasks and allocating system resources like memory and CPU time. Effective resource utilization, fairness between many activities, and optimal system performance should all be guaranteed by a smart scheduling algorithm. The project shows a thorough literature assessment of operating system scheduling algorithms, outlining each algorithm's key characteristics, benefits, and drawbacks. The paper also discusses the techniques for assessing the scheduling algorithms' performance, resource use, and example test questions. The study's findings and analysis are included in the report, along with comparisons and contrasts between the scheduling algorithms employed by Windows and Linux. Both operating systems use priority-based scheduling algorithms, but they operate differently in prioritizing threads, sharing time, and scheduling real-time operations. This ends with a discussion of potential future research topics in operating system scheduling algorithms. As technology develops, new difficulties in workload diversity, hardware heterogeneity, and system scalability will emerge. Therefore, it is crucial to keep researching new scheduling algorithms and guidelines that can handle these issues and enhance the functionality, fairness, and resource efficiency of systems. In conclusion, this work gives important insights into the performance, fairness, and resource utilization of scheduling algorithms seen in contemporary operating systems. The study builds on current research in operating system scheduling algorithms and lays the groundwork for more studies in this field. The results of this study may be used for the selection and enhancement of scheduling algorithms for better system performance and resource utilization by operating system designers and&nbsp;researchers.</p> Ayaz Ali Mandan, Zaeem Nazir, Syed Pervez Hussnain Shah, Muhammad Haris, Muhammad Akram Mujahid Copyright (c) 2025 Journal of Interdisciplinary Innovational Letters https://jiil.org.pk/index.php/Journal/article/view/8 Mon, 30 Jun 2025 00:00:00 +0000 AI-Based Healthcare Mobile Applications: Complexity and Its Effects on Adoption https://jiil.org.pk/index.php/Journal/article/view/11 <p>In the contemporary era, artificial intelligence (AI)-based healthcare applications are revolutionizing modern medical services, however, their inherent limitations and complexities can present major barriers to their utilization and adoption. Key issues include interoperability, data privacy, and lack of user trust. These applications are challenging for user owning to their complex user interface (UI) and limited technical literacy. The adopting of these apps necessitates simplified interfaces, enhanced data security, and adhering to ethical principles. The efficiency and reliability of applications can be improved through the design and training tailored to the user’s needs. Considering these principles, this study examines five AI-based healthcare apps, assesses their limitations and shortcomings through expert evaluation, and proposed some suggestions and recommendation for further improvement. This research suggests that, until these issues are addressed, it will be difficult and challenging to realize the full potential of AI-based healthcare applications.</p> Muhammad Azmat Ali, Muhammad Ashraf Ali Awan Copyright (c) 2025 Journal of Interdisciplinary Innovational Letters https://jiil.org.pk/index.php/Journal/article/view/11 Mon, 30 Jun 2025 00:00:00 +0000 Ensuring Quality in Photovoltaic (PV) Plant Construction: A Case Study from the Alhanakiyah 2 GW Haden Solar PV IPP Project, KSA https://jiil.org.pk/index.php/Journal/article/view/10 <p style="text-align: justify;"><span lang="EN-US">With particular reference to the Alhanakiyah 2 GW Haden Solar PV IPP Project in Saudi Arabia, this study offers a thorough analysis of quality assurance and quality control (QAQC) approaches in photovoltaic (PV) plant construction. Drawing on 12 years of professional experience and guided by industry standards and documentation procedures, the study examines important elements of equipment and material approval, quality documentation, and efficient site operations. PV infrastructure is focused on enhancing performance reliability, reducing environmental damage, and guaranteeing long-term sustainability. The study highlights how robust QAQC implementation not only improves performance reliability and system efficiency but also minimizes potential risks during construction and post-commissioning phases. It also underscores the importance of environmental stewardship by mitigating ecological impact through quality-driven practices. Overall, the findings contribute practical insights for engineering professionals, project managers, and quality practitioners aiming to optimize construction outcomes and ensure high standards in utility-scale PV power generation projects.</span></p> Muhammad Haseeb Khalid Copyright (c) 2025 Journal of Interdisciplinary Innovational Letters https://jiil.org.pk/index.php/Journal/article/view/10 Mon, 30 Jun 2025 00:00:00 +0000 A Comparative Analysis of Different Spectrum Sensing Techniques in Cognitive Radio Networks https://jiil.org.pk/index.php/Journal/article/view/12 <p>The enormous need for radio frequency (RF) spectrum brought on by the exponential rise in wireless communication technologies has caused serious spectrum shortage. Reliable and high-quality wireless communication is hampered by this lack. By allowing dynamic spectrum access for secondary users (SUs) without disturbing licensed primary users (PUs), cognitive radio networks (CRNs) have developed as a solution to this issue. This work investigates several spectrum detection methods employed in CRNs to find accessible frequency ranges. Presented here is a thorough examination of these methods, assessing their detection accuracy, complexity, and robustness performance. The paper also examines the difficulties connected with spectrum sensing and presents future research plans.</p> Rizwan Arshad Copyright (c) 2025 Journal of Interdisciplinary Innovational Letters https://jiil.org.pk/index.php/Journal/article/view/12 Mon, 30 Jun 2025 00:00:00 +0000 Analyzing Vulnerabilities and Exploitation in Bluetooth Security of Wireless Communication: A Security Framework https://jiil.org.pk/index.php/Journal/article/view/9 <p>Bluetooth has emerged as a ubiquitous wireless technology in personal, IoT, and industrial devices. During the period 2020–2025, several security vulnerabilities were identified in both Classic Bluetooth (BR/EDR) and Bluetooth Low Energy (BLE) protocols, which support passive eavesdropping, man-in-the-middle (MITM), device impersonation, denial-of-service (DoS), and arbitrary code execution attacks. This survey study provides a current review of specification-level vulnerabilities (e.g., KNOB, BIAS, BLURtooth) and implementation flaws (e.g., SweynTooth, BrakTooth, BlueFrag), describes reported exploitation methods and case studies, and discusses countermeasures developed to counter these threats. We contrast the security designs of Classic and BLE, recognize upcoming trends like tighter key management and increased testing, and suggest coming defenses. It is our intention to enlighten professionals regarding the modern landscape of Bluetooth security and shape stronger wireless communications protections.</p> Zaeem Nazir, Muhammad Danish, Burhan Ali , Syed Pervez Hussnain Shah, Syed Samee Hasnain, Muhammad Akram Mujahid Copyright (c) 2025 Journal of Interdisciplinary Innovational Letters https://jiil.org.pk/index.php/Journal/article/view/9 Mon, 30 Jun 2025 00:00:00 +0000