Abstract
Phishing attacks have developed very complex making the use of cultured detection technologies significant for the protection of sensitive information. The research presents a new framework for detecting phishing founded on the convolutional LSTM (ConvLSTM) network and neural ordinary differential equations (Neural ODEs) thereby refining detection robustness and accuracy. It joins a number of advanced methods like Gaussian noise injection for enhancing the simplification ability of the model and a hybrid Particle Swarm Optimization (PSO) and Sailfish Optimization (SFO) method for effective feature selection. In addition, it confirms safe decisions and regularly reviewing phishing risks by means of a genetic algorithm to improve the Zero Trust Implementation Framework. The optional model performs very well with F1 scores above 99 and recall, accuracy, and precision above 99. Associated to existing methods the proposed model performs significantly better reducing false positives and false negatives and contribute a higher degree of phishing detection accuracy. Future developments to the system will contain multi-modal data integration actual flexibility intelligible AI, and more scalability to handle important applications. Increasing the dataset to include changing phishing techniques could further improve detection services and support the system’s resistance to new threats.
Keywords
Introduction
A fundamental feature of cybersecurity is phishing detection, as it focuses on detecting and uncertain fraudulent efforts to obtain private information through illegal means. Attackers have been known to frequently create phishing websites or furnace deceptive looking emails in command to deceive people into close-fitting private info. Several techniques against this have developed like algorithmic machine learning that studies websites content as well as web addresses and URL structures to spot the difference in malicious and legally operating websites. Advanced detection is essential along with prevention since today’s phishing can be quite expanded and spread around web, email, and most highly social networks.
Recent research has focused on the use of deep learning and neural network architectures to enhance phishing detection capabilities. Using certain characteristics of URLs, email headers, and online content, feature-based phishing detection detects phishing attempts. However, it may not be able to identify new strategies or disguised URLs. By identifying new strategies and gathering contextual data, behaviour-based phishing detection leverages machine learning to forecast future behaviour. In this study, Mishra and Soni 1 developed a CNN model that detected these phishing attempts with an accuracy of 98.74%, thereby showing the possibility of deep learning in seeing risks that haven’t been noticed before.
Advanced phishing attacks require more complex detection techniques. One of the methods stated here is Phish Defense. Phish defense is the term for a collection of security measures or tools, such as specialized software or algorithms made to recognize fraudulent URLs, emails, or websites, intended to detect and stop phishing attacks. This technique works deep RNNs to look at the textual content of a URL. It is, therefore possible to detect phishing efforts without any specific need for characteristics of any external nature thereby growing the speed and effectiveness of detection. 2 Phishing attempts have changed over time, become increasingly complex and challenging to identify. They use social media insights and personal information to target people or organizations. To safeguard sensitive data, businesses need to have strong detection systems in place.
It was proposed to combine theory with deep learning in yet another innovative manner. In a very novel method 3 presented a cyber describes system combining CNN and LSTM architectures with the African Vulture Optimization Algorithm. The hybrid model presented remarkable sensitivity and accuracy in phishing attempt detection presented that deep learning and optimization techniques can be useful in the field of cybersecurity.
A modified 1D CNN is employed by the Phish Guard model for actual phishing webpage detection. Usually a protection system or service, Phish Guard monitors and stops phishing attempts in real time, frequently using threat intelligence feeds, heuristics, or machine learning to spot questionable behaviour. Therefore, outdoes benchmark models while providing reasonable predictions which is energetic for system transparency and user confidence. A review of various neural network-based deep learning algorithms for phishing detection by Sahingoz et al. 4 highlights the importance of incessant invention to fight against the continually moving phishing techniques.
Other than the architecture, noise injection methods to improve the flexibility and simplification of the models have also been considered. Controlled noise at the training point may avoid overfitting improve the model’s resistance to combative inputs and improve the facility of the models to be put to greater effect in practical cases. Zero Trust Security is a complete security architecture founded on the idea that no entity, whether within or outside the network, should ever be trusted by default. Access to resources must be granted only after each request, whether from an internal or external source, has been authenticated, approved, and regularly checked. This would give a versatile protection against phishing attacks with the help of the Zero Trust Security model combined with well-cultivated neural architectures and noise injection techniques. This would therefore be supporting the idea of ”never trust, always verify” with confirming continuous validation and monitoring of every request for access.
Problem statement
The cultured phishing attacks today target not only persons but also businesses through fraudulent means masquerading as an effort to feat human weaknesses. Serious cybersecurity dangers arise from the detail that current detection systems fail frequently to retain step with evolving phishing strategies including zero-day attacks and advanced elusion techniques. Even though neural network topologies and machine learning techniques are showing promising results further work should be carried out to enhance actual detection and make the system more robust against aggressive inputs for more reliable operations. Advanced neural structures noise injection techniques and a zero-trust security frame must be combined in order to exceed these limitations and offer robust yet adaptable protection against phishing attacks.
Objectives
To improve neural architectures that exactly detect phishing attacks by evaluating URLs and website contented. The model’s robustness is increased by using noise injection methods to spread performance against antagonistic inputs To recover the sensitivity and accuracy of phishing detection by using deep learning and optimization algorithms. Zero Trust Security should be used for constant verification and admission request monitoring in order to decrease the risk of phishing.
Phishing detection studies due to more sophisticated attacks against the weaknesses of humans. As Basit et al. 5 note, these usually include four phases setting up fake websites that resemble authentic ones sending cruel links via several modes of communication attractive victims to visit those sites and then robbing them of private access information with bank account or login passwords fact common cases in point. Phishing attacks have become more cultured and now target sensitive information via social media, web platforms, and emails. 6
Many advanced detection techniques have been established to overcome these threats. For example, the hybrid deep learning model by utilizing character embedding along with NLP structures for measuring deep character connections and correlations. 7 This type of model fuses deep learning with linearly limited attention to boost online security along with exploiting the precision of existing systems. Another model that was proposed by Asiri et al. 8 was a novel advanced deep learning model that combined feedback and iterative reinstruction for updating models against the ever-changing phishing tactics including attacks. The performance gains of 5 to 5 in terms of accuracy, precision, and F1 scores introduced the idea of a dynamic real-time detection method. Aslam et al. 9 proposed AntiPhishStack a two-phase stacked generalization method to address the disadvantages of traditional phishing detection systems. The stacked LSTM network two-layered formation and fused character level TF-IDF features allowed AntiPhishStack to reach a remarkable 96.04% accuracy on benchmark datasets. One-Hot Encoding and TF-IDF are less effective than AP Encoding at detecting phishing attacks because of their inability to capture meaningful relationships between tokens and their adaptive token representations, which enhance model performance without requiring the computational costs of high-dimensional representations. Its reliable methodology is based on meta-XGBoost classifiers and k-fold cross-validation, which are very caring for phishing detection. Farooq 10 considerably better the detecting facilities by combining ANN and LSTM networks. After training on a secondary dataset their model efficiently improves the detection of bogus websites demonstrating the promise of machine learning and deep learning in resisting phishing threats.
Naga Sushma Allur 11 developed a hybrid deep-learning model for phishing detection that combines stacked autoencoders and SVM classifiers for improved accuracy and fewer false positives. Similar to AI-powered security systems, this model enhances real-time detection of phishing attempts, ensuring higher precision. Our approach builds upon this by incorporating advanced neural architectures and noise injection, further improving robustness and generalisation.
Thirusubramanian Ganesan 12 developed an AI-driven system for detecting financial fraud in IoT environments, utilising advanced algorithms like anomaly detection and clustering. The system enhances real-time fraud detection by distinguishing between legitimate and fraudulent activities, similar to approaches used in phishing detection. Our research applies a similar AI-powered approach, combining advanced neural architectures for detection with noise injection for enhanced robustness. Like Ganesan’s fraud detection system, this approach improves real-time analysis, decision-making, and security, ensuring adaptive learning and continuous monitoring for phishing threats in a Zero Trust framework.
Based on these findings, 13 established a unique model that develops the LSTM GRU algorithm to identify phishing URLs with remarkable accuracy of 98.89, significantly outperforming existing methods. The reason it is highly efficient and very scalable is because it needs less time for testing, training, and storage. Dharini et al. 14 published a multimodal method that joint URL structure analysis and ML methods. Their two-level detection method exceeded other recognized classifiers like XGBoost, Decision Tree, and Logistic Regression with a maximum accuracy of 96 using a Random Forest Classifier. Level 1 consisted of parsing URL components and assessing domain-specific features while Level 2 contained of using machine learning models.
Gupta et al. 15 presented a hybrid deep learning and big data approach to overcome the drawbacks of conventional phishing detection methods. Their approach which associations deep learning and big data for robust phishing detection finds a high accuracy rate of 92 percentage by using Conv2d layers successively to analyse incoming traffic using the Cuckoo optimization algorithm. Shafin 16 developed SLA-FS, a feature selection framework using reasonable techniques like Local Interpretable Model-agnostic Explanations (LIME) and Shapley Additive explanations (SHAP). This framework improves the accuracy of machine learning models by selecting the most relevant features and it has shown its flexibility and precision with an improvement of 0.65% for RF and 0.41% for XGB on an existing phishing dataset.
Methodologies
Figure 1 represents the phishing identification using the PhlUSIIL dataset. The Zero Trust Security architecture guards against phishing attempts by constantly verifying network requests. It guarantees that URLs, emails, and websites correspond with authenticated sources and imposes stringent access constraints, thus reducing any harm. If any questionable components are found, they are marked for more attention. Regardless of the network’s location, zero-trust security forbids faith in any entity. It entails ongoing request verification according to behaviour, context, and identity, which is consistent with phishing detection. Every request is validated by the Zero Trust Implementation Framework, guaranteeing that no entity can penetrate security measures. In the preprocessing stage tokenization is useful along with Gaussian Noise Injection for added robustness. Using BiLSTM, the related features are extracted. Then, from these extracted features the most relevant features are selected using PSO
Data collection
The PhIUSIIL dataset is used to see phishing-related data for the phishing detection process. The PhIUSIIL dataset gathers phishing instances, including URLs, domains, email content, and online traffic statistics. Its features, such as its size, diversity, and kind, represent a variety of phishing attempts, including new and developing assaults, and guarantee that its model can effectively generalize to data that hasn’t been seen before. The data is then pre-processed and tokenized to create analysable tokens. In order to increase the model’s resistance and robustness against aggressive inputs Gaussian noise is included during training. There are many genuine and phishing URLs in the PhIUSIIL dataset, which is utilized in a phishing detection system. In order to distinguish between phishing and legal URLs, the dataset is balanced. It contains a variety of URL types, such as malicious redirection, look-alike sites, and social engineering-based phishing, to illustrate typical phishing attack methods. BiLSTM networks are then used to excerpt features including contextual and sequential relations. It utilizes PSO in the optimization of the features in order to maximize the important features. This provides a zero-trust security framework which is optimally evolved through the use of evolutionary algorithms to guarantee endless monitoring and verification. Deep learning models continuous-time processes using Ordinary Differential Equations (ODEs). Neural ODEs are useful in phishing detection because they can adapt to the temporal features of phishing methods and simulate the ongoing evolution of phishing assault patterns. For the purposes of verifying that the system has a positive response to threats sophisticated models including ConvLSTM and Neural ODEs are applied for classification of the threat. It measures performance using parameters such as accuracy and precision.

Architectural diagram for phishing detection and zero trust security.
Each URL entry in the collection is represented by a vector of features and a label.
Each URL has multiple measurable features. Let
The goal is to find a function
To identify phishing patterns Preprocessing, along with AP encoding, involves the conversion of unstructured data into numerical representations organized from the raw input data. AP Encoding is a technique that helps with huge datasets with different token distributions by using adaptive algorithms to enhance token representation. Nevertheless, it has computational issues, particularly when processing in real time, and it takes more time to modify the encoding for every input character. After splitting up the input data in the form of URLs. AP encoding maps each token to a number based on its position or frequency. AP encoding is a versatile technique for identifying intricate phishing patterns, such as dynamic attempts or disguised URLs. Recording token associations in various sequences improves contextual comprehension, but it may also become more computationally intensive, which makes it less appropriate for sparse datasets and real-time systems. This systematic approach helps the deep learning models to identify the phishing patterns better by highlighting sequential connections in the data. The procedure improves computational efficiency as well as pattern recognition.
Input data
Combine the encoded values of all tokens into a feature vector for each sample
This approach adds Gaussian noise, or random noise with a normal distribution, to model weights or training data. It enhances generalization by keeping the model from overfitting to certain data patterns, which can strengthen the phishing detection model’s resistance to attackers’ evolving strategies. Preprocessing for phishing detection using encoding converts unprocessed data like URLs and email messages into numerical representations for deep learning models. Techniques like one-hot encoding and word embeddings convert the tokens into feature vectors after tokenization divides the data into expressive units like words and characters. Gaussian noise injection improves model generalization by strengthening its resistance to changes in input data, which is important for phishing detection. This makes adaptive phishing techniques easier to spot. The model’s variance, which affects its robustness and rate of convergence, can vary from 0.1 to 0.5. This prepared representation draws attention to movements and anomalies expressive of phishing. Regulating data leads to development in the correct model and compatibility with computational methods.
Let the input dataset be a matrix
Generate a noise matrix
The noise matrix
Add the noise matrix
The noisy dataset is given as
To control the impact of noise introduce a scaling factor
Feature selection, initiated on combined PSO
Hybrid interactions of PSO and SFO optimization
Figure 2 represents the flowchart of the hybrid use of Particle Swarm Optimization (PSO) and Sailfish Optimization (SFO) for phishing detection. The process begins by initializing PSO particles and SFO agents. Fitness is evaluated for each candidate solution based on a phishing detection fitness function. PSO updates the particles’ positions and velocities based on personal and global best solutions, while SFO updates their positions using the predator-prey dynamic. SFO uses a predator-prey model to improve performance, in which the ”predator” looks for the best features, and the ”prey” represents possible solutions (features). This comparison aids the algorithm in concentrating on choosing the most pertinent features for phishing detection, increasing detection accuracy and decreasing overfitting by removing unnecessary information. The hybrid step combines the strengths of both algorithms, where PSO guides SFO and SFO refines PSO solutions. This process iterates until a termination condition is met, resulting in the optimal solution for phishing detection.
Particle swarm optimization
In order to maximize a fitness function particle that represent possible solutions travel across a search space in the typical PSO algorithm. In mathematical terms this is represented as

Flowchart of hybrid interactions of PSO and SFO optimization.
were:
SFO mimics the group dynamics and predatory behavior of sailfish. The relationship between sardines and sailfish serves as the basis for the position updates.
Figure 3 shows the sequential and contextual patterns from textual data, such as emails, URLs, or site content, can be recovered for feature extraction in the context of phishing detection. The first step is to generate the numerical representation of the input text, such as word or character embeddings. BiLSTM then analyses the sequence both forward and backward to obtain the context of the past and the future. Due to their capacity to recognize both forward and backward dependencies in sequential input, BiLSTM networks are perfect for phishing detection. They are able to comprehend the connection between tokens and the context from earlier tokens, offering important information about the general meaning of an email or URL. This makes it possible to detect phishing attempts more precisely. Combining the hidden states of forward and backward LSTMs produces an all-encompassing feature representation, which then goes to classifiers or fully linked layers for the detection of phishing. Due to the twofold size of the hidden information, concatenation in token representation models can result in increased memory use and computational complexity. Inference speed, temporal complexity, and system scalability may all be impacted, particularly for big coins. For real-time detection, careful handling of this trade-off is essential. This technique improves detection by efficiently catching trends like phony URL architecture or dubious email content.

Architecture diagram of BiLSTM using in feature extraction.
Given a sequence of input text as
The input is typically embedded into a vector space
The forward LSTM processes the input sequence from
The forward LSTM captures the context from the past up to the current time step.
The backward LSTM processes the input sequence in reverse, from
The backward LSTM captures the context from the future back to the current time step.
For each time step
The concatenated hidden states are passed to a dense layer or classifier for phishing detection.
The output
This framework focuses on checking each request and interaction in a system based on the principle that no entity is intrinsically trustworthy. Unlike traditional methods, which allow access without further verification, Zero Trust ensures secure interactions through granular access control and live monitoring. This approach ensures that even if an attacker accesses a portion of the network, their access is restricted, hence minimizing possible harm from assaults. Strong authentication, least privilege access, and continuous verification are the core ideas. It utilizes real-time monitoring, URL scanning, and email filtering for detecting phishing as it involves detecting dangerous links or behaviors. AI/ML-based threat intelligence is aggregated to dynamically react and adapt to new phishing tactics. The Zero Trust approach reduces the attack surface and the probability of successful phishing attempts by implementing strict access controls and authenticating people and devices at every turn.
Optimization for zero trust using genetic algorithm
Genetic Algorithm performs optimization for zero trust in phishing detection by finding the best settings for access control regulations, authentication systems, and phishing threat response tactics. The GA is an optimization method in the Zero Trust Implementation Framework based on natural selection. It enhances the efficiency of security policy enforcement and phishing detection by selecting ideal setups, conducting ongoing verification, and adapting to phishing trends. GA iteratively creates solutions to increase detection accuracy while reducing false positives by mimicking natural selection processes like crossover and mutation. This method will allow the dynamic adjustment of Zero Trust parameters so that it identifies and prevents phishing attempts without jeopardizing the system’s security and performance.
Problem definition
The goal is to optimize Zero Trust parameters for phishing detection by maximizing detection accuracy (
A set of chromosomes
Evaluate the fitness of each chromosome using the phishing detection metrics
The best chromosome Classification of BiLSTM.
Figure 4 represents a ConvLSTM-based architecture for phishing detection. Each input layer represents features processed independently. These features are passed through ConvLSTM layers to extract spatial-temporal dependencies. The outputs are flattened to a 1D vector representation. The flattened vectors are then concatenated to form a unified feature representation. Finally, the concatenated features are passed through a fully connected layer for classification into phishing or legitimate classes represented at the output layer. This approach integrates temporal and spatial patterns for improved detection.
Input processing
Feed the feature sequence
The final hidden state
Output ”phishing” if
In NeuralODEs, time-dependent changes in features are represented as a continuous system of ODEs, describing dynamic and evolving behaviors. Neural ODEs are often applied in phishing detection, where time-varying patterns in variables, such as network behavior, domain changes, or URL activity, can be detected. Neural ODEs work with regularly sampled data and adapt in learning typical behaviors, detecting abnormalities that could be associated with phishing. The computation of hidden states by the NeuralODE provides a reliable method for modeling changing threats, which are used to perform binary categorization into phishing or legal categories.
Dynamic behavior modelling
The patterns of phishing often reflect time-dependent, dynamic behaviors such as sudden surges in user activity or structural changes to URLs (like obfuscated parameters). NeuralODEs make use of a system of ODEs that can continuously learn the temporal development of these changing properties. This will effectively detect phishing by capturing typical and unusual trends.
The state at time
NeuralODEs learn normal behavior patterns by computing hidden states
Output layer
Confusion matrices
This confusion matrix evaluates a phishing detection model’s performance. The model correctly identified 2427 No phishing cases True Negatives and 3550 Phishing cases True Positives. It made only 12 false alarms False Positives predicting Phishing when it was not and missed 11 phishing cases False Negatives. The darker blue colours highlight higher counts showing the model is highly accurate with minimal errors in both categories. Figure 5 shows the excellent phishing detection performance.

Confusion matrices.
Figure 6(a) shows the training and validation accuracy of a model over epochs. The training accuracy steadily improves and stabilizes near 99-100%, indicating the model learns well. The validation accuracy closely follows the training accuracy, suggesting good generalization to unseen data with minimal overfitting. Both lines converge after around 10 epochs, demonstrating stable and effective model performance.

(a) Training and validation accuracy (b) Training and validation loss.
Figure 6(b)shows the training loss and validation loss over epochs. Both losses decrease steadily, indicating that the model is learning and improving its predictions. The validation loss closely follows the training loss signifying good generalization to unseen data with minimal overfitting. Around epoch 10, the losses stabilize, showing that the model has reached optimal learning. The absence of significant divergence between the two lines confirms that the model is neither underfitting nor overfitting. Overall, the model demonstrates effective training and strong performance.
Figure 7 compares the ROC curve performance of three models Convolutional, Decision Tree (DT), and Random Forest (RF). The x-axis represents the False Positive Rate, while the y-axis represents the True Positive Rate. The Convolutional model performs the best with an AUC of 0.998, followed by DT with 0.988, and RF with 0.925. AUC values closer to 1 indicate better classification performance, and all three models perform significantly better than random guessing (AUC
Figure 8 shows the Precision-Recall Curve evaluates the trade-off between Precision and Recall. The blue curve remains close to the top-right corner, indicating the model maintains high precision and recall simultaneously. The AUC value of 0.99 signifies near-perfect performance, with minimal false positives and negatives. This curve shows the model is highly effective especially for scenarios where correctly identifying positives is crucial.

Receiver operating curve.

Precision recall curve.
The model performs very well across multiple metrics. With 99.75 percentage accuracy, it correctly expects most examples. The model has efficiently recognized positive cases and compact false positives as seen by its precision at 99.78 percent and recall at 99.85 percent. Excellent mix between recall and precision may be seen by the F1 score of 99.81. Furthermore, FPV 0.00497 and FNR 0.00387 are very low, meaning that there is very little wrong classification, and Kappa 99.64 and Jaccard 99.70, further supports outstanding performance by the model shown in Table 1.
Figure 9 illustrates the model’s performance metrics, all nearing 100%, indicating exceptional results. Accuracy reflects the model’s overall correctness, while Precision and Recall demonstrate its ability to minimize false positives and false negatives, respectively. The F1-Score shows a perfect balance between precision and recall, confirming robust performance. The Jaccard Index measures strong agreement between predicted and actual labels, and Cohen’s Kappa shows near-perfect agreement, accounting for chance. Overall, the model performs excellently across all metrics, indicating reliable and effective classification.

Model performance metrics.
Performance analysis of proposed work.
In Figure 10 two performance metrics FPV and FNR are compared. The FNR describes the rate of positive amounts incorrectly classified as negatives while the rate of negative examples incorrectly categorized as positives is defined by FPV which is higher by just a few percent. The model does well with minimal wrong classification at both very low values. A slightly higher FPV specifies a rather greater rate of false alarms, while a lower FNR recommends that the model is improved at detecting true positives. In general, these error rates are balanced by the model.

Performance metrics of FPV&FNR.
The comparison shows the accuracy performance of several methods. The recommended approach which combines ConvLSTM with neural ODEs attains the maximum accuracy of 99.75, while Alshingiti et al. 18 used CNN and LSTM-CNN to get 99.2 accuracy. Rathee 19 achieve 98.5 accuracy with an SVM model, but Wang et al. 17 use RCNN and achieve 95.6 accuracy. Lastly, Akour et al. 20 use KNN to obtain 94 accuracies. These results demonstrate how various learning approaches work differently on the task at hand shown in Table 2.
Comparative performance metrics.
Comparative performance metrics.
In considering the various methods used in different studies for deep learning-related tasks numerous methodologies are exposed. Although this method used ConvLSTM and neural ODEs, another study used RCNN, 17 CNN coupled with LSTM-CNN, 18 SVM, 19 and KNN 20 to attain the results. The fact that different plans scored between 94 and 99.78 makes clear how well a given method is working at its purpose.
A diversity of deep learning approaches and their corresponding recall values are extended done contrast. The proposed method that makes use of ConvLSTM and neural ODEs achieves a recall of 99.85 other studies account lower remember rates. Alshingiti et al. 18 obtain 97.6 recall using CNN and LSTM-CNN, and Wang et al. 17 get 93.78 using RCNN. Other methods like SVM 19 and KNN 20 which have standards of 99.41 and 94 respectively prove the approaches to be actual in various applications.
The performance of each deep learning technique is displayed by comparing its F1 score. With the use of neural ODEs and ConvLSTM the recommended approach attains an outstanding F1 score of 99.81. Using CNN and LSTM-CNN, 18 get an F1 score of 98.2, while Wang et al. 17 use RCNN and acquire an F1 score of 95.52. Rathee 19 use SVM to acquire a 99.27 F1 score while 20 use KNN to achieve a 94 score. These findings demonstrate the variety of methods and their suitability for various settings Figure 11.
This bar chart comparisons the performance of four studies on the following four measures F1 Score, Accuracy, Precision, and Recall. Each measure has four bars that agree to a different study. Wang et al., 17 Alshingiti et al., 18 Akour et al., 20 and the recommended method. The graph displays percentages of performance the higher bars are the better performances. Of course, the graph shows how each study performs in contrast to the others for each measure.

Comparative analysis.
The proposed phishing detection framework using ConvLSTM and Neural ODEs has been highly effective. Besides a Zero Trust Implementation Framework for safe decision-making, it incorporates strong feature selection methods such as hybrid PSO
Footnotes
Author contributions
Nashwan Adnan OTHMAN- Methodology, Project Administration, Manuscript editing; Omar Sedqi Kareem, Zardasht Abdulaziz Abdulkarim SHWANY- Software, Validation; Younus Ameen Muhammed, Mehmet Umut SALUR- Visualization, Manuscript Review and editing; Adnan Burhan Rajab- Design Framework, Resources, Validation.
Funding
The author(s) received no financial support for the research, authorship, and/or publication of this article.
Declaration of conflicting interests
The author(s) declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article.
Data availability statement
All data generated or analyzed during this study are included in the manuscript.
