首页 > 最新文献

International Journal of Emerging Technology and Advanced Engineering最新文献

英文 中文
An Observer-Based Backstepping Controller for Spacecraft Attitude Control System 基于观测器的航天器姿态控制系统反演控制器
Pub Date : 2023-06-25 DOI: 10.46338/ijetae0623_01
E. Aljuwaiser
In this paper an observer-based controller is developed for continuous-time spacecraft attitude control system. Firstly, a high gain observer is created for the system model. Then, the estimated states are used to generate a backstepping controller to regulate the performance of sate variables to the desired states. Then, the nonlinear closed loop control system is simulated to demonstrate the effectiveness of the developed control approach in regulating the performance of the system to the desired steady state.
针对连续时间航天器姿态控制系统,提出了一种基于观测器的控制器。首先,对系统模型建立一个高增益观测器。然后,利用估计的状态生成一个反步控制器来调节安全变量的性能到期望的状态。然后,对非线性闭环控制系统进行了仿真,验证了所开发的控制方法在将系统性能调节到所需稳态方面的有效性。
{"title":"An Observer-Based Backstepping Controller for Spacecraft Attitude Control System","authors":"E. Aljuwaiser","doi":"10.46338/ijetae0623_01","DOIUrl":"https://doi.org/10.46338/ijetae0623_01","url":null,"abstract":"In this paper an observer-based controller is developed for continuous-time spacecraft attitude control system. Firstly, a high gain observer is created for the system model. Then, the estimated states are used to generate a backstepping controller to regulate the performance of sate variables to the desired states. Then, the nonlinear closed loop control system is simulated to demonstrate the effectiveness of the developed control approach in regulating the performance of the system to the desired steady state.","PeriodicalId":169403,"journal":{"name":"International Journal of Emerging Technology and Advanced Engineering","volume":"586 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131277763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Predicting Nitrogen Content in Oil Palms through Machine Learning and RGB Aerial Imagery 通过机器学习和RGB航空图像预测油棕榈的氮含量
Pub Date : 2023-06-25 DOI: 10.46338/ijetae0623_03
Kielvien Lourensius Eka Setia Putra, Fabian Surya Pramudya, A. A. Gunawan, Prasetyo Mimboro
—Nitrogen is a crucial nutrient for the sustainable health and productivity of oil palm plantations. Accurate fertilization for Nitrogencan optimize production while reducing maintenance costs. This study investigates the relationship between various vegetation indices and oil palm Nitrogen content using aerial images. We employ and compare different machine learning algorithms to predict Nitrogen content in oil palms, utilizing RGB aerial images obtained from PT. Perkebunan Nusantara IV (PTPN IV) in North Sumatra. Twelve vegetation indices are assessed, considering the limited spectral information available from the aerial images. Our findings reveal that the random forest algorithm, when applied to Hue, Green Leaf Index, and Coloration Index, yields the highest prediction accuracy of 90.13%. Furthermore, the results demonstrate that machine learning algorithms can effectively overcome the limitations of near-infrared channel availability, allowing for the prediction of Nitrogen content using RGB aerial images as a proxy for chlorophyll absorption.
氮是油棕种植园持续健康和生产力的关键养分。精确的氮肥施肥可以优化产量,同时降低维护成本。利用航拍影像研究了油棕不同植被指数与氮素含量的关系。我们利用北苏门答腊岛PT. Perkebunan Nusantara IV (PTPN IV)获得的RGB航空图像,采用并比较了不同的机器学习算法来预测油棕的氮含量。考虑到航空影像提供的有限光谱信息,对12个植被指数进行了评估。我们的研究结果表明,随机森林算法在色相、绿叶指数和颜色指数上的预测准确率最高,达到90.13%。此外,结果表明,机器学习算法可以有效地克服近红外通道可用性的限制,允许使用RGB航空图像作为叶绿素吸收的代理来预测氮含量。
{"title":"Predicting Nitrogen Content in Oil Palms through Machine Learning and RGB Aerial Imagery","authors":"Kielvien Lourensius Eka Setia Putra, Fabian Surya Pramudya, A. A. Gunawan, Prasetyo Mimboro","doi":"10.46338/ijetae0623_03","DOIUrl":"https://doi.org/10.46338/ijetae0623_03","url":null,"abstract":"—Nitrogen is a crucial nutrient for the sustainable health and productivity of oil palm plantations. Accurate fertilization for Nitrogencan optimize production while reducing maintenance costs. This study investigates the relationship between various vegetation indices and oil palm Nitrogen content using aerial images. We employ and compare different machine learning algorithms to predict Nitrogen content in oil palms, utilizing RGB aerial images obtained from PT. Perkebunan Nusantara IV (PTPN IV) in North Sumatra. Twelve vegetation indices are assessed, considering the limited spectral information available from the aerial images. Our findings reveal that the random forest algorithm, when applied to Hue, Green Leaf Index, and Coloration Index, yields the highest prediction accuracy of 90.13%. Furthermore, the results demonstrate that machine learning algorithms can effectively overcome the limitations of near-infrared channel availability, allowing for the prediction of Nitrogen content using RGB aerial images as a proxy for chlorophyll absorption.","PeriodicalId":169403,"journal":{"name":"International Journal of Emerging Technology and Advanced Engineering","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125401653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identification of Student’s Characteristics in Adaptive Learning System: Systematic Literature Review 适应性学习系统中学生特征的识别:系统文献综述
Pub Date : 2023-06-25 DOI: 10.46338/ijetae0623_02
Rahimah A. Halim, R. Mohemad, N. Ali
Adaptive learning allows students to learn effectively based on their abilities and characteristics at their own pace. Currently, numerous SLRs exist regarding students' adaptive learning characteristics, analyzed from various perspectives by previous researchers. However, it is essential to note that the findings of these studies are based on analyses conducted between 2010 and 2020. This SLR aims to extend and bridge the gaps in identifying essential student characteristics for implementing an adaptive learning system. It specifically focuses on the most recent five-year period, from 2018 to 2022. This study chose 39 articles according to the specified inclusion and exclusion criteria. The findings from the SLR indicate that learning style is the most commonly used element of adaptation in the reviewed articles, followed by knowledge characteristics, cognitive traits, student preference, and motivation. This SLR also revealed that most of the reviewed articles used more than one student's characteristics in modeling the student model, and results show that educators integrated online learning for implementing adaptive learning in the teaching and learning process. The ILS instrument, which is traditional detection, is widely used in collecting learning style data, and besides FSLSM, other learning style models, including VARK, Kolb, and Honey & Mumford, are used to assign students' learning style preferences.
适应性学习允许学生根据自己的能力和特点,按照自己的节奏进行有效的学习。目前,关于学生适应性学习特征的单反很多,前人从不同的角度对其进行了分析。然而,必须指出的是,这些研究的结果是基于2010年至2020年之间进行的分析。该SLR旨在扩展和弥合在识别实施自适应学习系统的基本学生特征方面的差距。它特别关注最近五年,从2018年到2022年。本研究按照规定的纳入和排除标准选择了39篇文献。SLR的研究结果表明,学习风格是研究文章中最常用的适应因素,其次是知识特征、认知特征、学生偏好和动机。该研究还发现,大多数被审查的文章在建模学生模型时使用了多个学生的特征,结果表明教育工作者在教学和学习过程中整合了在线学习以实施适应性学习。传统的检测工具ILS被广泛用于学习风格数据的收集,除了FSLSM之外,还使用VARK、Kolb、Honey & Mumford等其他学习风格模型来分配学生的学习风格偏好。
{"title":"Identification of Student’s Characteristics in Adaptive Learning System: Systematic Literature Review","authors":"Rahimah A. Halim, R. Mohemad, N. Ali","doi":"10.46338/ijetae0623_02","DOIUrl":"https://doi.org/10.46338/ijetae0623_02","url":null,"abstract":"Adaptive learning allows students to learn effectively based on their abilities and characteristics at their own pace. Currently, numerous SLRs exist regarding students' adaptive learning characteristics, analyzed from various perspectives by previous researchers. However, it is essential to note that the findings of these studies are based on analyses conducted between 2010 and 2020. This SLR aims to extend and bridge the gaps in identifying essential student characteristics for implementing an adaptive learning system. It specifically focuses on the most recent five-year period, from 2018 to 2022. This study chose 39 articles according to the specified inclusion and exclusion criteria. The findings from the SLR indicate that learning style is the most commonly used element of adaptation in the reviewed articles, followed by knowledge characteristics, cognitive traits, student preference, and motivation. This SLR also revealed that most of the reviewed articles used more than one student's characteristics in modeling the student model, and results show that educators integrated online learning for implementing adaptive learning in the teaching and learning process. The ILS instrument, which is traditional detection, is widely used in collecting learning style data, and besides FSLSM, other learning style models, including VARK, Kolb, and Honey & Mumford, are used to assign students' learning style preferences.","PeriodicalId":169403,"journal":{"name":"International Journal of Emerging Technology and Advanced Engineering","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133248224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Grid Connected PV Systems Fault Detection using K-Means Clustering Algorithm 基于k -均值聚类算法的并网光伏系统故障检测
Pub Date : 2023-05-13 DOI: 10.46338/ijetae0523_07
Khalil Benmouiza
—Efficiency in photovoltaic (PV) energy production is significantly influenced by various electrical, environmental, and manufacturing-related factors. These variables often lead to a range of PV generator faults, compromising the system's performance and the overall grid's safety. The current fault detection methods can be complex and resource-intensive. In this paper, we propose a novel and efficient grid-connected PV system fault detection mechanism using the k-means clustering algorithm. Our approach categorizes the possible faults based on clustering the output PV and grid powers under healthy and faulty conditions. A comparison between centroid locations of both conditions leads to fault categorization. The findings demonstrate the efficacy of the proposed technique for addressing localized faults in grid-tied PV systems without the need for complicated calculations. The technique is both cost-effective and accurate, with a straightforward application that can be easily adopted by all stakeholders. This method enables users to safeguard their PV system's health and ensure the more comprehensive grid's safety.
-光伏(PV)能源生产的效率受到各种电气、环境和制造相关因素的显著影响。这些变量通常会导致一系列光伏发电机故障,从而影响系统的性能和整个电网的安全。现有的故障检测方法复杂且耗费大量资源。本文提出了一种基于k均值聚类算法的新型高效并网光伏系统故障检测机制。该方法基于对健康状态和故障状态下输出光伏和电网功率的聚类,对可能的故障进行分类。通过比较两种情况的质心位置来进行故障分类。研究结果证明了所提出的技术在不需要复杂计算的情况下解决并网光伏系统局部故障的有效性。该技术既具有成本效益又准确,具有可被所有利益相关者轻松采用的直接应用程序。这种方法可以使用户维护光伏系统的健康,并确保更全面的电网安全。
{"title":"Grid Connected PV Systems Fault Detection using K-Means Clustering Algorithm","authors":"Khalil Benmouiza","doi":"10.46338/ijetae0523_07","DOIUrl":"https://doi.org/10.46338/ijetae0523_07","url":null,"abstract":"—Efficiency in photovoltaic (PV) energy production is significantly influenced by various electrical, environmental, and manufacturing-related factors. These variables often lead to a range of PV generator faults, compromising the system's performance and the overall grid's safety. The current fault detection methods can be complex and resource-intensive. In this paper, we propose a novel and efficient grid-connected PV system fault detection mechanism using the k-means clustering algorithm. Our approach categorizes the possible faults based on clustering the output PV and grid powers under healthy and faulty conditions. A comparison between centroid locations of both conditions leads to fault categorization. The findings demonstrate the efficacy of the proposed technique for addressing localized faults in grid-tied PV systems without the need for complicated calculations. The technique is both cost-effective and accurate, with a straightforward application that can be easily adopted by all stakeholders. This method enables users to safeguard their PV system's health and ensure the more comprehensive grid's safety.","PeriodicalId":169403,"journal":{"name":"International Journal of Emerging Technology and Advanced Engineering","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114854435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Long Short-Term Memory (LSTM): Trends and Future Research Potential 长短期记忆(LSTM):趋势与未来研究潜力
Pub Date : 2023-05-13 DOI: 10.46338/ijetae0523_04
S. Arifin, AndyanKalmer Wijaya, R. Nariswari, I. Yudistira, S. Suwarno, Faisal Faisal, Diah Wihardini
-One of the most widely used machine learning methods, Long Short-Term Memory (LSTM), is particularly useful for time series prediction. In this study, we carried out a bibliometric analysis against publications about LSTMs to identify trends and contributions of researchers in the development of machine learning technology. We collect bibliometric data from the Scopus database and use the bibliometric analysis method to analyze trends and contributions of researchers in publications about LSTM. Results of the bibliometric analysis show that LSTM is a lot used in related machine learning applications with time series data and is one the most popular technique for use in predictions. In addition, the use of LSTM is often combined with other deep learning methods, such as neural networks, to improve accuracy prediction. In addition, the results of the bibliometric analysis also show that the use of LSTM has spread to various fields, such as in handwriting recognition, processing Language experience, and recognition of a face. Implications from the results of this study are that the use of LSTM can provide solutions that are accurate and effective in solving prediction problems in various fields, especially in practical applications such as business, health, and transportation. The results of the LSTM bibliometric analysis can provide a broader view of trends and the contributions of researchers to the development of machine learning technology, as well as identify potential research areas for further development. Therefore, this research provides an important contribution to strengthening the results of previous research and showing that the use of LSTM has great potential in the development of future machine learning technology
-使用最广泛的机器学习方法之一,长短期记忆(LSTM),对时间序列预测特别有用。在这项研究中,我们对关于lstm的出版物进行了文献计量分析,以确定研究人员在机器学习技术发展中的趋势和贡献。我们从Scopus数据库中收集文献计量学数据,利用文献计量学分析方法分析研究者在LSTM相关出版物中的趋势和贡献。文献计量分析结果表明,LSTM在时间序列数据的相关机器学习应用中得到了广泛的应用,是预测中最常用的技术之一。此外,LSTM的使用通常与其他深度学习方法(如神经网络)相结合,以提高预测的准确性。此外,文献计量分析的结果也表明,LSTM的使用已经扩展到各个领域,如手写识别、处理语言经验、人脸识别等。本研究的结果表明,使用LSTM可以为解决各个领域的预测问题提供准确有效的解决方案,特别是在商业、卫生和交通等实际应用中。LSTM文献计量分析的结果可以提供更广泛的趋势视图和研究人员对机器学习技术发展的贡献,并确定进一步发展的潜在研究领域。因此,本研究为加强以往的研究成果提供了重要的贡献,并表明LSTM的使用在未来机器学习技术的发展中具有巨大的潜力
{"title":"Long Short-Term Memory (LSTM): Trends and Future Research Potential","authors":"S. Arifin, AndyanKalmer Wijaya, R. Nariswari, I. Yudistira, S. Suwarno, Faisal Faisal, Diah Wihardini","doi":"10.46338/ijetae0523_04","DOIUrl":"https://doi.org/10.46338/ijetae0523_04","url":null,"abstract":"-One of the most widely used machine learning methods, Long Short-Term Memory (LSTM), is particularly useful for time series prediction. In this study, we carried out a bibliometric analysis against publications about LSTMs to identify trends and contributions of researchers in the development of machine learning technology. We collect bibliometric data from the Scopus database and use the bibliometric analysis method to analyze trends and contributions of researchers in publications about LSTM. Results of the bibliometric analysis show that LSTM is a lot used in related machine learning applications with time series data and is one the most popular technique for use in predictions. In addition, the use of LSTM is often combined with other deep learning methods, such as neural networks, to improve accuracy prediction. In addition, the results of the bibliometric analysis also show that the use of LSTM has spread to various fields, such as in handwriting recognition, processing Language experience, and recognition of a face. Implications from the results of this study are that the use of LSTM can provide solutions that are accurate and effective in solving prediction problems in various fields, especially in practical applications such as business, health, and transportation. The results of the LSTM bibliometric analysis can provide a broader view of trends and the contributions of researchers to the development of machine learning technology, as well as identify potential research areas for further development. Therefore, this research provides an important contribution to strengthening the results of previous research and showing that the use of LSTM has great potential in the development of future machine learning technology","PeriodicalId":169403,"journal":{"name":"International Journal of Emerging Technology and Advanced Engineering","volume":"31 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123258240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Versatile Multimodal Biometrics to Prevent ATM Identity Frauds 防止ATM身份欺诈的多功能多模式生物识别技术
Pub Date : 2023-05-13 DOI: 10.46338/ijetae0523_01
Tumelo Presley Nkgapele, Chunling Tu, Moses Olaifa
—Automated Teller Machine (ATM) frauds have increased over the years resulting in the loss of customers and trust in current ATM security measures. In order to fight identity fraud and regain trust and reliability, biometric recognition technologies have become a necessity for ATMs. Using a card and pin is no longer reliable due to the rise of ATM identity fraud over the years. Studies have been carried out to solve this uprising issue, such as replacing the memorized pin with a one-time pin (OTP) and others using biometrics. There are still many gaps and challenges in the systems, with a common challenge being their accuracy rate, dependencies, and reliability. This study is conducted to alleviate the problem by introducing a versatile multimodal biometrics system. After a careful review of different biometric techniques and their differences in human identification inboth accuracy and reliability, physical biometrics isadopted in this study. Unlike behaviouralbiometrics, physical biometric features cannot easily be copied, replicated, or mimicked, and they are unique per individual. The three body features chosen for this study are the face, fingerprint, and iris. A real-time feature quality evaluation method is employed to assess the reliability of the biometric recognition results. The system provides independent anytime ATM access and prevents card-based theft and fraud, it can be relied on to always deliver uninterrupted ATM services to customers. Customers register their fingerprint, face, and iris to be able to use the biometric ATMs. A combination of any two of the registered biometric features can be used to authenticate users with high accuracy and reliability on ATMs with a 0% false acceptance rate. It has been found that allowing multiple options for users reduces false rejections and provides a 100% ATM access guarantee.
-近年来,自动柜员机(ATM)诈骗案件有所增加,导致客户流失和对现有ATM安全措施的信任。为了打击身份欺诈,重获信任和可靠性,生物识别技术已成为atm机的必需品。由于近年来ATM身份欺诈的增加,使用卡和pin不再可靠。为了解决这个问题,已经进行了一些研究,比如用一次性pin (OTP)代替记忆pin,或者使用生物识别技术。系统中仍然存在许多差距和挑战,其中一个共同的挑战是它们的准确率、依赖性和可靠性。本研究旨在通过引入多功能多模式生物识别系统来缓解这一问题。在仔细回顾了不同的生物识别技术及其在人类识别的准确性和可靠性方面的差异之后,本研究采用了物理生物识别技术。与行为生物特征不同,物理生物特征不容易被复制、复制或模仿,而且它们对每个人来说都是独一无二的。本研究选择的三个身体特征是面部、指纹和虹膜。采用实时特征质量评价方法对生物特征识别结果的可靠性进行评价。系统提供了独立的ATM随时接入,防止了基于卡的盗窃和欺诈,可以信赖的始终为客户提供不间断的ATM服务。顾客注册指纹、面部和虹膜,就可以使用生物识别自动取款机。任何两种注册的生物特征的组合都可以用于在自动柜员机上以高准确性和可靠性对用户进行身份验证,错误接受率为0%。研究发现,允许用户使用多个选项可以减少错误拒绝,并提供100%的ATM访问保证。
{"title":"Versatile Multimodal Biometrics to Prevent ATM Identity Frauds","authors":"Tumelo Presley Nkgapele, Chunling Tu, Moses Olaifa","doi":"10.46338/ijetae0523_01","DOIUrl":"https://doi.org/10.46338/ijetae0523_01","url":null,"abstract":"—Automated Teller Machine (ATM) frauds have increased over the years resulting in the loss of customers and trust in current ATM security measures. In order to fight identity fraud and regain trust and reliability, biometric recognition technologies have become a necessity for ATMs. Using a card and pin is no longer reliable due to the rise of ATM identity fraud over the years. Studies have been carried out to solve this uprising issue, such as replacing the memorized pin with a one-time pin (OTP) and others using biometrics. There are still many gaps and challenges in the systems, with a common challenge being their accuracy rate, dependencies, and reliability. This study is conducted to alleviate the problem by introducing a versatile multimodal biometrics system. After a careful review of different biometric techniques and their differences in human identification inboth accuracy and reliability, physical biometrics isadopted in this study. Unlike behaviouralbiometrics, physical biometric features cannot easily be copied, replicated, or mimicked, and they are unique per individual. The three body features chosen for this study are the face, fingerprint, and iris. A real-time feature quality evaluation method is employed to assess the reliability of the biometric recognition results. The system provides independent anytime ATM access and prevents card-based theft and fraud, it can be relied on to always deliver uninterrupted ATM services to customers. Customers register their fingerprint, face, and iris to be able to use the biometric ATMs. A combination of any two of the registered biometric features can be used to authenticate users with high accuracy and reliability on ATMs with a 0% false acceptance rate. It has been found that allowing multiple options for users reduces false rejections and provides a 100% ATM access guarantee.","PeriodicalId":169403,"journal":{"name":"International Journal of Emerging Technology and Advanced Engineering","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121518146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quad-Interleaving Routing Algorithm for Performance Enhancement of Oil and Gas Pipeline Network Monitoring 提高油气管网监测性能的四交织路由算法
Pub Date : 2023-05-13 DOI: 10.46338/ijetae0523_03
R. A. A. L Rajamohan, Sivakumar Subramaniam, Farah Shahnaz Feroz, R. Sujatha
The pipeline is one of the main modes oftransportation for the oil and gas industry that could be laid offshore and onshore. Pipeline transportation requires close monitoring as a failure in pipelines causes disruption of supply, loss of precious commodities and not to mention irreversible environmental damage will be an essential topic. The major issue in AODV and DSDV is when the network gets more extensive, which causes high packet traffic resulting in high packet loss, energy consumption and passive nodes. This research aims to establish a routing algorithm with better performance focusing on throughput, fairness index, delivery ratio and passive nodes and energy consumption. The study is confined to wireless sensor network simulation on Network Simulator Tool. A technique of quad-interleaving Ad-hoc On- demand Distance Vector (QAODV) routing algorithm has been developed where predefined Alpha, Beta, Charlie and Delta nodes will communicate with the nodes which belong to their family. The results of the developed routing protocol have been compared with standard AODV, DSDV and OLSR routing protocols. The developed routing algorithm has produced a massive improvement in the delivery ratio (25% more), throughput (44% more), passive nodes (71 less), fairness index (0.06 more) and energy consumption (0.22J less).
管道是石油和天然气行业的主要运输方式之一,可以铺设在海上和陆上。管道运输需要密切监测,因为管道故障会导致供应中断,宝贵商品的损失,更不用说不可逆转的环境破坏将是一个必不可少的话题。AODV和DSDV的主要问题是当网络变得更广泛时,会导致高数据包流量,从而导致高丢包、高能耗和高被动节点。本研究着眼于吞吐量、公平指数、投递率、被动节点和能耗,建立一种性能更好的路由算法。本研究仅限于利用网络模拟器工具对无线传感器网络进行仿真。提出了一种四交错自组织按需距离矢量(QAODV)路由算法,其中预定义的Alpha、Beta、Charlie和Delta节点将与属于其家族的节点进行通信。将所开发的路由协议与标准的AODV、DSDV和OLSR路由协议进行了比较。所开发的路由算法在交付率(增加25%)、吞吐量(增加44%)、被动节点(减少71)、公平指数(增加0.06)和能耗(减少0.22J)方面取得了巨大的进步。
{"title":"Quad-Interleaving Routing Algorithm for Performance Enhancement of Oil and Gas Pipeline Network Monitoring","authors":"R. A. A. L Rajamohan, Sivakumar Subramaniam, Farah Shahnaz Feroz, R. Sujatha","doi":"10.46338/ijetae0523_03","DOIUrl":"https://doi.org/10.46338/ijetae0523_03","url":null,"abstract":"The pipeline is one of the main modes oftransportation for the oil and gas industry that could be laid offshore and onshore. Pipeline transportation requires close monitoring as a failure in pipelines causes disruption of supply, loss of precious commodities and not to mention irreversible environmental damage will be an essential topic. The major issue in AODV and DSDV is when the network gets more extensive, which causes high packet traffic resulting in high packet loss, energy consumption and passive nodes. This research aims to establish a routing algorithm with better performance focusing on throughput, fairness index, delivery ratio and passive nodes and energy consumption. The study is confined to wireless sensor network simulation on Network Simulator Tool. A technique of quad-interleaving Ad-hoc On- demand Distance Vector (QAODV) routing algorithm has been developed where predefined Alpha, Beta, Charlie and Delta nodes will communicate with the nodes which belong to their family. The results of the developed routing protocol have been compared with standard AODV, DSDV and OLSR routing protocols. The developed routing algorithm has produced a massive improvement in the delivery ratio (25% more), throughput (44% more), passive nodes (71 less), fairness index (0.06 more) and energy consumption (0.22J less).","PeriodicalId":169403,"journal":{"name":"International Journal of Emerging Technology and Advanced Engineering","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127970549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New Structural and Semantic Transformation of Relational Databases to MongoDB 关系数据库到MongoDB的新的结构和语义转换
Pub Date : 2023-05-13 DOI: 10.46338/ijetae0523_06
Abdelhak Erraji, A. Maizate, M. Ouzzif
Currently, data and its exploitation play a very important role in the life of individuals and organizations, without forgetting that through data management tools these organizations store their data history, which guides them at the operational and strategic levels. Considering the explosion of data at huge sizes, the old relational system has several shortcomings in managing this information, which justifies the need for data migration to NoSQL systems, which manage BigData efficiently. In this sense, this article fits to find a new transformation of relational databases to MongoDB, as a wellchosen NoSQL system for this transformation. This article presents the problem of this transformation, so that it can be discussed based on related works, then enlightened by presenting the storage philosophy and the semantics of the two systems source and destination of this transformation, which will be chained by our approach which defining a set of transformation rules to keep the same data and advantages of relational systems under a structure adequate to the concept of MongoDB and finally our conclusion of this work.
目前,数据及其开发在个人和组织的生活中发挥着非常重要的作用,不要忘记,通过数据管理工具,这些组织存储他们的数据历史,这在操作和战略层面指导他们。考虑到大数据的爆炸式增长,旧的关系系统在管理这些信息方面有一些缺点,这证明了数据迁移到NoSQL系统的必要性,NoSQL系统可以有效地管理大数据。从这个意义上说,本文适合寻找关系数据库到MongoDB的新转换,作为这种转换的良好选择的NoSQL系统。本文介绍了这一转换的问题,这样它就可以被讨论了基于相关的工作,然后由提供存储哲学和开明的两个系统的语义源和目标的转变,这将由我们的方法链接定义一组转换规则保持相同的数据和关系系统下结构的优点足以MongoDB的概念,最后我们这项工作的结论。
{"title":"New Structural and Semantic Transformation of Relational Databases to MongoDB","authors":"Abdelhak Erraji, A. Maizate, M. Ouzzif","doi":"10.46338/ijetae0523_06","DOIUrl":"https://doi.org/10.46338/ijetae0523_06","url":null,"abstract":"Currently, data and its exploitation play a very important role in the life of individuals and organizations, without forgetting that through data management tools these organizations store their data history, which guides them at the operational and strategic levels. Considering the explosion of data at huge sizes, the old relational system has several shortcomings in managing this information, which justifies the need for data migration to NoSQL systems, which manage BigData efficiently. In this sense, this article fits to find a new transformation of relational databases to MongoDB, as a wellchosen NoSQL system for this transformation. This article presents the problem of this transformation, so that it can be discussed based on related works, then enlightened by presenting the storage philosophy and the semantics of the two systems source and destination of this transformation, which will be chained by our approach which defining a set of transformation rules to keep the same data and advantages of relational systems under a structure adequate to the concept of MongoDB and finally our conclusion of this work.","PeriodicalId":169403,"journal":{"name":"International Journal of Emerging Technology and Advanced Engineering","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127631898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New Management Standard for Digital Data Protection Using A PDCA Model Anchored to ISO/IEC 27001 and R.A. 10173 使用PDCA模型的数字数据保护新管理标准,以ISO/IEC 27001和R.A. 10173为基础
Pub Date : 2023-05-13 DOI: 10.46338/ijetae0523_08
Chester L. Cofino, M. M. P. Cruz, Ken M. Balogo, Jefrey G. Alegia, Van Roger B. Gutib, Ryan B. Escorial, F. Wenceslao, Jr.
ICT security has proven to be important in any organization in dealing with digital data. In implementing data protection, there are several challenges that an organization may encounter such as employee’s lack of awareness and education, cybersecurity threats, data breaches, lack of technical infrastructure, and limited resources. To combat internal security threats and encourage employees' security habits every agency, in the different sectors of the government must practice and promote data protection awareness against cybercrimes. To improve the security posture of every public or private organization in the Philippines. This study looked at a newly suggested security management standard that offers a thorough framework for detecting and evaluating risks to ICT (information and communication technology) systems and applications. The proposed standard strongly emphasizes the necessity of ongoing security control monitoring and assessment, frequent recovery plan testing and evaluation, and compliance with the PDCA Model anchored to the ISO/IEC 27001 standard and the Data Privacy Act of 2012. The study examined the suggested standard's main aspects and potential business advantages, including security, compliance, and stakeholder coordination and communication as well as emphasized the difficulties in implementing the suggested standard, including the requirement for significant resources and knowledge. The proposed standard also provides a common language for communication and collaboration among stakeholders, including I.T. staff, business leaders, and external partners. This can help promote a security culture and ensure everyone in the organization works together towards a common goal.
事实证明,在处理数字数据的任何组织中,信息通信技术安全都是重要的。在实施数据保护时,组织可能会遇到一些挑战,例如员工缺乏意识和教育、网络安全威胁、数据泄露、缺乏技术基础设施和有限的资源。为了打击内部安全威胁并鼓励员工的安全习惯,政府不同部门的每个机构都必须实践和提高针对网络犯罪的数据保护意识。改善菲律宾所有公共或私人组织的安全状况。这项研究着眼于一项新提出的安全管理标准,该标准为检测和评估ICT(信息和通信技术)系统和应用的风险提供了一个全面的框架。拟议的标准强调了持续的安全控制监测和评估的必要性,频繁的恢复计划测试和评估,以及遵守以ISO/IEC 27001标准和2012年数据隐私法为基础的PDCA模型。该研究检查了建议的标准的主要方面和潜在的业务优势,包括安全性、遵从性和利益相关者的协调和沟通,并强调了实施建议的标准的困难,包括对大量资源和知识的需求。提议的标准还为涉众(包括it人员、业务领导和外部合作伙伴)之间的沟通和协作提供了一种通用语言。这有助于促进安全文化,并确保组织中的每个人都朝着共同的目标一起工作。
{"title":"New Management Standard for Digital Data Protection Using A PDCA Model Anchored to ISO/IEC 27001 and R.A. 10173","authors":"Chester L. Cofino, M. M. P. Cruz, Ken M. Balogo, Jefrey G. Alegia, Van Roger B. Gutib, Ryan B. Escorial, F. Wenceslao, Jr.","doi":"10.46338/ijetae0523_08","DOIUrl":"https://doi.org/10.46338/ijetae0523_08","url":null,"abstract":"ICT security has proven to be important in any organization in dealing with digital data. In implementing data protection, there are several challenges that an organization may encounter such as employee’s lack of awareness and education, cybersecurity threats, data breaches, lack of technical infrastructure, and limited resources. To combat internal security threats and encourage employees' security habits every agency, in the different sectors of the government must practice and promote data protection awareness against cybercrimes. To improve the security posture of every public or private organization in the Philippines. This study looked at a newly suggested security management standard that offers a thorough framework for detecting and evaluating risks to ICT (information and communication technology) systems and applications. The proposed standard strongly emphasizes the necessity of ongoing security control monitoring and assessment, frequent recovery plan testing and evaluation, and compliance with the PDCA Model anchored to the ISO/IEC 27001 standard and the Data Privacy Act of 2012. The study examined the suggested standard's main aspects and potential business advantages, including security, compliance, and stakeholder coordination and communication as well as emphasized the difficulties in implementing the suggested standard, including the requirement for significant resources and knowledge. The proposed standard also provides a common language for communication and collaboration among stakeholders, including I.T. staff, business leaders, and external partners. This can help promote a security culture and ensure everyone in the organization works together towards a common goal.","PeriodicalId":169403,"journal":{"name":"International Journal of Emerging Technology and Advanced Engineering","volume":"102 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121054263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Learning Models for Efficient Detection of Electricity Fraud in Smart Grids 智能电网中电力欺诈有效检测的深度学习模型
Pub Date : 2023-05-13 DOI: 10.46338/ijetae0523_09
Meadi Mohamed Nadjib, Ouamane ferial, Zerari Abd El Moumene, Djeffal Abdelhamid
—Electricity theft is one of the biggest problems facing energy companies. These companies eventually claimed that the conventional methods for preventing electricity fraud were insufficient, which led to the creation of systems based on artificial intelligence to identify thieves among electricity consumers. In this paper, we propose a system based on deep learning to identify customers who have engaged in fraudulent activity on smart grids. We selected one-dimensional (1D) and twodimensional (2D) convolutional neural network models from deep learning models to achieve our objective. Also, we proposed a new method to fill in missing values in the data set. Our findings show that our models enhance the performance of systems that identify electricity thieves.
——电力盗窃是能源公司面临的最大问题之一。这些公司最终声称,防止电力欺诈的传统方法是不够的,这导致了基于人工智能的系统的创建,以识别电力消费者中的小偷。在本文中,我们提出了一个基于深度学习的系统来识别在智能电网上从事欺诈活动的客户。我们从深度学习模型中选择了一维(1D)和二维(2D)卷积神经网络模型来实现我们的目标。此外,我们还提出了一种新的数据集缺失值的填充方法。我们的研究结果表明,我们的模型提高了识别电力窃贼的系统的性能。
{"title":"Deep Learning Models for Efficient Detection of Electricity Fraud in Smart Grids","authors":"Meadi Mohamed Nadjib, Ouamane ferial, Zerari Abd El Moumene, Djeffal Abdelhamid","doi":"10.46338/ijetae0523_09","DOIUrl":"https://doi.org/10.46338/ijetae0523_09","url":null,"abstract":"—Electricity theft is one of the biggest problems facing energy companies. These companies eventually claimed that the conventional methods for preventing electricity fraud were insufficient, which led to the creation of systems based on artificial intelligence to identify thieves among electricity consumers. In this paper, we propose a system based on deep learning to identify customers who have engaged in fraudulent activity on smart grids. We selected one-dimensional (1D) and twodimensional (2D) convolutional neural network models from deep learning models to achieve our objective. Also, we proposed a new method to fill in missing values in the data set. Our findings show that our models enhance the performance of systems that identify electricity thieves.","PeriodicalId":169403,"journal":{"name":"International Journal of Emerging Technology and Advanced Engineering","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126523904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Emerging Technology and Advanced Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1