首页 > 最新文献

The Journal of Engineering最新文献

英文 中文
Smart performance optimization of energy‐aware scheduling model for resource sharing in 5G green communication systems 面向 5G 绿色通信系统资源共享的能量感知调度模型的智能性能优化
Pub Date : 2024-02-01 DOI: 10.1049/tje2.12358
Sivakumar Sangeetha, J. Logeshwaran, Muhammad Faheem, R. Kannadasan, Suganthi Sundararaju, Loganathan Vijayaraja
This paper presents an analysis of the performance of the Energy Aware Scheduling Algorithm (EASA) in a 5G green communication system. 5G green communication systems rely on EASA to manage resource sharing. The aim of the proposed model is to improve the efficiency and energy consumption of resource sharing in 5G green communication systems. The main objective is to address the challenges of achieving optimal resource utilization and minimizing energy consumption in these systems. To achieve this goal, the study proposes a novel energy‐aware scheduling model that takes into consideration the specific characteristics of 5G green communication systems. This model incorporates intelligent techniques for optimizing resource allocation and scheduling decisions, while also considering energy consumption constraints. The methodology used involves a combination of mathematical analysis and simulation studies. The mathematical analysis is used to formulate the optimization problem and design the scheduling model, while the simulations are used to evaluate its performance in various scenarios. The proposed EASM reached a 91.58% false discovery rate, a 64.33% false omission rate, a 90.62% prevalence threshold, and a 91.23% critical success index. The results demonstrate the effectiveness of the proposed model in terms of reducing energy consumption while maintaining a high level of resource utilization.
本文分析了能量感知调度算法(EASA)在 5G 绿色通信系统中的性能。5G 绿色通信系统依靠 EASA 管理资源共享。本文提出的模型旨在提高 5G 绿色通信系统中资源共享的效率和能耗。主要目的是应对这些系统中实现资源最佳利用和能耗最小化的挑战。为实现这一目标,本研究提出了一种新型能量感知调度模型,该模型考虑到了 5G 绿色通信系统的具体特点。该模型结合了优化资源分配和调度决策的智能技术,同时还考虑了能耗约束。使用的方法包括数学分析和模拟研究的结合。数学分析用于制定优化问题和设计调度模型,而仿真则用于评估其在各种情况下的性能。所提出的 EASM 达到了 91.58% 的错误发现率、64.33% 的错误遗漏率、90.62% 的流行阈值和 91.23% 的关键成功指数。结果表明,所提出的模型在降低能耗的同时保持了较高的资源利用率。
{"title":"Smart performance optimization of energy‐aware scheduling model for resource sharing in 5G green communication systems","authors":"Sivakumar Sangeetha, J. Logeshwaran, Muhammad Faheem, R. Kannadasan, Suganthi Sundararaju, Loganathan Vijayaraja","doi":"10.1049/tje2.12358","DOIUrl":"https://doi.org/10.1049/tje2.12358","url":null,"abstract":"This paper presents an analysis of the performance of the Energy Aware Scheduling Algorithm (EASA) in a 5G green communication system. 5G green communication systems rely on EASA to manage resource sharing. The aim of the proposed model is to improve the efficiency and energy consumption of resource sharing in 5G green communication systems. The main objective is to address the challenges of achieving optimal resource utilization and minimizing energy consumption in these systems. To achieve this goal, the study proposes a novel energy‐aware scheduling model that takes into consideration the specific characteristics of 5G green communication systems. This model incorporates intelligent techniques for optimizing resource allocation and scheduling decisions, while also considering energy consumption constraints. The methodology used involves a combination of mathematical analysis and simulation studies. The mathematical analysis is used to formulate the optimization problem and design the scheduling model, while the simulations are used to evaluate its performance in various scenarios. The proposed EASM reached a 91.58% false discovery rate, a 64.33% false omission rate, a 90.62% prevalence threshold, and a 91.23% critical success index. The results demonstrate the effectiveness of the proposed model in terms of reducing energy consumption while maintaining a high level of resource utilization.","PeriodicalId":22858,"journal":{"name":"The Journal of Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139965809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Integration of wind farm, energy storage and demand response for optimum management of generation and carbon emission 整合风电场、储能和需求响应,优化发电和碳排放管理
Pub Date : 2024-01-01 DOI: 10.1049/tje2.12348
Kasra Shafiei, M. Tarafdar Hagh, Ali Seifi
The optimal operation of power systems is one of the most critical issues for operators. Optimizing the operation of power systems while accommodating the increasing penetration of RES, owing to the intermittent and variable nature of these resources, stands as one of the most critical challenges for power systems. Numerous primary challenges, including fluctuations in load and nonlinear constraints, further complicate the issue, given its substantial dimensions. Therefore, this paper introduces an approach for improving the management of optimal generation and the associated carbon emissions costs of traditional power plants, which is achieved through integrating wind farms and incorporating battery energy storage. This enhancement is achieved by integrating wind farms and utilizing battery storage systems while considering the costs associated with traditional units using fossil fuels and the expenses related to carbon emissions. The simulation incorporates seven load customer types and five traditional generation sources integrated with wind farms and battery storage devices. The simulation results demonstrate that the new problem formulation has significantly improved the ability and performance of optimizing the scheduling of power plant generations.
电力系统的优化运行是运营商面临的最关键问题之一。由于可再生能源的间歇性和可变性,优化电力系统的运行,同时适应可再生能源日益增长的渗透率,是电力系统面临的最严峻挑战之一。包括负荷波动和非线性约束在内的众多主要挑战使这一问题变得更加复杂,因为它涉及到很多方面。因此,本文介绍了一种改进优化发电管理和传统发电厂相关碳排放成本的方法,该方法通过整合风电场和电池储能来实现。这种改进是通过整合风电场和利用电池储能系统实现的,同时考虑到了使用化石燃料的传统机组的相关成本以及与碳排放相关的费用。仿真结合了七种负载客户类型和五种传统发电资源,并将其与风力发电场和电池储能设备进行了整合。模拟结果表明,新的问题表述大大提高了优化发电厂发电调度的能力和性能。
{"title":"Integration of wind farm, energy storage and demand response for optimum management of generation and carbon emission","authors":"Kasra Shafiei, M. Tarafdar Hagh, Ali Seifi","doi":"10.1049/tje2.12348","DOIUrl":"https://doi.org/10.1049/tje2.12348","url":null,"abstract":"The optimal operation of power systems is one of the most critical issues for operators. Optimizing the operation of power systems while accommodating the increasing penetration of RES, owing to the intermittent and variable nature of these resources, stands as one of the most critical challenges for power systems. Numerous primary challenges, including fluctuations in load and nonlinear constraints, further complicate the issue, given its substantial dimensions. Therefore, this paper introduces an approach for improving the management of optimal generation and the associated carbon emissions costs of traditional power plants, which is achieved through integrating wind farms and incorporating battery energy storage. This enhancement is achieved by integrating wind farms and utilizing battery storage systems while considering the costs associated with traditional units using fossil fuels and the expenses related to carbon emissions. The simulation incorporates seven load customer types and five traditional generation sources integrated with wind farms and battery storage devices. The simulation results demonstrate that the new problem formulation has significantly improved the ability and performance of optimizing the scheduling of power plant generations.","PeriodicalId":22858,"journal":{"name":"The Journal of Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139634359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An integrated fuse information fusion method for infrared imaging detector and range finder based on improved particle filter 基于改进型粒子滤波器的红外成像探测器和测距仪综合熔断信息融合方法
Pub Date : 2024-01-01 DOI: 10.1049/tje2.12351
Daozhi Wei, Ning Li, Junwei Li
Aiming at the traditional integrated fuse information fusion method that cannot simultaneously obtain high‐precision burst control parameters such as burst delay time, azimuth angle, and detection angle, the infrared imaging detector and range finder information fusion method based on particle filtering with BAS algorithm is proposed. Under the centralized information fusion structure that can obtain higher accuracy, first, use a faster linear interpolation method to realize the time alignment of the two asynchronous sensors. Second, for the strong non‐linear observation model in the missile target rendezvous model, use a particle filter framework that is not affected by the nonlinearity of the system function and non‐gaussian noise. Finally, Utilizing the single search BAS algorithm with low computational complexity to solve the problem of particle degradation in particle filtering and improve the accuracy of burst control. The experiment shows that in a typical simulation environment, the optimized information fusion method improves the burst delay time accuracy by 61.82%, azimuth accuracy by 66.28%, detection angle accuracy by 36.15%, and simulation time is shorter compared to traditional methods.
针对传统的综合引信信息融合方法无法同时获得高精度的突发延迟时间、方位角、探测角等突发控制参数的问题,提出了基于粒子滤波与 BAS 算法的红外成像探测器与测距仪信息融合方法。在可以获得更高精度的集中式信息融合结构下,首先,使用更快的线性插值方法实现两个异步传感器的时间对准。其次,针对导弹目标会合模型中的强非线性观测模型,采用不受系统函数非线性和非高斯噪声影响的粒子滤波框架。最后,利用计算复杂度较低的单搜索 BAS 算法解决粒子滤波中的粒子退化问题,提高猝发控制精度。实验表明,在典型仿真环境下,优化后的信息融合方法与传统方法相比,猝发延迟时间精度提高了 61.82%,方位角精度提高了 66.28%,探测角精度提高了 36.15%,仿真时间更短。
{"title":"An integrated fuse information fusion method for infrared imaging detector and range finder based on improved particle filter","authors":"Daozhi Wei, Ning Li, Junwei Li","doi":"10.1049/tje2.12351","DOIUrl":"https://doi.org/10.1049/tje2.12351","url":null,"abstract":"Aiming at the traditional integrated fuse information fusion method that cannot simultaneously obtain high‐precision burst control parameters such as burst delay time, azimuth angle, and detection angle, the infrared imaging detector and range finder information fusion method based on particle filtering with BAS algorithm is proposed. Under the centralized information fusion structure that can obtain higher accuracy, first, use a faster linear interpolation method to realize the time alignment of the two asynchronous sensors. Second, for the strong non‐linear observation model in the missile target rendezvous model, use a particle filter framework that is not affected by the nonlinearity of the system function and non‐gaussian noise. Finally, Utilizing the single search BAS algorithm with low computational complexity to solve the problem of particle degradation in particle filtering and improve the accuracy of burst control. The experiment shows that in a typical simulation environment, the optimized information fusion method improves the burst delay time accuracy by 61.82%, azimuth accuracy by 66.28%, detection angle accuracy by 36.15%, and simulation time is shorter compared to traditional methods.","PeriodicalId":22858,"journal":{"name":"The Journal of Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139631727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of the support vector machines method for metal analyse by an eddy current system 支持向量机方法在涡流系统金属分析中的应用
Pub Date : 2024-01-01 DOI: 10.1049/tje2.12346
Anton Abramovych, I. Zaitsev, Volodymyr Piddubnyi, V. Bereznychenko
The eddy current method of control analyzed and the possibility of its use for the identification of metals and alloys substantiated. It is shown that this can be done by modernizing the eddy current radio engineering system with dynamic scanning of metal samples, which consists in the use of modern microcontrollers with high‐precision ADC operation. The structural of the modernized system is presented, some aspects of processing the received response signal are considered, which made it possible to highlight the information coefficients that would represent the metal or alloy as a generalized image. It is proposed to use machine learning methods to compare an unknown sample of a metal or alloy under study with those available in the collected database, which is shown on the example of the support vector machine method, which allows for real‐time identification of metals and alloys, to carry out express control, without human intervention in the identification process.
对涡流控制方法进行了分析,并证实了将其用于识别金属和合金的可能性。结果表明,可以通过对具有金属样品动态扫描功能的涡流无线电工程系统进行现代化改造来实现这一目标,其中包括使用具有高精度 ADC 操作功能的现代微控制器。介绍了现代化系统的结构,考虑了处理接收到的响应信号的某些方面,从而可以突出显示作为通用图像的金属或合金的信息系数。建议使用机器学习方法将所研究的金属或合金的未知样本与收集的数据库中的样本进行比较,以支持向量机方法为例进行说明,该方法可对金属和合金进行实时识别,以执行快递控制,识别过程无需人工干预。
{"title":"Application of the support vector machines method for metal analyse by an eddy current system","authors":"Anton Abramovych, I. Zaitsev, Volodymyr Piddubnyi, V. Bereznychenko","doi":"10.1049/tje2.12346","DOIUrl":"https://doi.org/10.1049/tje2.12346","url":null,"abstract":"The eddy current method of control analyzed and the possibility of its use for the identification of metals and alloys substantiated. It is shown that this can be done by modernizing the eddy current radio engineering system with dynamic scanning of metal samples, which consists in the use of modern microcontrollers with high‐precision ADC operation. The structural of the modernized system is presented, some aspects of processing the received response signal are considered, which made it possible to highlight the information coefficients that would represent the metal or alloy as a generalized image. It is proposed to use machine learning methods to compare an unknown sample of a metal or alloy under study with those available in the collected database, which is shown on the example of the support vector machine method, which allows for real‐time identification of metals and alloys, to carry out express control, without human intervention in the identification process.","PeriodicalId":22858,"journal":{"name":"The Journal of Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139640087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Nonpilot directional protection of a microgrid 微电网的非试点定向保护
Pub Date : 2023-12-01 DOI: 10.1049/tje2.12334
Ardavan Mohammadhassani, A. Mehrizi‐Sani
Protection of an islanded inverter‐based microgrid is challenging because of variable and small fault current contribution of inverter‐based resources (IBR) and the absence of sequence currents. This paper proposes a fast and robust nonpilot directional protection scheme to address this challenge. This scheme relies on support vector machines (SVM) and the harmonic current injection capability of IBRs. Examining the harmonic currents measured by a relay during a fault shows that harmonic currents have similar magnitudes but different orientation under forward and reverse faults. Additionally, harmonic currents have similar orientation but different magnitudes under forward faults at different locations along the protected line. Using this, six SVMs are trained for each relay, given that there are three main types of faults (three‐phase‐to‐ground, line‐to‐line, and line‐to‐ground): three as directional elements and three as zone detection elements. A fault is detected and classified by the undervoltage element of a relay. Then, the measured harmonic currents are routed to the appropriate directionality and zone detection SVMs to facilitate proper relay coordination. The performance of the proposed method is evaluated on the CIGRE North American MV distribution benchmark system under various types of contingency scenarios using PSCAD/EMTDC software.
基于逆变器的孤岛微电网的保护具有挑战性,因为基于逆变器的资源(IBR)的故障电流贡献是可变的和小的,并且没有顺序电流。本文提出了一种快速、鲁棒的非导频定向保护方案来解决这一问题。该方案依赖于支持向量机(SVM)和ibr的谐波电流注入能力。对故障时用继电器测得的谐波电流进行检测,发现正反向故障时谐波电流大小相近,但方向不同。此外,在保护线路不同位置的正向故障下,谐波电流方向相似,但量级不同。使用这种方法,假定存在三种主要类型的故障(三相对地、线对线和线对地),为每个继电器训练六个支持向量机:三个作为方向元件,三个作为区域检测元件。故障是由继电器的欠压元件检测和分类的。然后,测量的谐波电流被路由到适当的方向和区域检测支持向量机,以促进适当的继电器协调。利用PSCAD/EMTDC软件对CIGRE北美中压配电基准系统在各种应急情景下的性能进行了评估。
{"title":"Nonpilot directional protection of a microgrid","authors":"Ardavan Mohammadhassani, A. Mehrizi‐Sani","doi":"10.1049/tje2.12334","DOIUrl":"https://doi.org/10.1049/tje2.12334","url":null,"abstract":"Protection of an islanded inverter‐based microgrid is challenging because of variable and small fault current contribution of inverter‐based resources (IBR) and the absence of sequence currents. This paper proposes a fast and robust nonpilot directional protection scheme to address this challenge. This scheme relies on support vector machines (SVM) and the harmonic current injection capability of IBRs. Examining the harmonic currents measured by a relay during a fault shows that harmonic currents have similar magnitudes but different orientation under forward and reverse faults. Additionally, harmonic currents have similar orientation but different magnitudes under forward faults at different locations along the protected line. Using this, six SVMs are trained for each relay, given that there are three main types of faults (three‐phase‐to‐ground, line‐to‐line, and line‐to‐ground): three as directional elements and three as zone detection elements. A fault is detected and classified by the undervoltage element of a relay. Then, the measured harmonic currents are routed to the appropriate directionality and zone detection SVMs to facilitate proper relay coordination. The performance of the proposed method is evaluated on the CIGRE North American MV distribution benchmark system under various types of contingency scenarios using PSCAD/EMTDC software.","PeriodicalId":22858,"journal":{"name":"The Journal of Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138623889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel blind detection algorithm for successive interference cancellation in non‐orthogonal multiple access system 非正交多址系统中用于连续干扰消除的新型盲检测算法
Pub Date : 2023-12-01 DOI: 10.1049/tje2.12339
Jia Liu, Hao Zhang, Bo Wang
This paper considers a Non‐Orthogonal Multiple Access (NOMA) network, in which base station transmits a data packet by multi‐user superposition to a destination. In this system, Successive Interference Cancellation (SIC) receiver is used to eliminate the co‐channel interference. Some physical layer parameters, such as modulation order and precoding matrix indicator (PMI), are required for the SIC receiver to separate the overlapped signals. However, an abundance of parameters would bring a large number of signalling overhead. To reduce the signalling overhead, some of these parameters can be blindly detected instead of signalling notification. To detect these kinds of parameters, a novel blind detection algorithm is proposed in this paper. Firstly, feature extraction based on wavelet cluster is introduced to obtain feature information from received data. Then a filter is designed to reduce the interference among these features. Theoretical analysis and simulation results show that the proposed algorithm achieves high detection performance under the computation complexity of approximate the max‐log likelihood algorithm.
本文研究了一种非正交多址(NOMA)网络,其中基站通过多用户叠加向目的地传输数据包。在该系统中,使用连续干扰消除(SIC)接收器来消除同信道干扰。SIC 接收器需要一些物理层参数,如调制顺序和预编码矩阵指示器(PMI),以分离重叠信号。然而,过多的参数会带来大量的信令开销。为了减少信令开销,可以盲目检测其中一些参数,而不是发出信号通知。为了检测这类参数,本文提出了一种新型盲检测算法。首先,引入基于小波簇的特征提取,从接收到的数据中获取特征信息。然后设计一个滤波器来减少这些特征之间的干扰。理论分析和仿真结果表明,在近似最大对数似然算法的计算复杂度下,本文提出的算法实现了较高的检测性能。
{"title":"A novel blind detection algorithm for successive interference cancellation in non‐orthogonal multiple access system","authors":"Jia Liu, Hao Zhang, Bo Wang","doi":"10.1049/tje2.12339","DOIUrl":"https://doi.org/10.1049/tje2.12339","url":null,"abstract":"This paper considers a Non‐Orthogonal Multiple Access (NOMA) network, in which base station transmits a data packet by multi‐user superposition to a destination. In this system, Successive Interference Cancellation (SIC) receiver is used to eliminate the co‐channel interference. Some physical layer parameters, such as modulation order and precoding matrix indicator (PMI), are required for the SIC receiver to separate the overlapped signals. However, an abundance of parameters would bring a large number of signalling overhead. To reduce the signalling overhead, some of these parameters can be blindly detected instead of signalling notification. To detect these kinds of parameters, a novel blind detection algorithm is proposed in this paper. Firstly, feature extraction based on wavelet cluster is introduced to obtain feature information from received data. Then a filter is designed to reduce the interference among these features. Theoretical analysis and simulation results show that the proposed algorithm achieves high detection performance under the computation complexity of approximate the max‐log likelihood algorithm.","PeriodicalId":22858,"journal":{"name":"The Journal of Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139023065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fraud detection through data sharing using privacy‐preserving record linkage, digital signature (EdDSA), and the MinHash technique: Detect fraud using privacy preserving record links 利用隐私保护记录链接、数字签名(EdDSA)和 MinHash 技术,通过数据共享检测欺诈行为:利用隐私保护记录链接检测欺诈
Pub Date : 2023-12-01 DOI: 10.1049/tje2.12341
Satish Thomas, James Sluss
Fraud is a persistent and increasing problem in the telecom industry. Telcos work in isolation to prevent fraud. Sharing information is critical for detecting and preventing fraud. The primary constraint on sharing information is privacy preservation. Several techniques have been developed to share data while preserving privacy using privacy‐preserving record linkage (PPRL). Most of the PPRL techniques use a similarity measure like Jacquard similarity on homologous datasets, which are all prone to graph‐based attacks, rendering existing methods insecure. Many complex and slow techniques use the Bloom filter implementation, which can be compromised in a cryptanalysis attack. This paper proposes an attack‐proof PPRL method using existing infrastructure of a telco without a complex multistep protocol. First, a novel way of matching two non‐homologous datasets using attack‐proof digital signature schemes, like the Edwards‐curve digital signature algorithm is proposed. Here, Jaccard similarity can only be estimated using this method and not on the datasets directly. Second, two parties transact with a simple request–reply method. To validate the match accuracy, privacy preservation, and performance of this approach, it was tested on a large public dataset (North Carolina Voter Database). This method is secure against attacks and achieves 100% match accuracy with improved performance.
在电信行业,欺诈是一个长期存在且日益严重的问题。电信公司在防止欺诈方面各自为政。共享信息对于发现和预防欺诈至关重要。共享信息的主要限制因素是保护隐私。目前已开发出多种技术,利用隐私保护记录链接(PPRL)在共享数据的同时保护隐私。大多数 PPRL 技术都使用同源数据集上的相似性度量,如 Jacquard 相似性,而这些数据集都容易受到基于图的攻击,导致现有方法不安全。许多复杂而缓慢的技术使用 Bloom 过滤器实现,这可能会在密码分析攻击中遭到破坏。本文提出了一种利用电信公司现有基础设施的防攻击 PPRL 方法,无需复杂的多步骤协议。首先,本文提出了一种使用防攻击数字签名方案(如 Edwards 曲线数字签名算法)匹配两个非同源数据集的新方法。在这里,Jaccard 相似性只能用这种方法来估算,而不能直接用数据集来估算。其次,双方通过简单的请求-回复方法进行交易。为了验证这种方法的匹配准确性、隐私保护和性能,我们在一个大型公共数据集(北卡罗来纳州选民数据库)上对其进行了测试。该方法可安全抵御攻击,匹配准确率达到 100%,性能也有所提高。
{"title":"Fraud detection through data sharing using privacy‐preserving record linkage, digital signature (EdDSA), and the MinHash technique: Detect fraud using privacy preserving record links","authors":"Satish Thomas, James Sluss","doi":"10.1049/tje2.12341","DOIUrl":"https://doi.org/10.1049/tje2.12341","url":null,"abstract":"Fraud is a persistent and increasing problem in the telecom industry. Telcos work in isolation to prevent fraud. Sharing information is critical for detecting and preventing fraud. The primary constraint on sharing information is privacy preservation. Several techniques have been developed to share data while preserving privacy using privacy‐preserving record linkage (PPRL). Most of the PPRL techniques use a similarity measure like Jacquard similarity on homologous datasets, which are all prone to graph‐based attacks, rendering existing methods insecure. Many complex and slow techniques use the Bloom filter implementation, which can be compromised in a cryptanalysis attack. This paper proposes an attack‐proof PPRL method using existing infrastructure of a telco without a complex multistep protocol. First, a novel way of matching two non‐homologous datasets using attack‐proof digital signature schemes, like the Edwards‐curve digital signature algorithm is proposed. Here, Jaccard similarity can only be estimated using this method and not on the datasets directly. Second, two parties transact with a simple request–reply method. To validate the match accuracy, privacy preservation, and performance of this approach, it was tested on a large public dataset (North Carolina Voter Database). This method is secure against attacks and achieves 100% match accuracy with improved performance.","PeriodicalId":22858,"journal":{"name":"The Journal of Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138992839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital backpropagation based on binary logarithmic step size distribution for fibre non‐linearity compensation 基于二进制对数步长分布的数字反向传播,用于光纤非线性补偿
Pub Date : 2023-12-01 DOI: 10.1049/tje2.12340
Albert Dede, E. Akowuah, S. Haxha
Capacity crunch has become critical in recent years as commercial communication systems approach their theoretical data rate limits. This work presents a low‐complexity digital backpropagation (DBP) implementation approach based on step size distribution that uses a binary logarithmic step size method to achieve high data rate optical transmission. The proposed scheme shows performance improvements (∆Q) of 2.36, 1.19, and 0.71 dB over linear compensation, constant step size (CSS) DBP, and logarithmic step size DBP techniques in a 2400 km 112 Gbit/s DP‐16 quadrature amplitude modulation (QAM) system, respectively. At 13 dBm, a high performance (Q) of 10.9 dB (BER = 2.25 × 10−4) is achieved, above the 3.80 × 10−3 hard‐decision forward error correction (HD‐FEC) limit, using the proposed scheme. Also, the allowable transmission distance is extended by 960 km at the HD‐FEC limit over the linear compensation technique. The optimization achieves a 38% saving in the number of DBP calculation steps compared to the CSS DBP, which considerably reduces the computational cost since a few steps are required for effective non‐linearity compensation.
近年来,随着商业通信系统接近其理论数据传输速率的极限,容量紧缩已变得至关重要。本研究提出了一种基于步长分布的低复杂度数字反向传播(DBP)实现方法,该方法采用二进制对数步长法实现高数据速率光传输。在 2400 公里 112 Gbit/s DP-16 正交幅度调制 (QAM) 系统中,与线性补偿、恒定步长 (CSS) DBP 和对数步长 DBP 技术相比,所提方案的性能(ΔQ)分别提高了 2.36、1.19 和 0.71 dB。在 13 dBm 的条件下,使用所提出的方案可实现 10.9 dB 的高性能 (Q)(误码率 = 2.25 × 10-4),高于 3.80 × 10-3 的硬判定前向纠错 (HD-FEC) 限制。此外,与线性补偿技术相比,HD-FEC 限制下的允许传输距离延长了 960 千米。与 CSS DBP 相比,该优化方案节省了 38% 的 DBP 计算步骤,大大降低了计算成本,因为只需几个步骤就能实现有效的非线性补偿。
{"title":"Digital backpropagation based on binary logarithmic step size distribution for fibre non‐linearity compensation","authors":"Albert Dede, E. Akowuah, S. Haxha","doi":"10.1049/tje2.12340","DOIUrl":"https://doi.org/10.1049/tje2.12340","url":null,"abstract":"Capacity crunch has become critical in recent years as commercial communication systems approach their theoretical data rate limits. This work presents a low‐complexity digital backpropagation (DBP) implementation approach based on step size distribution that uses a binary logarithmic step size method to achieve high data rate optical transmission. The proposed scheme shows performance improvements (∆Q) of 2.36, 1.19, and 0.71 dB over linear compensation, constant step size (CSS) DBP, and logarithmic step size DBP techniques in a 2400 km 112 Gbit/s DP‐16 quadrature amplitude modulation (QAM) system, respectively. At 13 dBm, a high performance (Q) of 10.9 dB (BER = 2.25 × 10−4) is achieved, above the 3.80 × 10−3 hard‐decision forward error correction (HD‐FEC) limit, using the proposed scheme. Also, the allowable transmission distance is extended by 960 km at the HD‐FEC limit over the linear compensation technique. The optimization achieves a 38% saving in the number of DBP calculation steps compared to the CSS DBP, which considerably reduces the computational cost since a few steps are required for effective non‐linearity compensation.","PeriodicalId":22858,"journal":{"name":"The Journal of Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139026604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Health evaluation and dangerous reptile detection using a novel framework powered by the YOLO algorithm to design high‐content cellular imaging systems 利用由 YOLO 算法驱动的新型框架设计高内容细胞成像系统,进行健康评估和危险爬行动物检测
Pub Date : 2023-12-01 DOI: 10.1049/tje2.12335
S. Pandey, Ankit Kumar, D. P. Yadav, Anurag Sinha, M. Hassan, N. K. Singh, Yash Bhatnagar, Namit Garg
This novel approach in animal biology could revolutionize identifying endangered species, addressing the issue of misclassifying potentially harmful animals based solely on visual characteristics. Particularly impactful for farmers in agricultural fields, it aims to reduce the heightened risk of venomous animal attacks, ultimately improving safety. Due to a lack of accessible education, illiterate farmers are more susceptible to adopting superstitious beliefs, which tragically leads to fatal snakebites even when medical treatment is readily available. Furthermore, environmental factors can unexpectedly hold typically non‐threatening animals responsible for a large number of human deaths each year. However, the complexity of human recognition of these hazards has prompted the development of a novel design approach aimed at simplifying the process. Integration of the ResNet learning algorithm in conjunction with You Only Look Once (YOLOv5) within the framework is recommended to facilitate real‐time processing and improve accuracy. This combined approach not only speeds up animal recognition but also takes advantage of ResNet's deep learning capabilities. The first phase entails deploying YOLOv5 to detect the presence of snakes in the proposed study, achieving a remarkable 87% precision in snake detection thanks to the synergistic fusion of ResNet and YOLOv5.
这种动物生物学上的新方法可以彻底改变濒危物种的识别,解决仅仅基于视觉特征对潜在有害动物进行错误分类的问题。它对农业领域的农民尤其有影响力,旨在降低有毒动物袭击的高风险,最终提高安全性。由于缺乏接受教育的机会,不识字的农民更容易接受迷信信仰,即使有现成的治疗方法,也不幸导致致命的蛇咬伤。此外,环境因素可能出人意料地使通常不具威胁性的动物对每年大量的人类死亡负责。然而,人类识别这些危险的复杂性促使了一种新的设计方法的发展,旨在简化这一过程。建议将ResNet学习算法与框架内的You Only Look Once (YOLOv5)相结合,以促进实时处理并提高准确性。这种组合方法不仅加快了动物识别速度,而且利用了ResNet的深度学习能力。第一阶段需要部署YOLOv5来检测拟议研究中的蛇的存在,由于ResNet和YOLOv5的协同融合,蛇的检测精度达到了惊人的87%。
{"title":"Health evaluation and dangerous reptile detection using a novel framework powered by the YOLO algorithm to design high‐content cellular imaging systems","authors":"S. Pandey, Ankit Kumar, D. P. Yadav, Anurag Sinha, M. Hassan, N. K. Singh, Yash Bhatnagar, Namit Garg","doi":"10.1049/tje2.12335","DOIUrl":"https://doi.org/10.1049/tje2.12335","url":null,"abstract":"This novel approach in animal biology could revolutionize identifying endangered species, addressing the issue of misclassifying potentially harmful animals based solely on visual characteristics. Particularly impactful for farmers in agricultural fields, it aims to reduce the heightened risk of venomous animal attacks, ultimately improving safety. Due to a lack of accessible education, illiterate farmers are more susceptible to adopting superstitious beliefs, which tragically leads to fatal snakebites even when medical treatment is readily available. Furthermore, environmental factors can unexpectedly hold typically non‐threatening animals responsible for a large number of human deaths each year. However, the complexity of human recognition of these hazards has prompted the development of a novel design approach aimed at simplifying the process. Integration of the ResNet learning algorithm in conjunction with You Only Look Once (YOLOv5) within the framework is recommended to facilitate real‐time processing and improve accuracy. This combined approach not only speeds up animal recognition but also takes advantage of ResNet's deep learning capabilities. The first phase entails deploying YOLOv5 to detect the presence of snakes in the proposed study, achieving a remarkable 87% precision in snake detection thanks to the synergistic fusion of ResNet and YOLOv5.","PeriodicalId":22858,"journal":{"name":"The Journal of Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138622365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimization method of 3D reconstruction of metal cultural relics based on 3D laser scanning data reduction 基于三维激光扫描数据还原的金属文物三维重建优化方法
Pub Date : 2023-12-01 DOI: 10.1049/tje2.12337
Xiang Chen, Ling Wang, Feng Ding
The extraction effect and feature matching are poor in the three‐dimensional reconstruction of metal cultural relics, which leads to a poor reconstruction effect. Therefore, an optimization method of three‐dimensional reconstruction of metal cultural relics based on 3D laser scanning data reduction is proposed. The overall technical design route of the method is shown as follows. Based on this model, the 3D laser scanning method is used to collect 3D images of metal artefacts, combined with colour space and 2D entropy detection methods to pre‐process 3D images, and feature matching of point clouds is carried out to extract and optimize the significant value of superpixels, and a 3D reconstructed visual model is constructed. Affine transformation is used to obtain the affine invariant moment of the structural light parameters of the visual feature lines of metal cultural relics. The light stability adjustment of the three‐dimensional reconstruction of metal cultural relics is realized by using the linear structural light adjustment method in the HSV colour space. The rigid and non‐rigid registration methods are introduced to match the point cloud. The product quantization algorithm is used to linearize the error function, and the block feature detection and matching model of spatial image is obtained. The noise number is judged by the threshold value, and the three‐dimensional reconstruction technology is combined to realize the three‐dimensional reconstruction of metal relics. The simulation results show that this method has good visual expression ability, high feature recognition rate, and improves the three‐dimensional reconstruction ability of metal relics.
在金属文物三维重建中,提取效果和特征匹配度较差,导致重建效果不佳。因此,提出了一种基于三维激光扫描数据还原的金属文物三维重建优化方法。该方法的总体技术设计路线如下。基于该模型,利用三维激光扫描方法采集金属文物的三维图像,结合色彩空间和二维熵检测方法对三维图像进行预处理,对点云进行特征匹配,提取并优化超像素的显著值,构建三维重建视觉模型。利用仿射变换获得金属文物视觉特征线结构光参数的仿射不变矩。利用 HSV 色彩空间中的线性结构光调整方法,实现金属文物三维重建的光稳定性调整。引入刚性和非刚性配准方法来匹配点云。利用乘积量化算法对误差函数进行线性化处理,得到空间图像的块特征检测与匹配模型。通过阈值判断噪声数,结合三维重建技术实现金属文物的三维重建。仿真结果表明,该方法视觉表达能力好,特征识别率高,提高了金属文物的三维重建能力。
{"title":"Optimization method of 3D reconstruction of metal cultural relics based on 3D laser scanning data reduction","authors":"Xiang Chen, Ling Wang, Feng Ding","doi":"10.1049/tje2.12337","DOIUrl":"https://doi.org/10.1049/tje2.12337","url":null,"abstract":"The extraction effect and feature matching are poor in the three‐dimensional reconstruction of metal cultural relics, which leads to a poor reconstruction effect. Therefore, an optimization method of three‐dimensional reconstruction of metal cultural relics based on 3D laser scanning data reduction is proposed. The overall technical design route of the method is shown as follows. Based on this model, the 3D laser scanning method is used to collect 3D images of metal artefacts, combined with colour space and 2D entropy detection methods to pre‐process 3D images, and feature matching of point clouds is carried out to extract and optimize the significant value of superpixels, and a 3D reconstructed visual model is constructed. Affine transformation is used to obtain the affine invariant moment of the structural light parameters of the visual feature lines of metal cultural relics. The light stability adjustment of the three‐dimensional reconstruction of metal cultural relics is realized by using the linear structural light adjustment method in the HSV colour space. The rigid and non‐rigid registration methods are introduced to match the point cloud. The product quantization algorithm is used to linearize the error function, and the block feature detection and matching model of spatial image is obtained. The noise number is judged by the threshold value, and the three‐dimensional reconstruction technology is combined to realize the three‐dimensional reconstruction of metal relics. The simulation results show that this method has good visual expression ability, high feature recognition rate, and improves the three‐dimensional reconstruction ability of metal relics.","PeriodicalId":22858,"journal":{"name":"The Journal of Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139018395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
The Journal of Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1