Sivakumar Sangeetha, J. Logeshwaran, Muhammad Faheem, R. Kannadasan, Suganthi Sundararaju, Loganathan Vijayaraja
This paper presents an analysis of the performance of the Energy Aware Scheduling Algorithm (EASA) in a 5G green communication system. 5G green communication systems rely on EASA to manage resource sharing. The aim of the proposed model is to improve the efficiency and energy consumption of resource sharing in 5G green communication systems. The main objective is to address the challenges of achieving optimal resource utilization and minimizing energy consumption in these systems. To achieve this goal, the study proposes a novel energy‐aware scheduling model that takes into consideration the specific characteristics of 5G green communication systems. This model incorporates intelligent techniques for optimizing resource allocation and scheduling decisions, while also considering energy consumption constraints. The methodology used involves a combination of mathematical analysis and simulation studies. The mathematical analysis is used to formulate the optimization problem and design the scheduling model, while the simulations are used to evaluate its performance in various scenarios. The proposed EASM reached a 91.58% false discovery rate, a 64.33% false omission rate, a 90.62% prevalence threshold, and a 91.23% critical success index. The results demonstrate the effectiveness of the proposed model in terms of reducing energy consumption while maintaining a high level of resource utilization.
{"title":"Smart performance optimization of energy‐aware scheduling model for resource sharing in 5G green communication systems","authors":"Sivakumar Sangeetha, J. Logeshwaran, Muhammad Faheem, R. Kannadasan, Suganthi Sundararaju, Loganathan Vijayaraja","doi":"10.1049/tje2.12358","DOIUrl":"https://doi.org/10.1049/tje2.12358","url":null,"abstract":"This paper presents an analysis of the performance of the Energy Aware Scheduling Algorithm (EASA) in a 5G green communication system. 5G green communication systems rely on EASA to manage resource sharing. The aim of the proposed model is to improve the efficiency and energy consumption of resource sharing in 5G green communication systems. The main objective is to address the challenges of achieving optimal resource utilization and minimizing energy consumption in these systems. To achieve this goal, the study proposes a novel energy‐aware scheduling model that takes into consideration the specific characteristics of 5G green communication systems. This model incorporates intelligent techniques for optimizing resource allocation and scheduling decisions, while also considering energy consumption constraints. The methodology used involves a combination of mathematical analysis and simulation studies. The mathematical analysis is used to formulate the optimization problem and design the scheduling model, while the simulations are used to evaluate its performance in various scenarios. The proposed EASM reached a 91.58% false discovery rate, a 64.33% false omission rate, a 90.62% prevalence threshold, and a 91.23% critical success index. The results demonstrate the effectiveness of the proposed model in terms of reducing energy consumption while maintaining a high level of resource utilization.","PeriodicalId":22858,"journal":{"name":"The Journal of Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139965809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The optimal operation of power systems is one of the most critical issues for operators. Optimizing the operation of power systems while accommodating the increasing penetration of RES, owing to the intermittent and variable nature of these resources, stands as one of the most critical challenges for power systems. Numerous primary challenges, including fluctuations in load and nonlinear constraints, further complicate the issue, given its substantial dimensions. Therefore, this paper introduces an approach for improving the management of optimal generation and the associated carbon emissions costs of traditional power plants, which is achieved through integrating wind farms and incorporating battery energy storage. This enhancement is achieved by integrating wind farms and utilizing battery storage systems while considering the costs associated with traditional units using fossil fuels and the expenses related to carbon emissions. The simulation incorporates seven load customer types and five traditional generation sources integrated with wind farms and battery storage devices. The simulation results demonstrate that the new problem formulation has significantly improved the ability and performance of optimizing the scheduling of power plant generations.
{"title":"Integration of wind farm, energy storage and demand response for optimum management of generation and carbon emission","authors":"Kasra Shafiei, M. Tarafdar Hagh, Ali Seifi","doi":"10.1049/tje2.12348","DOIUrl":"https://doi.org/10.1049/tje2.12348","url":null,"abstract":"The optimal operation of power systems is one of the most critical issues for operators. Optimizing the operation of power systems while accommodating the increasing penetration of RES, owing to the intermittent and variable nature of these resources, stands as one of the most critical challenges for power systems. Numerous primary challenges, including fluctuations in load and nonlinear constraints, further complicate the issue, given its substantial dimensions. Therefore, this paper introduces an approach for improving the management of optimal generation and the associated carbon emissions costs of traditional power plants, which is achieved through integrating wind farms and incorporating battery energy storage. This enhancement is achieved by integrating wind farms and utilizing battery storage systems while considering the costs associated with traditional units using fossil fuels and the expenses related to carbon emissions. The simulation incorporates seven load customer types and five traditional generation sources integrated with wind farms and battery storage devices. The simulation results demonstrate that the new problem formulation has significantly improved the ability and performance of optimizing the scheduling of power plant generations.","PeriodicalId":22858,"journal":{"name":"The Journal of Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139634359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aiming at the traditional integrated fuse information fusion method that cannot simultaneously obtain high‐precision burst control parameters such as burst delay time, azimuth angle, and detection angle, the infrared imaging detector and range finder information fusion method based on particle filtering with BAS algorithm is proposed. Under the centralized information fusion structure that can obtain higher accuracy, first, use a faster linear interpolation method to realize the time alignment of the two asynchronous sensors. Second, for the strong non‐linear observation model in the missile target rendezvous model, use a particle filter framework that is not affected by the nonlinearity of the system function and non‐gaussian noise. Finally, Utilizing the single search BAS algorithm with low computational complexity to solve the problem of particle degradation in particle filtering and improve the accuracy of burst control. The experiment shows that in a typical simulation environment, the optimized information fusion method improves the burst delay time accuracy by 61.82%, azimuth accuracy by 66.28%, detection angle accuracy by 36.15%, and simulation time is shorter compared to traditional methods.
针对传统的综合引信信息融合方法无法同时获得高精度的突发延迟时间、方位角、探测角等突发控制参数的问题,提出了基于粒子滤波与 BAS 算法的红外成像探测器与测距仪信息融合方法。在可以获得更高精度的集中式信息融合结构下,首先,使用更快的线性插值方法实现两个异步传感器的时间对准。其次,针对导弹目标会合模型中的强非线性观测模型,采用不受系统函数非线性和非高斯噪声影响的粒子滤波框架。最后,利用计算复杂度较低的单搜索 BAS 算法解决粒子滤波中的粒子退化问题,提高猝发控制精度。实验表明,在典型仿真环境下,优化后的信息融合方法与传统方法相比,猝发延迟时间精度提高了 61.82%,方位角精度提高了 66.28%,探测角精度提高了 36.15%,仿真时间更短。
{"title":"An integrated fuse information fusion method for infrared imaging detector and range finder based on improved particle filter","authors":"Daozhi Wei, Ning Li, Junwei Li","doi":"10.1049/tje2.12351","DOIUrl":"https://doi.org/10.1049/tje2.12351","url":null,"abstract":"Aiming at the traditional integrated fuse information fusion method that cannot simultaneously obtain high‐precision burst control parameters such as burst delay time, azimuth angle, and detection angle, the infrared imaging detector and range finder information fusion method based on particle filtering with BAS algorithm is proposed. Under the centralized information fusion structure that can obtain higher accuracy, first, use a faster linear interpolation method to realize the time alignment of the two asynchronous sensors. Second, for the strong non‐linear observation model in the missile target rendezvous model, use a particle filter framework that is not affected by the nonlinearity of the system function and non‐gaussian noise. Finally, Utilizing the single search BAS algorithm with low computational complexity to solve the problem of particle degradation in particle filtering and improve the accuracy of burst control. The experiment shows that in a typical simulation environment, the optimized information fusion method improves the burst delay time accuracy by 61.82%, azimuth accuracy by 66.28%, detection angle accuracy by 36.15%, and simulation time is shorter compared to traditional methods.","PeriodicalId":22858,"journal":{"name":"The Journal of Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139631727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Anton Abramovych, I. Zaitsev, Volodymyr Piddubnyi, V. Bereznychenko
The eddy current method of control analyzed and the possibility of its use for the identification of metals and alloys substantiated. It is shown that this can be done by modernizing the eddy current radio engineering system with dynamic scanning of metal samples, which consists in the use of modern microcontrollers with high‐precision ADC operation. The structural of the modernized system is presented, some aspects of processing the received response signal are considered, which made it possible to highlight the information coefficients that would represent the metal or alloy as a generalized image. It is proposed to use machine learning methods to compare an unknown sample of a metal or alloy under study with those available in the collected database, which is shown on the example of the support vector machine method, which allows for real‐time identification of metals and alloys, to carry out express control, without human intervention in the identification process.
{"title":"Application of the support vector machines method for metal analyse by an eddy current system","authors":"Anton Abramovych, I. Zaitsev, Volodymyr Piddubnyi, V. Bereznychenko","doi":"10.1049/tje2.12346","DOIUrl":"https://doi.org/10.1049/tje2.12346","url":null,"abstract":"The eddy current method of control analyzed and the possibility of its use for the identification of metals and alloys substantiated. It is shown that this can be done by modernizing the eddy current radio engineering system with dynamic scanning of metal samples, which consists in the use of modern microcontrollers with high‐precision ADC operation. The structural of the modernized system is presented, some aspects of processing the received response signal are considered, which made it possible to highlight the information coefficients that would represent the metal or alloy as a generalized image. It is proposed to use machine learning methods to compare an unknown sample of a metal or alloy under study with those available in the collected database, which is shown on the example of the support vector machine method, which allows for real‐time identification of metals and alloys, to carry out express control, without human intervention in the identification process.","PeriodicalId":22858,"journal":{"name":"The Journal of Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139640087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Protection of an islanded inverter‐based microgrid is challenging because of variable and small fault current contribution of inverter‐based resources (IBR) and the absence of sequence currents. This paper proposes a fast and robust nonpilot directional protection scheme to address this challenge. This scheme relies on support vector machines (SVM) and the harmonic current injection capability of IBRs. Examining the harmonic currents measured by a relay during a fault shows that harmonic currents have similar magnitudes but different orientation under forward and reverse faults. Additionally, harmonic currents have similar orientation but different magnitudes under forward faults at different locations along the protected line. Using this, six SVMs are trained for each relay, given that there are three main types of faults (three‐phase‐to‐ground, line‐to‐line, and line‐to‐ground): three as directional elements and three as zone detection elements. A fault is detected and classified by the undervoltage element of a relay. Then, the measured harmonic currents are routed to the appropriate directionality and zone detection SVMs to facilitate proper relay coordination. The performance of the proposed method is evaluated on the CIGRE North American MV distribution benchmark system under various types of contingency scenarios using PSCAD/EMTDC software.
{"title":"Nonpilot directional protection of a microgrid","authors":"Ardavan Mohammadhassani, A. Mehrizi‐Sani","doi":"10.1049/tje2.12334","DOIUrl":"https://doi.org/10.1049/tje2.12334","url":null,"abstract":"Protection of an islanded inverter‐based microgrid is challenging because of variable and small fault current contribution of inverter‐based resources (IBR) and the absence of sequence currents. This paper proposes a fast and robust nonpilot directional protection scheme to address this challenge. This scheme relies on support vector machines (SVM) and the harmonic current injection capability of IBRs. Examining the harmonic currents measured by a relay during a fault shows that harmonic currents have similar magnitudes but different orientation under forward and reverse faults. Additionally, harmonic currents have similar orientation but different magnitudes under forward faults at different locations along the protected line. Using this, six SVMs are trained for each relay, given that there are three main types of faults (three‐phase‐to‐ground, line‐to‐line, and line‐to‐ground): three as directional elements and three as zone detection elements. A fault is detected and classified by the undervoltage element of a relay. Then, the measured harmonic currents are routed to the appropriate directionality and zone detection SVMs to facilitate proper relay coordination. The performance of the proposed method is evaluated on the CIGRE North American MV distribution benchmark system under various types of contingency scenarios using PSCAD/EMTDC software.","PeriodicalId":22858,"journal":{"name":"The Journal of Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138623889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper considers a Non‐Orthogonal Multiple Access (NOMA) network, in which base station transmits a data packet by multi‐user superposition to a destination. In this system, Successive Interference Cancellation (SIC) receiver is used to eliminate the co‐channel interference. Some physical layer parameters, such as modulation order and precoding matrix indicator (PMI), are required for the SIC receiver to separate the overlapped signals. However, an abundance of parameters would bring a large number of signalling overhead. To reduce the signalling overhead, some of these parameters can be blindly detected instead of signalling notification. To detect these kinds of parameters, a novel blind detection algorithm is proposed in this paper. Firstly, feature extraction based on wavelet cluster is introduced to obtain feature information from received data. Then a filter is designed to reduce the interference among these features. Theoretical analysis and simulation results show that the proposed algorithm achieves high detection performance under the computation complexity of approximate the max‐log likelihood algorithm.
{"title":"A novel blind detection algorithm for successive interference cancellation in non‐orthogonal multiple access system","authors":"Jia Liu, Hao Zhang, Bo Wang","doi":"10.1049/tje2.12339","DOIUrl":"https://doi.org/10.1049/tje2.12339","url":null,"abstract":"This paper considers a Non‐Orthogonal Multiple Access (NOMA) network, in which base station transmits a data packet by multi‐user superposition to a destination. In this system, Successive Interference Cancellation (SIC) receiver is used to eliminate the co‐channel interference. Some physical layer parameters, such as modulation order and precoding matrix indicator (PMI), are required for the SIC receiver to separate the overlapped signals. However, an abundance of parameters would bring a large number of signalling overhead. To reduce the signalling overhead, some of these parameters can be blindly detected instead of signalling notification. To detect these kinds of parameters, a novel blind detection algorithm is proposed in this paper. Firstly, feature extraction based on wavelet cluster is introduced to obtain feature information from received data. Then a filter is designed to reduce the interference among these features. Theoretical analysis and simulation results show that the proposed algorithm achieves high detection performance under the computation complexity of approximate the max‐log likelihood algorithm.","PeriodicalId":22858,"journal":{"name":"The Journal of Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139023065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fraud is a persistent and increasing problem in the telecom industry. Telcos work in isolation to prevent fraud. Sharing information is critical for detecting and preventing fraud. The primary constraint on sharing information is privacy preservation. Several techniques have been developed to share data while preserving privacy using privacy‐preserving record linkage (PPRL). Most of the PPRL techniques use a similarity measure like Jacquard similarity on homologous datasets, which are all prone to graph‐based attacks, rendering existing methods insecure. Many complex and slow techniques use the Bloom filter implementation, which can be compromised in a cryptanalysis attack. This paper proposes an attack‐proof PPRL method using existing infrastructure of a telco without a complex multistep protocol. First, a novel way of matching two non‐homologous datasets using attack‐proof digital signature schemes, like the Edwards‐curve digital signature algorithm is proposed. Here, Jaccard similarity can only be estimated using this method and not on the datasets directly. Second, two parties transact with a simple request–reply method. To validate the match accuracy, privacy preservation, and performance of this approach, it was tested on a large public dataset (North Carolina Voter Database). This method is secure against attacks and achieves 100% match accuracy with improved performance.
{"title":"Fraud detection through data sharing using privacy‐preserving record linkage, digital signature (EdDSA), and the MinHash technique: Detect fraud using privacy preserving record links","authors":"Satish Thomas, James Sluss","doi":"10.1049/tje2.12341","DOIUrl":"https://doi.org/10.1049/tje2.12341","url":null,"abstract":"Fraud is a persistent and increasing problem in the telecom industry. Telcos work in isolation to prevent fraud. Sharing information is critical for detecting and preventing fraud. The primary constraint on sharing information is privacy preservation. Several techniques have been developed to share data while preserving privacy using privacy‐preserving record linkage (PPRL). Most of the PPRL techniques use a similarity measure like Jacquard similarity on homologous datasets, which are all prone to graph‐based attacks, rendering existing methods insecure. Many complex and slow techniques use the Bloom filter implementation, which can be compromised in a cryptanalysis attack. This paper proposes an attack‐proof PPRL method using existing infrastructure of a telco without a complex multistep protocol. First, a novel way of matching two non‐homologous datasets using attack‐proof digital signature schemes, like the Edwards‐curve digital signature algorithm is proposed. Here, Jaccard similarity can only be estimated using this method and not on the datasets directly. Second, two parties transact with a simple request–reply method. To validate the match accuracy, privacy preservation, and performance of this approach, it was tested on a large public dataset (North Carolina Voter Database). This method is secure against attacks and achieves 100% match accuracy with improved performance.","PeriodicalId":22858,"journal":{"name":"The Journal of Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138992839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Capacity crunch has become critical in recent years as commercial communication systems approach their theoretical data rate limits. This work presents a low‐complexity digital backpropagation (DBP) implementation approach based on step size distribution that uses a binary logarithmic step size method to achieve high data rate optical transmission. The proposed scheme shows performance improvements (∆Q) of 2.36, 1.19, and 0.71 dB over linear compensation, constant step size (CSS) DBP, and logarithmic step size DBP techniques in a 2400 km 112 Gbit/s DP‐16 quadrature amplitude modulation (QAM) system, respectively. At 13 dBm, a high performance (Q) of 10.9 dB (BER = 2.25 × 10−4) is achieved, above the 3.80 × 10−3 hard‐decision forward error correction (HD‐FEC) limit, using the proposed scheme. Also, the allowable transmission distance is extended by 960 km at the HD‐FEC limit over the linear compensation technique. The optimization achieves a 38% saving in the number of DBP calculation steps compared to the CSS DBP, which considerably reduces the computational cost since a few steps are required for effective non‐linearity compensation.
{"title":"Digital backpropagation based on binary logarithmic step size distribution for fibre non‐linearity compensation","authors":"Albert Dede, E. Akowuah, S. Haxha","doi":"10.1049/tje2.12340","DOIUrl":"https://doi.org/10.1049/tje2.12340","url":null,"abstract":"Capacity crunch has become critical in recent years as commercial communication systems approach their theoretical data rate limits. This work presents a low‐complexity digital backpropagation (DBP) implementation approach based on step size distribution that uses a binary logarithmic step size method to achieve high data rate optical transmission. The proposed scheme shows performance improvements (∆Q) of 2.36, 1.19, and 0.71 dB over linear compensation, constant step size (CSS) DBP, and logarithmic step size DBP techniques in a 2400 km 112 Gbit/s DP‐16 quadrature amplitude modulation (QAM) system, respectively. At 13 dBm, a high performance (Q) of 10.9 dB (BER = 2.25 × 10−4) is achieved, above the 3.80 × 10−3 hard‐decision forward error correction (HD‐FEC) limit, using the proposed scheme. Also, the allowable transmission distance is extended by 960 km at the HD‐FEC limit over the linear compensation technique. The optimization achieves a 38% saving in the number of DBP calculation steps compared to the CSS DBP, which considerably reduces the computational cost since a few steps are required for effective non‐linearity compensation.","PeriodicalId":22858,"journal":{"name":"The Journal of Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139026604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Pandey, Ankit Kumar, D. P. Yadav, Anurag Sinha, M. Hassan, N. K. Singh, Yash Bhatnagar, Namit Garg
This novel approach in animal biology could revolutionize identifying endangered species, addressing the issue of misclassifying potentially harmful animals based solely on visual characteristics. Particularly impactful for farmers in agricultural fields, it aims to reduce the heightened risk of venomous animal attacks, ultimately improving safety. Due to a lack of accessible education, illiterate farmers are more susceptible to adopting superstitious beliefs, which tragically leads to fatal snakebites even when medical treatment is readily available. Furthermore, environmental factors can unexpectedly hold typically non‐threatening animals responsible for a large number of human deaths each year. However, the complexity of human recognition of these hazards has prompted the development of a novel design approach aimed at simplifying the process. Integration of the ResNet learning algorithm in conjunction with You Only Look Once (YOLOv5) within the framework is recommended to facilitate real‐time processing and improve accuracy. This combined approach not only speeds up animal recognition but also takes advantage of ResNet's deep learning capabilities. The first phase entails deploying YOLOv5 to detect the presence of snakes in the proposed study, achieving a remarkable 87% precision in snake detection thanks to the synergistic fusion of ResNet and YOLOv5.
这种动物生物学上的新方法可以彻底改变濒危物种的识别,解决仅仅基于视觉特征对潜在有害动物进行错误分类的问题。它对农业领域的农民尤其有影响力,旨在降低有毒动物袭击的高风险,最终提高安全性。由于缺乏接受教育的机会,不识字的农民更容易接受迷信信仰,即使有现成的治疗方法,也不幸导致致命的蛇咬伤。此外,环境因素可能出人意料地使通常不具威胁性的动物对每年大量的人类死亡负责。然而,人类识别这些危险的复杂性促使了一种新的设计方法的发展,旨在简化这一过程。建议将ResNet学习算法与框架内的You Only Look Once (YOLOv5)相结合,以促进实时处理并提高准确性。这种组合方法不仅加快了动物识别速度,而且利用了ResNet的深度学习能力。第一阶段需要部署YOLOv5来检测拟议研究中的蛇的存在,由于ResNet和YOLOv5的协同融合,蛇的检测精度达到了惊人的87%。
{"title":"Health evaluation and dangerous reptile detection using a novel framework powered by the YOLO algorithm to design high‐content cellular imaging systems","authors":"S. Pandey, Ankit Kumar, D. P. Yadav, Anurag Sinha, M. Hassan, N. K. Singh, Yash Bhatnagar, Namit Garg","doi":"10.1049/tje2.12335","DOIUrl":"https://doi.org/10.1049/tje2.12335","url":null,"abstract":"This novel approach in animal biology could revolutionize identifying endangered species, addressing the issue of misclassifying potentially harmful animals based solely on visual characteristics. Particularly impactful for farmers in agricultural fields, it aims to reduce the heightened risk of venomous animal attacks, ultimately improving safety. Due to a lack of accessible education, illiterate farmers are more susceptible to adopting superstitious beliefs, which tragically leads to fatal snakebites even when medical treatment is readily available. Furthermore, environmental factors can unexpectedly hold typically non‐threatening animals responsible for a large number of human deaths each year. However, the complexity of human recognition of these hazards has prompted the development of a novel design approach aimed at simplifying the process. Integration of the ResNet learning algorithm in conjunction with You Only Look Once (YOLOv5) within the framework is recommended to facilitate real‐time processing and improve accuracy. This combined approach not only speeds up animal recognition but also takes advantage of ResNet's deep learning capabilities. The first phase entails deploying YOLOv5 to detect the presence of snakes in the proposed study, achieving a remarkable 87% precision in snake detection thanks to the synergistic fusion of ResNet and YOLOv5.","PeriodicalId":22858,"journal":{"name":"The Journal of Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138622365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The extraction effect and feature matching are poor in the three‐dimensional reconstruction of metal cultural relics, which leads to a poor reconstruction effect. Therefore, an optimization method of three‐dimensional reconstruction of metal cultural relics based on 3D laser scanning data reduction is proposed. The overall technical design route of the method is shown as follows. Based on this model, the 3D laser scanning method is used to collect 3D images of metal artefacts, combined with colour space and 2D entropy detection methods to pre‐process 3D images, and feature matching of point clouds is carried out to extract and optimize the significant value of superpixels, and a 3D reconstructed visual model is constructed. Affine transformation is used to obtain the affine invariant moment of the structural light parameters of the visual feature lines of metal cultural relics. The light stability adjustment of the three‐dimensional reconstruction of metal cultural relics is realized by using the linear structural light adjustment method in the HSV colour space. The rigid and non‐rigid registration methods are introduced to match the point cloud. The product quantization algorithm is used to linearize the error function, and the block feature detection and matching model of spatial image is obtained. The noise number is judged by the threshold value, and the three‐dimensional reconstruction technology is combined to realize the three‐dimensional reconstruction of metal relics. The simulation results show that this method has good visual expression ability, high feature recognition rate, and improves the three‐dimensional reconstruction ability of metal relics.
{"title":"Optimization method of 3D reconstruction of metal cultural relics based on 3D laser scanning data reduction","authors":"Xiang Chen, Ling Wang, Feng Ding","doi":"10.1049/tje2.12337","DOIUrl":"https://doi.org/10.1049/tje2.12337","url":null,"abstract":"The extraction effect and feature matching are poor in the three‐dimensional reconstruction of metal cultural relics, which leads to a poor reconstruction effect. Therefore, an optimization method of three‐dimensional reconstruction of metal cultural relics based on 3D laser scanning data reduction is proposed. The overall technical design route of the method is shown as follows. Based on this model, the 3D laser scanning method is used to collect 3D images of metal artefacts, combined with colour space and 2D entropy detection methods to pre‐process 3D images, and feature matching of point clouds is carried out to extract and optimize the significant value of superpixels, and a 3D reconstructed visual model is constructed. Affine transformation is used to obtain the affine invariant moment of the structural light parameters of the visual feature lines of metal cultural relics. The light stability adjustment of the three‐dimensional reconstruction of metal cultural relics is realized by using the linear structural light adjustment method in the HSV colour space. The rigid and non‐rigid registration methods are introduced to match the point cloud. The product quantization algorithm is used to linearize the error function, and the block feature detection and matching model of spatial image is obtained. The noise number is judged by the threshold value, and the three‐dimensional reconstruction technology is combined to realize the three‐dimensional reconstruction of metal relics. The simulation results show that this method has good visual expression ability, high feature recognition rate, and improves the three‐dimensional reconstruction ability of metal relics.","PeriodicalId":22858,"journal":{"name":"The Journal of Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139018395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}