首页 > 最新文献

Computers & Electrical Engineering最新文献

英文 中文
BMGANet: A deep learning model for source code vulnerability detection by integrating token-level and function-level features BMGANet:通过集成令牌级和功能级特性,用于源代码漏洞检测的深度学习模型
IF 4.9 3区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-01-30 DOI: 10.1016/j.compeleceng.2026.110999
Erzhou Zhu, Xiangshan Qu, Xiaohan Liu, Xuejian Li
Deep learning is widely used in vulnerability detection due to its high accuracy. However, existing models often fail to capture both token-level and function-level features. To address this limitation, a BERT-based Multi-Granularity Attention Network (BMGANet) is proposed. In the BMGANet model, Program Dependence Graphs (PDGs) are first constructed using the Joern tool, and Abstract Syntax Trees (ASTs) are extracted according to predefined vulnerability rules. Cross-user-defined-function program slicing and code normalization are then applied to enhance analysis efficiency. Processed code slices are fed into a BERT network to extract initial token-level and function-level features. To overcome BERT’s limitation in modeling temporal dependencies, an LSTM network and a multi-head attention mechanism are sequentially employed to refine token-level features. The refined token-level features are then fused with function-level features for accurate vulnerability detection. Two pretraining tasks, namely the dynamic masked token prediction and the inter-code-line logical correlation prediction, are introduced to strengthen the model’s ability to handle semantic gaps and weak logical connections. Experimental results on both synthetic and real-world datasets show that BMGANet outperforms state-of-the-art methods.
深度学习以其较高的准确率在漏洞检测中得到了广泛的应用。然而,现有的模型常常不能同时捕获令牌级和功能级的特性。为了解决这一问题,提出了一种基于bert的多粒度注意力网络(BMGANet)。在BMGANet模型中,首先使用Joern工具构建程序依赖图(PDGs),并根据预定义的漏洞规则提取抽象语法树(ast)。然后应用跨用户定义函数的程序切片和代码规范化来提高分析效率。处理后的代码片被馈送到BERT网络中,以提取初始的令牌级和功能级特征。为了克服BERT在建模时间依赖性方面的局限性,本文采用LSTM网络和多头注意机制来改进标记级特征。然后将改进的令牌级特征与功能级特征融合,以实现准确的漏洞检测。引入动态掩码令牌预测和代码行间逻辑关联预测两项预训练任务,增强模型对语义间隙和弱逻辑连接的处理能力。在合成数据集和真实数据集上的实验结果表明,BMGANet优于最先进的方法。
{"title":"BMGANet: A deep learning model for source code vulnerability detection by integrating token-level and function-level features","authors":"Erzhou Zhu,&nbsp;Xiangshan Qu,&nbsp;Xiaohan Liu,&nbsp;Xuejian Li","doi":"10.1016/j.compeleceng.2026.110999","DOIUrl":"10.1016/j.compeleceng.2026.110999","url":null,"abstract":"<div><div>Deep learning is widely used in vulnerability detection due to its high accuracy. However, existing models often fail to capture both token-level and function-level features. To address this limitation, a BERT-based Multi-Granularity Attention Network (BMGANet) is proposed. In the BMGANet model, Program Dependence Graphs (PDGs) are first constructed using the Joern tool, and Abstract Syntax Trees (ASTs) are extracted according to predefined vulnerability rules. Cross-user-defined-function program slicing and code normalization are then applied to enhance analysis efficiency. Processed code slices are fed into a BERT network to extract initial token-level and function-level features. To overcome BERT’s limitation in modeling temporal dependencies, an LSTM network and a multi-head attention mechanism are sequentially employed to refine token-level features. The refined token-level features are then fused with function-level features for accurate vulnerability detection. Two pretraining tasks, namely the dynamic masked token prediction and the inter-code-line logical correlation prediction, are introduced to strengthen the model’s ability to handle semantic gaps and weak logical connections. Experimental results on both synthetic and real-world datasets show that BMGANet outperforms state-of-the-art methods.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"132 ","pages":"Article 110999"},"PeriodicalIF":4.9,"publicationDate":"2026-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146080148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A framework for handling class imbalance in malicious URL dataset 一个处理恶意URL数据集中类不平衡的框架
IF 4.9 3区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-01-30 DOI: 10.1016/j.compeleceng.2026.111004
K.G. Raghavendra Narayan , Srijanee Mookherji , Vanga Odelu , Rajendra Prasath
With the advancement of technology, cyberattacks on Internet-based services such as email, e-commerce, social networking, and electronic healthcare are increasing. Since many of these services are accessed through URLs, they have become a primary source for cyberattacks, including phishing and malware. Anti-Phishing Working Group (APWG) reported nearly 1 million phishing attacks in the first quarter of 2025. Early detection of malicious URLs is therefore critical to preventing these threats. Therefore, an efficient detection of malicious URLs is an emerging research problem. However, most ML/DL-based studies focus on overall model accuracy and tend to be biased towards majority classes in imbalanced datasets. In this paper, we propose a machine learning-based malicious URL detection framework specifically designed for imbalanced datasets. We use the ISCX-URL2016 dataset to evaluate model performance across multiple ML algorithms and classbalancing techniques. Our proposed framework, combining the LightGBM classifier with ADASYN oversampling, achieves 99.76% accuracy in multi-class and 99.92% in binary classification. Notably, it shows a 5.93% improvement in detecting phishing URLs, a minority class in the dataset, over existing models. A significant achievement of our approach is its uniform performance across all classes, effectively reducing bias towards majority classes, while existing models fail to achieve it, particularly minority classes. We also validated the proposed model using recent datasets. We further evaluate the framework using various feature selection techniques, demonstrating its effectiveness with fewer features. Additionally, we perform statistical significance testing to validate the reliability of our model, confirming its suitability for real-world applications.
随着技术的进步,针对基于互联网的服务(如电子邮件、电子商务、社交网络和电子医疗保健)的网络攻击正在增加。由于这些服务中的许多都是通过url访问的,因此它们已成为网络攻击的主要来源,包括网络钓鱼和恶意软件。反网络钓鱼工作组(APWG)报告称,2025年第一季度发生了近100万次网络钓鱼攻击。因此,早期检测恶意url对于防止这些威胁至关重要。因此,如何有效地检测恶意url是一个新兴的研究课题。然而,大多数基于ML/ dl的研究关注的是整体模型的准确性,并且倾向于不平衡数据集中的大多数类别。在本文中,我们提出了一个专门针对不平衡数据集设计的基于机器学习的恶意URL检测框架。我们使用ISCX-URL2016数据集来评估跨多种ML算法和类平衡技术的模型性能。我们提出的框架将LightGBM分类器与ADASYN过采样相结合,在多类分类中达到99.76%的准确率,在二元分类中达到99.92%的准确率。值得注意的是,与现有模型相比,它在检测网络钓鱼url(数据集中的少数类)方面提高了5.93%。我们的方法的一个重要成就是它在所有类别中的统一表现,有效地减少了对多数类别的偏见,而现有模型无法实现这一点,特别是少数类别。我们还使用最近的数据集验证了所提出的模型。我们使用各种特征选择技术进一步评估该框架,证明其在较少特征下的有效性。此外,我们执行统计显著性检验来验证我们的模型的可靠性,确认其适用于现实世界的应用。
{"title":"A framework for handling class imbalance in malicious URL dataset","authors":"K.G. Raghavendra Narayan ,&nbsp;Srijanee Mookherji ,&nbsp;Vanga Odelu ,&nbsp;Rajendra Prasath","doi":"10.1016/j.compeleceng.2026.111004","DOIUrl":"10.1016/j.compeleceng.2026.111004","url":null,"abstract":"<div><div>With the advancement of technology, cyberattacks on Internet-based services such as email, e-commerce, social networking, and electronic healthcare are increasing. Since many of these services are accessed through URLs, they have become a primary source for cyberattacks, including phishing and malware. Anti-Phishing Working Group (APWG) reported nearly 1 million phishing attacks in the first quarter of 2025. Early detection of malicious URLs is therefore critical to preventing these threats. Therefore, an efficient detection of malicious URLs is an emerging research problem. However, most ML/DL-based studies focus on overall model accuracy and tend to be biased towards majority classes in imbalanced datasets. In this paper, we propose a machine learning-based malicious URL detection framework specifically designed for imbalanced datasets. We use the ISCX-URL2016 dataset to evaluate model performance across multiple ML algorithms and classbalancing techniques. Our proposed framework, combining the LightGBM classifier with ADASYN oversampling, achieves 99.76% accuracy in multi-class and 99.92% in binary classification. Notably, it shows a 5.93% improvement in detecting phishing URLs, a minority class in the dataset, over existing models. A significant achievement of our approach is its uniform performance across all classes, effectively reducing bias towards majority classes, while existing models fail to achieve it, particularly minority classes. We also validated the proposed model using recent datasets. We further evaluate the framework using various feature selection techniques, demonstrating its effectiveness with fewer features. Additionally, we perform statistical significance testing to validate the reliability of our model, confirming its suitability for real-world applications.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"132 ","pages":"Article 111004"},"PeriodicalIF":4.9,"publicationDate":"2026-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146080161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimization of hybrid flow shop scheduling with batch processing and variable sublots via a multi-agent deep reinforcement learning–guided hybrid algorithm 基于多智能体深度强化学习引导的批处理可变子批混合流水车间调度优化
IF 4.9 3区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-01-30 DOI: 10.1016/j.compeleceng.2026.110987
Qian Zheng , Yuyan Han , Yuting Wang , Daqing Liu , Mingxiao Ma , Leilei Meng
This paper investigates the Hybrid Flow Shop Scheduling Problem with Batch Processing Machines and Variable Sublots (HFSP-BVS), considering sequence-dependent setup times and transportation times, with the objective of minimizing total tardiness. The complexity of HFSP-BVS lies in the tight coupling among lot sequencing, lot splitting, and machine assignment, making it highly challenging in modern manufacturing environments. To address this problem, a Mixed-Integer Linear Programming (MILP) model is formulated and validated using the Gurobi solver. Subsequently, a hybrid algorithm, MADDQN_IG, is proposed by integrating the Multi-Agent Double Deep Q-Network (MADDQN) with Iterated Greedy (IG). The algorithm incorporates four key components: (1) a triple two-layer initialization strategy; (2) a dual-layer destruction-reconstruction parameter selection agent; (3) a local search strategy selection agent; and (4) a multi-agent DDQN construction and training process. These elements are embedded within a unified framework to enhance search efficiency and optimization depth. Extensive computational experiments on 100 benchmark instances demonstrate that MADDQN_IG consistently outperforms existing advanced algorithms (NCIG, QABC, vCCEA, GA), achieving superior solution quality and robustness within limited computation time. Specifically, under three termination criteria (δ = 100, 200, 300), MADDQN_IG improves the ARDI by 78.57%–98.57% and ranks first in the Friedman test, confirming the effectiveness and adaptability of the proposed framework.
本文研究了具有批处理机和可变子批的混合流水车间调度问题,考虑了顺序相关的设置时间和运输时间,以最小化总延误为目标。HFSP-BVS的复杂性在于批排序、批拆分和机器分配之间的紧密耦合,这使得它在现代制造环境中极具挑战性。为了解决这个问题,提出了一个混合整数线性规划(MILP)模型,并使用Gurobi求解器进行了验证。随后,将Multi-Agent Double Deep Q-Network (MADDQN)算法与迭代贪婪(IG)算法相结合,提出了一种混合算法MADDQN_IG。该算法包含四个关键部分:(1)三层两层初始化策略;(2)双层破坏重建参数选择剂;(3)局部搜索策略选择代理;(4)多智能体DDQN构建和训练过程。这些元素被嵌入到一个统一的框架中,以提高搜索效率和优化深度。在100个基准实例上的大量计算实验表明,MADDQN_IG持续优于现有的高级算法(NCIG、QABC、vCCEA、GA),在有限的计算时间内实现了卓越的解质量和鲁棒性。具体而言,在三个终止准则(δ = 100,200,300)下,MADDQN_IG将ARDI提高了78.57%-98.57%,在Friedman检验中排名第一,证实了所提框架的有效性和适应性。
{"title":"Optimization of hybrid flow shop scheduling with batch processing and variable sublots via a multi-agent deep reinforcement learning–guided hybrid algorithm","authors":"Qian Zheng ,&nbsp;Yuyan Han ,&nbsp;Yuting Wang ,&nbsp;Daqing Liu ,&nbsp;Mingxiao Ma ,&nbsp;Leilei Meng","doi":"10.1016/j.compeleceng.2026.110987","DOIUrl":"10.1016/j.compeleceng.2026.110987","url":null,"abstract":"<div><div>This paper investigates the Hybrid Flow Shop Scheduling Problem with Batch Processing Machines and Variable Sublots (HFSP-BVS), considering sequence-dependent setup times and transportation times, with the objective of minimizing total tardiness. The complexity of HFSP-BVS lies in the tight coupling among lot sequencing, lot splitting, and machine assignment, making it highly challenging in modern manufacturing environments. To address this problem, a Mixed-Integer Linear Programming (MILP) model is formulated and validated using the Gurobi solver. Subsequently, a hybrid algorithm, MADDQN_IG, is proposed by integrating the Multi-Agent Double Deep Q-Network (MADDQN) with Iterated Greedy (IG). The algorithm incorporates four key components: (1) a triple two-layer initialization strategy; (2) a dual-layer destruction-reconstruction parameter selection agent; (3) a local search strategy selection agent; and (4) a multi-agent DDQN construction and training process. These elements are embedded within a unified framework to enhance search efficiency and optimization depth. Extensive computational experiments on 100 benchmark instances demonstrate that MADDQN_IG consistently outperforms existing advanced algorithms (NCIG, QABC, vCCEA, GA), achieving superior solution quality and robustness within limited computation time. Specifically, under three termination criteria (<em><strong>δ</strong></em> = 100, 200, 300), MADDQN_IG improves the ARDI by 78.57%–98.57% and ranks first in the Friedman test, confirming the effectiveness and adaptability of the proposed framework.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"132 ","pages":"Article 110987"},"PeriodicalIF":4.9,"publicationDate":"2026-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146080167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cybersecurity in intelligent railway systems: Taxonomy, research trends, challenges, and future directions 智能铁路系统中的网络安全:分类、研究趋势、挑战和未来方向
IF 4.9 3区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-01-30 DOI: 10.1016/j.compeleceng.2026.110994
Mays Abukeshek , Mohammed Al-Mhiqani , Simon Parkinson , Saad Khan , George Bearfield
The rapid digitalisation unfolding in railway systems poses new cybersecurity concerns, thereby requiring solutions that will take the necessary steps to defend against tangible emerging threats. This study aims to systematically review the current cybersecurity research landscape within railway systems. Using a systematic protocol, we comprehensively searched five key online databases: IEEE Xplore, Web of Science, Scopus, ACM, and ScienceDirect. These online databases are recognised for their overall broad coverage and the exhibition of relevance to this study's purpose. Our systematic selection process, facilitated through a predetermined set of inclusion and exclusion criteria, resulted in 114 relevant articles. Among them, 51.8% of the articles reviewed also addressed Control System Security Solutions, while 14% of the articles examined Network Security Solutions, and 12.3% addressed Data Protection and Privacy Solutions. 7% of the articles studied Awareness and Training Solutions, while the remaining 14.9% adopted other approaches. Results identified several significant gaps and challenges relating to railway cybersecurity research, which include issues relating to embracing critical technologies, confirming data privacy, and the need for ongoing education and training of railway workers. Additionally, the study indicated a lack of standardised performance measures and the use of testing datasets, which will impact confidence in measuring the effectiveness of cybersecurity solutions. Ultimately, this research paper advances understanding and contributions to the current railway cybersecurity research landscape, while providing critical recommendations for future research. Efforts towards enhancing international collaboration, adopting emergent technologies such as AI and Blockchain and prioritising education and awareness initiatives are some of the most critical emerging next steps related to cybersecurity and resilience of railway systems.
铁路系统的快速数字化发展带来了新的网络安全问题,因此需要采取必要措施来防御切实的新威胁的解决方案。本研究旨在系统回顾当前铁路系统内的网络安全研究现状。使用系统协议,我们全面检索了五个关键在线数据库:IEEE Xplore, Web of Science, Scopus, ACM和ScienceDirect。这些在线数据库因其全面广泛的覆盖范围和与本研究目的相关的展示而得到认可。我们通过一套预先确定的纳入和排除标准,进行了系统的选择过程,产生了114篇相关文章。其中,51.8%的文章涉及控制系统安全解决方案,14%的文章涉及网络安全解决方案,12.3%的文章涉及数据保护和隐私解决方案,7%的文章研究意识和培训解决方案,其余14.9%采用其他方法。结果确定了与铁路网络安全研究相关的几个重大差距和挑战,其中包括与采用关键技术、确认数据隐私以及对铁路工人进行持续教育和培训的必要性有关的问题。此外,该研究表明,缺乏标准化的性能衡量标准和测试数据集的使用,这将影响衡量网络安全解决方案有效性的信心。最后,本研究论文促进了对当前铁路网络安全研究格局的理解和贡献,同时为未来的研究提供了关键建议。努力加强国际合作,采用人工智能和区块链等新兴技术,优先开展教育和提高意识举措,是与网络安全和铁路系统弹性相关的一些最关键的后续步骤。
{"title":"Cybersecurity in intelligent railway systems: Taxonomy, research trends, challenges, and future directions","authors":"Mays Abukeshek ,&nbsp;Mohammed Al-Mhiqani ,&nbsp;Simon Parkinson ,&nbsp;Saad Khan ,&nbsp;George Bearfield","doi":"10.1016/j.compeleceng.2026.110994","DOIUrl":"10.1016/j.compeleceng.2026.110994","url":null,"abstract":"<div><div>The rapid digitalisation unfolding in railway systems poses new cybersecurity concerns, thereby requiring solutions that will take the necessary steps to defend against tangible emerging threats. This study aims to systematically review the current cybersecurity research landscape within railway systems. Using a systematic protocol, we comprehensively searched five key online databases: IEEE Xplore, Web of Science, Scopus, ACM, and ScienceDirect. These online databases are recognised for their overall broad coverage and the exhibition of relevance to this study's purpose. Our systematic selection process, facilitated through a predetermined set of inclusion and exclusion criteria, resulted in 114 relevant articles. Among them, 51.8% of the articles reviewed also addressed Control System Security Solutions, while 14% of the articles examined Network Security Solutions, and 12.3% addressed Data Protection and Privacy Solutions. 7% of the articles studied Awareness and Training Solutions, while the remaining 14.9% adopted other approaches. Results identified several significant gaps and challenges relating to railway cybersecurity research, which include issues relating to embracing critical technologies, confirming data privacy, and the need for ongoing education and training of railway workers. Additionally, the study indicated a lack of standardised performance measures and the use of testing datasets, which will impact confidence in measuring the effectiveness of cybersecurity solutions. Ultimately, this research paper advances understanding and contributions to the current railway cybersecurity research landscape, while providing critical recommendations for future research. Efforts towards enhancing international collaboration, adopting emergent technologies such as AI and Blockchain and prioritising education and awareness initiatives are some of the most critical emerging next steps related to cybersecurity and resilience of railway systems.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"132 ","pages":"Article 110994"},"PeriodicalIF":4.9,"publicationDate":"2026-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146080164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-based user-centric privacy-preserving framework for vehicular data sharing and monetization 基于区块链的以用户为中心的车辆数据共享和货币化隐私保护框架
IF 4.9 3区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-01-30 DOI: 10.1016/j.compeleceng.2026.110933
Koosha Mohammad Hossein , Negar Rezaei , Ahmad Khonsari , Mahdi Dolati , Tooska Dargahi , Meisam Babaie
Modern connected vehicles continuously generate large volumes of data, enabling new data-sharing and monetization services while simultaneously raising serious concerns about privacy, access control, and scalability. Recent blockchain-based approaches improve transparency and user control, but often rely on coarse-grained access policies, costly symmetric key management, and limited scalability, making them unsuitable for realistic, high-volume vehicle data markets. Moreover, purely owner-centric access control may conflict with legitimate requirements from authorized third parties, such as manufacturers or regulatory authorities. In this paper, we propose a scalable, privacy-preserving framework for vehicle data sharing and monetization that combines blockchain-based smart contracts with attribute-based and identity-based encryption. The framework enables fine-grained, policy-driven access control while preserving data confidentiality and supporting authorized exceptional access when required. We evaluate the proposed design through security analysis and experimental measurements1, demonstrating that it achieves strong privacy guarantees with modest overhead and scales to realistic workloads.
现代互联汽车不断产生大量数据,使新的数据共享和货币化服务成为可能,同时也引发了对隐私、访问控制和可扩展性的严重担忧。最近基于区块链的方法提高了透明度和用户控制,但通常依赖于粗粒度的访问策略、昂贵的对称密钥管理和有限的可扩展性,使其不适合现实的、大容量的车辆数据市场。此外,纯粹以所有者为中心的访问控制可能与授权第三方(如制造商或监管机构)的合法需求相冲突。在本文中,我们为车辆数据共享和货币化提出了一个可扩展的隐私保护框架,该框架将基于区块链的智能合约与基于属性和基于身份的加密相结合。该框架支持细粒度、策略驱动的访问控制,同时保留数据机密性,并在需要时支持授权的异常访问。我们通过安全分析和实验测量评估了所提出的设计1,证明它以适度的开销实现了强大的隐私保证,并可扩展到实际工作负载。
{"title":"Blockchain-based user-centric privacy-preserving framework for vehicular data sharing and monetization","authors":"Koosha Mohammad Hossein ,&nbsp;Negar Rezaei ,&nbsp;Ahmad Khonsari ,&nbsp;Mahdi Dolati ,&nbsp;Tooska Dargahi ,&nbsp;Meisam Babaie","doi":"10.1016/j.compeleceng.2026.110933","DOIUrl":"10.1016/j.compeleceng.2026.110933","url":null,"abstract":"<div><div>Modern connected vehicles continuously generate large volumes of data, enabling new data-sharing and monetization services while simultaneously raising serious concerns about privacy, access control, and scalability. Recent blockchain-based approaches improve transparency and user control, but often rely on coarse-grained access policies, costly symmetric key management, and limited scalability, making them unsuitable for realistic, high-volume vehicle data markets. Moreover, purely owner-centric access control may conflict with legitimate requirements from authorized third parties, such as manufacturers or regulatory authorities. In this paper, we propose a scalable, privacy-preserving framework for vehicle data sharing and monetization that combines blockchain-based smart contracts with attribute-based and identity-based encryption. The framework enables fine-grained, policy-driven access control while preserving data confidentiality and supporting authorized exceptional access when required. We evaluate the proposed design through security analysis and experimental measurements<span><span><sup>1</sup></span></span>, demonstrating that it achieves strong privacy guarantees with modest overhead and scales to realistic workloads.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"132 ","pages":"Article 110933"},"PeriodicalIF":4.9,"publicationDate":"2026-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146080160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Torque ripple suppression in a BLDC driven solar-fed aqua pumping system integrating an ANN-Based MPPT controlled coupled interleaved boost converter 基于ann - MPPT控制耦合交错升压变换器的无刷直流驱动太阳能水泵系统转矩脉动抑制
IF 4.9 3区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-01-29 DOI: 10.1016/j.compeleceng.2026.110975
Ayush Purwar , Risha Mal , Saheli Ray
Brushless DC motors controlled using conventional 120° electronic commutation schemes exhibit stator current discontinuities during phase commutation, resulting in torque ripple that leads to flow fluctuations, noise, and vibration in aqua-pumping applications. This paper proposes a Hall-sensored 180° electronic commutation scheme implemented as a simplified six-step logic using Boolean Disjunctive Normal Form (DNF), enabling extended-angle conduction while avoiding the implementation complexity of zero-crossing detection (every 60° electrical) required in sensorless methods. A new multi-stage off-grid solar photovoltaic array (SPA)-powered pumping system assisted by twin-battery storage is presented, incorporating a two-phase direct-coupled interleaved boost (2P-DCIB) converter to raise the SPA voltage to 310 V at the DC link, achieving a voltage gain of 2 at a duty cycle of 0.327. To manage dynamic irradiance conditions, an ANN-based MPPT employing alternative inputs (error Er and change in error ΔEr) is formulated to accelerate tracking, eliminate the need for dataloggers required by conventional-input ANN MPPTs, and remove the complex manual tuning associated with fuzzy rule-based approaches. This work further introduces a Twin Battery Storage Control (TBSC) scheme that coordinates the master and secondary battery stacks through parallel-active bidirectional converters. The TBSC enforces state-of-charge limits (15 % ≤ SoC ≤ 95 %), corresponding to an effective 80 % depth of discharge, and provides protection against overcharging and over-discharging while simultaneously addressing DC-link voltage deviations typically observed with conventional controllers during protective actions. The scheme stabilizes the DC-link voltage with near-zero deviation, ensuring rated motor operation even under extreme conditions. The effectiveness of the proposed control strategies in suppressing peak-to-peak and RMS torque ripple and maintaining tight DC-link voltage regulation is demonstrated through MATLAB/Simulink simulations and validated using real-time digital simulations on the OPAL-RT OP4510 platform. Comparative evaluation against existing commutation and MPPT techniques confirms the performance improvements achieved by the proposed system.
使用传统120°电子换向方案控制的无刷直流电动机在相位换向期间显示定子电流不连续,导致转矩脉动,导致水泵应用中的流量波动,噪音和振动。本文提出了一种霍尔传感器180°电子换相方案,采用布尔析取范式(DNF)作为简化的六步逻辑实现,实现了扩展角导通,同时避免了无传感器方法所需的过零检测(每60°电)的实现复杂性。提出了一种新型多级离网太阳能光伏阵列(SPA)驱动的双电池储能泵浦系统,该系统采用两相直接耦合交错升压(2P-DCIB)转换器,在直流链路将SPA电压提升至310 V,在占空比为0.327时获得2的电压增益。为了管理动态辐照条件,制定了基于人工神经网络的MPPT,采用替代输入(误差Er和误差变化ΔEr)来加速跟踪,消除了传统输入人工神经网络MPPT所需的数据记录器的需要,并消除了与基于模糊规则的方法相关的复杂手动调整。本工作进一步介绍了一种双电池存储控制(TBSC)方案,该方案通过并联有源双向变换器协调主电池组和二次电池组。TBSC强制执行充电状态限制(15%≤SoC≤95%),对应于有效的80%放电深度,并提供防止过充和过放电的保护,同时解决保护动作期间传统控制器通常观察到的直流链路电压偏差。该方案稳定直流链路电压接近零偏差,即使在极端条件下也能确保额定电机运行。通过MATLAB/Simulink仿真验证了所提出的控制策略在抑制峰间和均方根转矩脉动以及保持直流链路电压严格调节方面的有效性,并在OPAL-RT OP4510平台上进行了实时数字仿真验证。与现有换流和MPPT技术的比较评价证实了所提出的系统所取得的性能改进。
{"title":"Torque ripple suppression in a BLDC driven solar-fed aqua pumping system integrating an ANN-Based MPPT controlled coupled interleaved boost converter","authors":"Ayush Purwar ,&nbsp;Risha Mal ,&nbsp;Saheli Ray","doi":"10.1016/j.compeleceng.2026.110975","DOIUrl":"10.1016/j.compeleceng.2026.110975","url":null,"abstract":"<div><div>Brushless DC motors controlled using conventional 120° electronic commutation schemes exhibit stator current discontinuities during phase commutation, resulting in torque ripple that leads to flow fluctuations, noise, and vibration in aqua-pumping applications. This paper proposes a Hall-sensored 180° electronic commutation scheme implemented as a simplified six-step logic using Boolean Disjunctive Normal Form (DNF), enabling extended-angle conduction while avoiding the implementation complexity of zero-crossing detection (every 60° electrical) required in sensorless methods. A new multi-stage off-grid solar photovoltaic array (SPA)-powered pumping system assisted by twin-battery storage is presented, incorporating a two-phase direct-coupled interleaved boost (2P-DCIB) converter to raise the SPA voltage to 310 V at the DC link, achieving a voltage gain of 2 at a duty cycle of 0.327. To manage dynamic irradiance conditions, an ANN-based MPPT employing alternative inputs (error E<sub>r</sub> and change in error ΔE<sub>r</sub>) is formulated to accelerate tracking, eliminate the need for dataloggers required by conventional-input ANN MPPTs, and remove the complex manual tuning associated with fuzzy rule-based approaches. This work further introduces a Twin Battery Storage Control (TBSC) scheme that coordinates the master and secondary battery stacks through parallel-active bidirectional converters. The TBSC enforces state-of-charge limits (15 % ≤ SoC ≤ 95 %), corresponding to an effective 80 % depth of discharge, and provides protection against overcharging and over-discharging while simultaneously addressing DC-link voltage deviations typically observed with conventional controllers during protective actions. The scheme stabilizes the DC-link voltage with near-zero deviation, ensuring rated motor operation even under extreme conditions. The effectiveness of the proposed control strategies in suppressing peak-to-peak and RMS torque ripple and maintaining tight DC-link voltage regulation is demonstrated through MATLAB/Simulink simulations and validated using real-time digital simulations on the OPAL-RT OP4510 platform. Comparative evaluation against existing commutation and MPPT techniques confirms the performance improvements achieved by the proposed system.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"132 ","pages":"Article 110975"},"PeriodicalIF":4.9,"publicationDate":"2026-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146080166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DiMCA: A novel P4-powered framework using machine learning for adaptive defense against combined DDoS and ARP spoofing attacks in SD-IoT networks DiMCA:一种新颖的p4驱动框架,使用机器学习自适应防御SD-IoT网络中的DDoS和ARP欺骗攻击
IF 4.9 3区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-01-28 DOI: 10.1016/j.compeleceng.2025.110929
Manal Gafar , Saied M. Abd El-atty , Mohamed S Arafa
The convergence of Software-Defined Networking (SDN) with the Internet of Things (IoT) has introduced powerful programmability but also exposed critical vulnerabilities, particularly to Address Resolution Protocol (ARP) spoofing and distributed denial-of-service (DDoS) attacks. Traditional countermeasures often focus narrowly on either ARP or L3/L4 threats, lack real-time responsiveness, and rely heavily on centralized controllers, making them unsuitable for dynamic and large-scale Software-Defined IoT (SD-IoT) deployments. This paper introduces a Distributed Multi-Contextual Architecture (DiMCA) that integrates machine learning (ML) techniques to enhance detection and mitigation capabilities. DiMCA addresses the limitations of existing methods through a holistic, scalable, and adaptive security framework. DiMCA integrates four novel components: Data Plane Stateful Inspection (DPSI), a P4-based module for line-rate detection of ARP anomalies and traffic irregularities; Multi-Controller Plane Architecture (MCPA), which enhances scalability and availability through distributed control; Control Plane Intrusion Analysis (CPIA), an ensemble ML classification engine that distinguishes between benign, ARP, DDoS, and hybrid attacks; and Coordinated Multi-Layer Mitigation (CMLM), a synchronized mitigation strategy that coordinates local and global responses in real time. Results show that DiMCA achieves up to 99.22% accuracy in binary classification and 94.77–98.92% in multi-class detection under realistic adversarial conditions. Ablation experiments confirm the contribution of each module (DPSI, MCPA, CPIA, CMLM) to overall performance, while sensitivity tests clarify trade-offs in latency and false-positive rates. Compared to baselines including OpenFlow-centric monitoring, ARP inspection, and DHCP-snooping policies, DiMCA reduces detection latency from 4.3 s to 0.21 s and lowers controller CPU and bandwidth usage by 31% and 36% without compromising accuracy. By combining real-time monitoring, distributed control, and adaptive ML-driven mitigation, DiMCA offers a practical and resilient solution for securing modern SD-IoT networks against complex and evolving threats.
软件定义网络(SDN)与物联网(IoT)的融合带来了强大的可编程性,但也暴露了关键漏洞,特别是地址解析协议(ARP)欺骗和分布式拒绝服务(DDoS)攻击。传统的对策通常只关注ARP或L3/L4威胁,缺乏实时响应能力,并且严重依赖集中式控制器,因此不适合动态和大规模软件定义物联网(SD-IoT)部署。本文介绍了一种分布式多上下文架构(DiMCA),它集成了机器学习(ML)技术,以增强检测和缓解能力。diga通过一个整体的、可伸缩的和自适应的安全框架解决了现有方法的局限性。DiMCA集成了四个新组件:数据平面状态检测(DPSI),这是一个基于p4的模块,用于检测ARP异常和流量异常;多控制器平面架构(Multi-Controller Plane Architecture, MCPA),通过分布式控制增强可扩展性和可用性;控制平面入侵分析(CPIA),一个集成的ML分类引擎,可以区分良性、ARP、DDoS和混合攻击;协调多层缓解(CMLM),这是一种同步缓解战略,可实时协调地方和全球应对措施。结果表明,在真实对抗条件下,DiMCA在二元分类上的准确率可达99.22%,在多类检测上的准确率可达94.77 ~ 98.92%。消融实验证实了每个模块(DPSI、MCPA、CPIA、CMLM)对整体性能的贡献,而灵敏度测试则阐明了延迟和假阳性率之间的权衡。与以openflow为中心的监控、ARP检查和dhcp snooping策略等基准相比,diga将检测延迟从4.3秒减少到0.21秒,在不影响准确性的情况下,将控制器CPU和带宽使用率降低了31%和36%。通过结合实时监控、分布式控制和自适应ml驱动的缓解,DiMCA为保护现代SD-IoT网络免受复杂和不断发展的威胁提供了实用且有弹性的解决方案。
{"title":"DiMCA: A novel P4-powered framework using machine learning for adaptive defense against combined DDoS and ARP spoofing attacks in SD-IoT networks","authors":"Manal Gafar ,&nbsp;Saied M. Abd El-atty ,&nbsp;Mohamed S Arafa","doi":"10.1016/j.compeleceng.2025.110929","DOIUrl":"10.1016/j.compeleceng.2025.110929","url":null,"abstract":"<div><div>The convergence of Software-Defined Networking (SDN) with the Internet of Things (IoT) has introduced powerful programmability but also exposed critical vulnerabilities, particularly to Address Resolution Protocol (ARP) spoofing and distributed denial-of-service (DDoS) attacks. Traditional countermeasures often focus narrowly on either ARP or L3/L4 threats, lack real-time responsiveness, and rely heavily on centralized controllers, making them unsuitable for dynamic and large-scale Software-Defined IoT (SD-IoT) deployments. This paper introduces a Distributed Multi-Contextual Architecture (DiMCA) that integrates machine learning (ML) techniques to enhance detection and mitigation capabilities. DiMCA addresses the limitations of existing methods through a holistic, scalable, and adaptive security framework. DiMCA integrates four novel components: Data Plane Stateful Inspection (DPSI), a P4-based module for line-rate detection of ARP anomalies and traffic irregularities; Multi-Controller Plane Architecture (MCPA), which enhances scalability and availability through distributed control; Control Plane Intrusion Analysis (CPIA), an ensemble ML classification engine that distinguishes between benign, ARP, DDoS, and hybrid attacks; and Coordinated Multi-Layer Mitigation (CMLM), a synchronized mitigation strategy that coordinates local and global responses in real time. Results show that DiMCA achieves up to 99.22% accuracy in binary classification and 94.77–98.92% in multi-class detection under realistic adversarial conditions. Ablation experiments confirm the contribution of each module (DPSI, MCPA, CPIA, CMLM) to overall performance, while sensitivity tests clarify trade-offs in latency and false-positive rates. Compared to baselines including OpenFlow-centric monitoring, ARP inspection, and DHCP-snooping policies, DiMCA reduces detection latency from 4.3 s to 0.21 s and lowers controller CPU and bandwidth usage by 31% and 36% without compromising accuracy. By combining real-time monitoring, distributed control, and adaptive ML-driven mitigation, DiMCA offers a practical and resilient solution for securing modern SD-IoT networks against complex and evolving threats.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"132 ","pages":"Article 110929"},"PeriodicalIF":4.9,"publicationDate":"2026-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146080165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comprehensive performance benchmarking and comparative analysis of active ransomware threats 主动勒索软件威胁的综合性能基准测试和比较分析
IF 4.9 3区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-01-28 DOI: 10.1016/j.compeleceng.2026.110963
Simon R. Davies, Richard Macfarlane
Ransomware remains one of the most pervasive and disruptive cyber threats, with modern variants employing advanced techniques such as high-speed multithreaded encryption, obfuscation, and intermittent encryption to reduce detection opportunities and accelerate impact. Despite extensive research into detection and mitigation, few studies have systematically quantified the execution performance and behavioural characteristics of contemporary ransomware families. This paper fills this critical gap through a comprehensive, rigorous analysis of 29 active crypto-ransomware strains executed under controlled, isolated conditions.
Two purpose-built datasets were developed: one, a verified ransomware corpus of the most active families, and the other, a structured target dataset emulating enterprise file systems. Controlled executions of each ransomware sample provided robust measurements of total execution time, pre-encryption delay, and encryption performance. Key findings include wide variation in encryption speeds (33 MB/s to 2.79 GB/s), distinct preparatory and encryption sequences, and frequent use of intermittent encryption to maximise throughput and evade detection.
This research presents the first contemporary academic reproducible benchmark of ransomware execution performance. Through the release of these curated datasets and detailed empirical measurements, it addresses a critical gap in understanding ransomware behaviour. The study contributes a publicly accessible ransomware sample dataset, a structured benchmarking dataset, and a comparative performance analysis across major ransomware families. These results reveal how modern ransomware balances speed, stealth, and efficiency, highlighting the rapidly shrinking window for detection and response. The work establishes a rigorous benchmark for advancing research and practical defence development.
勒索软件仍然是最普遍和最具破坏性的网络威胁之一,其现代变种采用了高速多线程加密、混淆和间歇性加密等先进技术,以减少检测机会并加速影响。尽管对检测和缓解进行了广泛的研究,但很少有研究系统地量化了当代勒索软件家族的执行性能和行为特征。本文通过对在受控、隔离条件下执行的29种活跃的加密勒索软件进行全面、严格的分析,填补了这一关键空白。开发了两个专门构建的数据集:一个是经过验证的最活跃家族的勒索软件语料库,另一个是模拟企业文件系统的结构化目标数据集。每个勒索软件样本的受控执行提供了总执行时间、预加密延迟和加密性能的可靠测量。主要发现包括加密速度的巨大差异(33 MB/s到2.79 GB/s),不同的准备和加密序列,以及频繁使用间歇性加密来最大化吞吐量和逃避检测。本研究提出了勒索软件执行性能的第一个当代学术可复制基准。通过发布这些精心整理的数据集和详细的经验测量,它解决了理解勒索软件行为的关键差距。该研究提供了一个公开访问的勒索软件样本数据集,一个结构化的基准数据集,以及主要勒索软件家族的比较性能分析。这些结果揭示了现代勒索软件如何平衡速度,隐蔽性和效率,突出了快速缩小的检测和响应窗口。这项工作为推进研究和实际国防发展建立了严格的基准。
{"title":"Comprehensive performance benchmarking and comparative analysis of active ransomware threats","authors":"Simon R. Davies,&nbsp;Richard Macfarlane","doi":"10.1016/j.compeleceng.2026.110963","DOIUrl":"10.1016/j.compeleceng.2026.110963","url":null,"abstract":"<div><div>Ransomware remains one of the most pervasive and disruptive cyber threats, with modern variants employing advanced techniques such as high-speed multithreaded encryption, obfuscation, and intermittent encryption to reduce detection opportunities and accelerate impact. Despite extensive research into detection and mitigation, few studies have systematically quantified the execution performance and behavioural characteristics of contemporary ransomware families. This paper fills this critical gap through a comprehensive, rigorous analysis of 29 active crypto-ransomware strains executed under controlled, isolated conditions.</div><div>Two purpose-built datasets were developed: one, a verified ransomware corpus of the most active families, and the other, a structured target dataset emulating enterprise file systems. Controlled executions of each ransomware sample provided robust measurements of total execution time, pre-encryption delay, and encryption performance. Key findings include wide variation in encryption speeds (33 MB/s to 2.79 GB/s), distinct preparatory and encryption sequences, and frequent use of intermittent encryption to maximise throughput and evade detection.</div><div>This research presents the first contemporary academic reproducible benchmark of ransomware execution performance. Through the release of these curated datasets and detailed empirical measurements, it addresses a critical gap in understanding ransomware behaviour. The study contributes a publicly accessible ransomware sample dataset, a structured benchmarking dataset, and a comparative performance analysis across major ransomware families. These results reveal how modern ransomware balances speed, stealth, and efficiency, highlighting the rapidly shrinking window for detection and response. The work establishes a rigorous benchmark for advancing research and practical defence development.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"132 ","pages":"Article 110963"},"PeriodicalIF":4.9,"publicationDate":"2026-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146080159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AI-driven road inspection with SUD-ROAD: High-resolution LiDAR benchmark and a novel cross-dimensional semantic segmentation pipeline 基于SUD-ROAD的人工智能道路检测:高分辨率激光雷达基准和新型跨维语义分割管道
IF 4.9 3区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-01-28 DOI: 10.1016/j.compeleceng.2026.110993
Zhouyan Qiu , Arshia Ghasemlou , Joaquín Martínez-Sánchez , Pedro Arias
Aging transportation infrastructure worldwide demands innovative artificial intelligence (AI) solutions for maintenance and monitoring. In this paper, we introduce SUD-ROAD, a new high-resolution dataset and methodology aimed at modernizing road infrastructure management through AI-driven inspection. SUD-ROAD is a specialized subset of the Santiago Urban Dataset, spanning 1635 meters of urban roadway and containing 57 million 3D LiDAR points labeled into seven semantic classes (road pavement, lane lines, other road markings, manhole covers, drains, cracks, and patching). Exploiting the near-planarity of road surfaces, we project the 3D point cloud onto 2D grids, allowing state-of-the-art image-based models to replace more complex 3D networks. A ConvNeXt segmentation model trained on these 2D representations attains a mean Intersection-over-Union of 0.74 and overall accuracy of 0.97, accurately detecting both large-scale assets and fine-grained defects critical for early intervention. We also analyzed the impact of intensity and geometric properties on segmentation effectiveness across different categories. By enabling real-time, AI-driven condition assessment, our approach supports proactive repairs, extends asset life, and reduces life-cycle costs—advancing the broader goal of safer and more sustainable transportation infrastructure. The dataset can be accessed at the following repository: https://github.com/msqiu/SUD-Road.
全球老化的交通基础设施需要创新的人工智能(AI)解决方案来进行维护和监控。在本文中,我们介绍了SUD-ROAD,这是一种新的高分辨率数据集和方法,旨在通过人工智能驱动的检查实现道路基础设施管理的现代化。sd - road是圣地亚哥城市数据集的一个专门子集,涵盖1635米的城市道路,包含5700万个3D激光雷达点,标记为七个语义类(道路路面、车道线、其他道路标记、井盖、排水管、裂缝和修补)。利用路面的近平面性,我们将3D点云投影到2D网格上,允许最先进的基于图像的模型取代更复杂的3D网络。在这些2D表示上训练的ConvNeXt分割模型获得了0.74的平均交集-over- union和0.97的总体精度,准确地检测了大规模资产和对早期干预至关重要的细粒度缺陷。我们还分析了强度和几何属性对不同类别分割效果的影响。通过实现实时、人工智能驱动的状态评估,我们的方法支持主动维修,延长资产寿命,降低生命周期成本,推进更安全和更可持续的交通基础设施的更广泛目标。该数据集可以通过以下存储库访问:https://github.com/msqiu/SUD-Road。
{"title":"AI-driven road inspection with SUD-ROAD: High-resolution LiDAR benchmark and a novel cross-dimensional semantic segmentation pipeline","authors":"Zhouyan Qiu ,&nbsp;Arshia Ghasemlou ,&nbsp;Joaquín Martínez-Sánchez ,&nbsp;Pedro Arias","doi":"10.1016/j.compeleceng.2026.110993","DOIUrl":"10.1016/j.compeleceng.2026.110993","url":null,"abstract":"<div><div>Aging transportation infrastructure worldwide demands innovative artificial intelligence (AI) solutions for maintenance and monitoring. In this paper, we introduce SUD-ROAD, a new high-resolution dataset and methodology aimed at modernizing road infrastructure management through AI-driven inspection. SUD-ROAD is a specialized subset of the Santiago Urban Dataset, spanning 1635 meters of urban roadway and containing 57 million 3D LiDAR points labeled into seven semantic classes (road pavement, lane lines, other road markings, manhole covers, drains, cracks, and patching). Exploiting the near-planarity of road surfaces, we project the 3D point cloud onto 2D grids, allowing state-of-the-art image-based models to replace more complex 3D networks. A ConvNeXt segmentation model trained on these 2D representations attains a mean Intersection-over-Union of 0.74 and overall accuracy of 0.97, accurately detecting both large-scale assets and fine-grained defects critical for early intervention. We also analyzed the impact of intensity and geometric properties on segmentation effectiveness across different categories. By enabling real-time, AI-driven condition assessment, our approach supports proactive repairs, extends asset life, and reduces life-cycle costs—advancing the broader goal of safer and more sustainable transportation infrastructure. The dataset can be accessed at the following repository: <span><span>https://github.com/msqiu/SUD-Road</span><svg><path></path></svg></span>.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"132 ","pages":"Article 110993"},"PeriodicalIF":4.9,"publicationDate":"2026-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146080162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Parameter estimation of solar photovoltaic models using fitness-based diversified cluster division and multi-mutation learned differential evolution 基于适应度的多样化聚类划分和多突变学习差分进化的太阳能光伏模型参数估计
IF 4.9 3区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-01-27 DOI: 10.1016/j.compeleceng.2026.110995
Deepak Sahu, Shubham Gupta
Precise estimation of parameters is crucial for solar photovoltaic models and analysis of characteristics of associated photovoltaic systems, as the non-linear and implicit behavior of the current–voltage relationship makes this problem significantly challenging. This objective has emerged as a key area of interest for researchers. The rapid advancement of evolutionary algorithms and computer technology has resulted in the development of various metaheuristic algorithms to accelerate this trend further. This study aims to design a robust evolutionary algorithm named FDC-DE by modifying the conventional differential evolution algorithm using different search strategies to enrich the algorithm with effective explorative and exploitative search mechanisms. The FDC-DE comprises fitness-based diversified cluster division and multi-mutation learning strategies to guide the search by the representative member of the population and to provide diverse learning strategies at different stages of the search procedure. These strategies will provide reasonable balancing ability to the algorithm in accelerating convergence and avoiding issues of stagnation and premature convergence at local optimal solutions. To evaluate the proposed FDC-DE algorithm, it is tested on the 23 classical benchmark problems and the IEEE CEC2022 benchmark suite, followed by six experimental sets of single, double, and triple-diode models and three photovoltaic module models. Extensive experiments are performed, and a comparison of the FDC-DE is performed with advanced state-of-the-art metaheuristic algorithms based on accuracy comparison, statistical analysis of the results, and convergence characteristics. The results verify the outperforming search efficiency of the FDC-DE.
精确的参数估计对于太阳能光伏模型和相关光伏系统的特性分析至关重要,因为电流-电压关系的非线性和隐式行为使这一问题变得非常具有挑战性。这一目标已成为研究人员感兴趣的一个关键领域。进化算法和计算机技术的快速发展导致了各种元启发式算法的发展,进一步加速了这一趋势。本研究旨在通过使用不同的搜索策略对传统的差分进化算法进行改进,设计一种鲁棒的FDC-DE进化算法,以丰富有效的探索性和剥削性搜索机制。FDC-DE包括基于适应度的多样化聚类划分和多突变学习策略,以指导群体中代表性成员的搜索,并在搜索过程的不同阶段提供多样化的学习策略。这些策略将为算法在加速收敛和避免局部最优解停滞和过早收敛问题上提供合理的平衡能力。为了对所提出的FDC-DE算法进行评估,在23个经典基准问题和IEEE CEC2022基准测试套件上进行了测试,随后进行了单、双、三二极管模型和三种光伏组件模型的6个实验集的测试。进行了大量的实验,并将FDC-DE与基于精度比较、结果统计分析和收敛特性的最先进的元启发式算法进行了比较。结果验证了FDC-DE算法的搜索效率。
{"title":"Parameter estimation of solar photovoltaic models using fitness-based diversified cluster division and multi-mutation learned differential evolution","authors":"Deepak Sahu,&nbsp;Shubham Gupta","doi":"10.1016/j.compeleceng.2026.110995","DOIUrl":"10.1016/j.compeleceng.2026.110995","url":null,"abstract":"<div><div>Precise estimation of parameters is crucial for solar photovoltaic models and analysis of characteristics of associated photovoltaic systems, as the non-linear and implicit behavior of the current–voltage relationship makes this problem significantly challenging. This objective has emerged as a key area of interest for researchers. The rapid advancement of evolutionary algorithms and computer technology has resulted in the development of various metaheuristic algorithms to accelerate this trend further. This study aims to design a robust evolutionary algorithm named FDC-DE by modifying the conventional differential evolution algorithm using different search strategies to enrich the algorithm with effective explorative and exploitative search mechanisms. The FDC-DE comprises fitness-based diversified cluster division and multi-mutation learning strategies to guide the search by the representative member of the population and to provide diverse learning strategies at different stages of the search procedure. These strategies will provide reasonable balancing ability to the algorithm in accelerating convergence and avoiding issues of stagnation and premature convergence at local optimal solutions. To evaluate the proposed FDC-DE algorithm, it is tested on the 23 classical benchmark problems and the IEEE CEC2022 benchmark suite, followed by six experimental sets of single, double, and triple-diode models and three photovoltaic module models. Extensive experiments are performed, and a comparison of the FDC-DE is performed with advanced state-of-the-art metaheuristic algorithms based on accuracy comparison, statistical analysis of the results, and convergence characteristics. The results verify the outperforming search efficiency of the FDC-DE.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"132 ","pages":"Article 110995"},"PeriodicalIF":4.9,"publicationDate":"2026-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146080169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computers & Electrical Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1