首页 > 最新文献

Computers & Electrical Engineering最新文献

英文 中文
DPAD: Data Poisoning Attack Defense Mechanism for federated learning-based system 基于联邦学习系统的数据中毒攻击防御机制
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-11-28 DOI: 10.1016/j.compeleceng.2024.109893
Santanu Basak, Kakali Chatterjee
The Federated Learning (FL)-based approaches are increasing rapidly for different areas, such as home automation, smart healthcare, smart cars, etc. In FL, multiple users participate collaboratively and distributively to construct a global model without sharing raw data. The FL-based system resolves several issues of central server-based machine learning approaches, such as data availability, maintaining user privacy, etc. Still, some issues exist, such as data poisoning attacks and re-identification attacks. This paper proposes a Data Poisoning Attack Defense (DPAD) Mechanism that detects and defends against the data poisoning attack efficiently and secures the aggregation process for the Federated Learning-based systems. The DPAD verifies each client’s updates using an audit mechanism that decides whether a local update is considered for aggregation. The experimental results show the effectiveness of the attack and the power of the DPAD mechanism compared with the state-of-the-art methods.
在家庭自动化、智能医疗、智能汽车等不同领域,基于联合学习(FL)的方法正在迅速增加。在联邦学习中,多个用户以协作和分布式的方式参与,在不共享原始数据的情况下构建一个全局模型。基于 FL 的系统解决了基于中央服务器的机器学习方法的几个问题,如数据可用性、维护用户隐私等。但仍存在一些问题,如数据中毒攻击和重新识别攻击。本文提出了一种数据中毒攻击防御机制(DPAD),它能有效检测和防御数据中毒攻击,确保基于联合学习系统的聚合过程安全。DPAD 利用审计机制验证每个客户端的更新,从而决定本地更新是否被视为聚合更新。实验结果表明,与最先进的方法相比,DPAD 机制的攻击效果和功能都很强大。
{"title":"DPAD: Data Poisoning Attack Defense Mechanism for federated learning-based system","authors":"Santanu Basak,&nbsp;Kakali Chatterjee","doi":"10.1016/j.compeleceng.2024.109893","DOIUrl":"10.1016/j.compeleceng.2024.109893","url":null,"abstract":"<div><div>The Federated Learning (FL)-based approaches are increasing rapidly for different areas, such as home automation, smart healthcare, smart cars, etc. In FL, multiple users participate collaboratively and distributively to construct a global model without sharing raw data. The FL-based system resolves several issues of central server-based machine learning approaches, such as data availability, maintaining user privacy, etc. Still, some issues exist, such as data poisoning attacks and re-identification attacks. This paper proposes a Data Poisoning Attack Defense (DPAD) Mechanism that detects and defends against the data poisoning attack efficiently and secures the aggregation process for the Federated Learning-based systems. The DPAD verifies each client’s updates using an audit mechanism that decides whether a local update is considered for aggregation. The experimental results show the effectiveness of the attack and the power of the DPAD mechanism compared with the state-of-the-art methods.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"121 ","pages":"Article 109893"},"PeriodicalIF":4.0,"publicationDate":"2024-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142747894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cross-domain fine grained strip steel defect detection method based on semi-supervised learning and Multi-head Self Attention coordination 基于半监督学习和多头自注意协调的细晶带钢跨域缺陷检测方法
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-11-28 DOI: 10.1016/j.compeleceng.2024.109916
Zhiwei Song , Xinbo Huang , Chao Ji , Ye Zhang , Zhang Chao , Yang Peng
The identification of steel strip defects plays a pivotal role in assessing steel quality and advancing production technology. However, the majority of intelligent defect recognition algorithms for steel strips, based on deep learning, primarily focus on supervised learning. These methods depend on a multitude of training samples, incurring additional manual labelling costs, and exhibit low recognition efficiency. In contrast to supervised learning, we integrate the fine-grained characteristics of strip defects. We propose a cross-domain, fine-grained strip defect detection method based on semi-supervised learning and Multi-head self-attention coordination, along with an improvement strategy, resulting in a novel network structure: Multi-head Self Attention and Semi-supervised collaborative detection network (MSD Net). This method initiates the cross-domain migration of defect samples through Cycle Generative Adversarial Networks (Cycle GAN), creating new semi-supervised training samples from source domain and target domain data to enhance data distribution diversity. The detection model is then constructed leveraging the advantages of Multi-head Self Attention (MSA) in augmenting the global receptive field of feature extraction. The proposed semi-supervised learning method employs a pseudo-label allocation strategy to guide the model in fully utilizing the distribution fitting of unlabeled samples. This allows the deep neural network to learn a more comprehensive multivariate data distribution within the training set, thereby enhancing the generalization ability of the semi-supervised model. Experimental results on the benchmark dataset for steel strip defect detection demonstrate that the cross-domain semi-supervised method achieves a test accuracy of 96.1 % on mAP@0.5, surpassing the supervised baseline model by 4.8 %. Our method also outperforms the baseline supervised model in the accuracy of small target recognition on PASCAL VOC 2007 datasets. Additionally, we have implemented a strip defect detection system based on edge computing for real-time deployment of the proposed algorithm. Testing in an actual industrial setting further validates the efficacy of our proposed method in practical applications. Our work encourages further exploration, the task of public datasets can be obtained at https://github.com/songzhiweiknight/NEU-DET-Datasets.git.
带钢缺陷的识别对评定钢的质量和提高生产工艺水平起着举足轻重的作用。然而,大多数基于深度学习的钢带智能缺陷识别算法主要集中在监督学习上。这些方法依赖于大量的训练样本,产生额外的人工标记成本,并且表现出较低的识别效率。与监督学习相反,我们整合了条形缺陷的细粒度特征。本文提出了一种基于半监督学习和多头自注意协调的跨领域细粒度条形缺陷检测方法,并提出了改进策略,形成了一种新颖的网络结构:多头自注意和半监督协同检测网络(MSD Net)。该方法通过循环生成对抗网络(Cycle Generative Adversarial Networks, Cycle GAN)启动缺陷样本的跨域迁移,从源域和目标域数据中创建新的半监督训练样本,以增强数据分布的多样性。然后利用多头自注意(MSA)在增强特征提取的全局接受场方面的优势构建检测模型。提出的半监督学习方法采用伪标签分配策略来指导模型充分利用无标签样本的分布拟合。这使得深度神经网络能够在训练集中学习到更全面的多元数据分布,从而增强了半监督模型的泛化能力。在钢带缺陷检测基准数据集上的实验结果表明,跨域半监督方法在mAP@0.5上的测试准确率达到96.1%,比监督基线模型高出4.8%。我们的方法在PASCAL VOC 2007数据集上的小目标识别精度也优于基线监督模型。此外,我们还实现了一个基于边缘计算的条带缺陷检测系统,用于实时部署所提出的算法。在实际工业环境中的测试进一步验证了我们提出的方法在实际应用中的有效性。我们的工作鼓励进一步的探索,公共数据集的任务可以在https://github.com/songzhiweiknight/NEU-DET-Datasets.git上获得。
{"title":"Cross-domain fine grained strip steel defect detection method based on semi-supervised learning and Multi-head Self Attention coordination","authors":"Zhiwei Song ,&nbsp;Xinbo Huang ,&nbsp;Chao Ji ,&nbsp;Ye Zhang ,&nbsp;Zhang Chao ,&nbsp;Yang Peng","doi":"10.1016/j.compeleceng.2024.109916","DOIUrl":"10.1016/j.compeleceng.2024.109916","url":null,"abstract":"<div><div>The identification of steel strip defects plays a pivotal role in assessing steel quality and advancing production technology. However, the majority of intelligent defect recognition algorithms for steel strips, based on deep learning, primarily focus on supervised learning. These methods depend on a multitude of training samples, incurring additional manual labelling costs, and exhibit low recognition efficiency. In contrast to supervised learning, we integrate the fine-grained characteristics of strip defects. We propose a cross-domain, fine-grained strip defect detection method based on semi-supervised learning and Multi-head self-attention coordination, along with an improvement strategy, resulting in a novel network structure: Multi-head Self Attention and Semi-supervised collaborative detection network (MSD Net). This method initiates the cross-domain migration of defect samples through Cycle Generative Adversarial Networks (Cycle GAN), creating new semi-supervised training samples from source domain and target domain data to enhance data distribution diversity. The detection model is then constructed leveraging the advantages of Multi-head Self Attention (MSA) in augmenting the global receptive field of feature extraction. The proposed semi-supervised learning method employs a pseudo-label allocation strategy to guide the model in fully utilizing the distribution fitting of unlabeled samples. This allows the deep neural network to learn a more comprehensive multivariate data distribution within the training set, thereby enhancing the generalization ability of the semi-supervised model. Experimental results on the benchmark dataset for steel strip defect detection demonstrate that the cross-domain semi-supervised method achieves a test accuracy of 96.1 % on mAP<sup>@0.5</sup>, surpassing the supervised baseline model by 4.8 %. Our method also outperforms the baseline supervised model in the accuracy of small target recognition on PASCAL VOC 2007 datasets. Additionally, we have implemented a strip defect detection system based on edge computing for real-time deployment of the proposed algorithm. Testing in an actual industrial setting further validates the efficacy of our proposed method in practical applications. Our work encourages further exploration, the task of public datasets can be obtained at <span><span>https://github.com/songzhiweiknight/NEU-DET-Datasets.git</span><svg><path></path></svg></span>.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"121 ","pages":"Article 109916"},"PeriodicalIF":4.0,"publicationDate":"2024-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142747992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Farm-flow dataset: Intrusion detection in smart agriculture based on network flows 农场流数据集:基于网络流的智能农业入侵检测
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-11-27 DOI: 10.1016/j.compeleceng.2024.109892
Rafael Ferreira, Ivo Bispo, Carlos Rabadão, Leonel Santos, Rogério Luís de C. Costa
In recent years, the Internet of Things (IoT) revolutionized agricultural management by enabling data-driven decision-making through seamless connectivity among various devices and equipment. The security of Agricultural IoT (AG-IoT) devices becomes increasingly evident as reliance on them grows. On the other hand, machine learning models for intrusion detection show promise in identifying vulnerabilities, but their effectiveness depends on being trained on representative data. Indeed, there is a notable gap in network intrusion detection for AG-IoT, as existing datasets for training machine learning models lack the context of AG-IoT scenarios. Also, most existing ones rely on packed-based features (and not on network flow data), and analysing such data can be resource-consuming.
In this work, we present the “Farm-Flow” dataset. We created a realistic AG-IoT scenario to build the dataset and executed eight types of network attacks. Over one million instances of relevant data were collected, which we combined into network flows, organized and made publicly available via http://doi.org/10.5281/zenodo.10964647.
The dataset created has been evaluated using multiple intrusion detection models in terms of their capabilities to identify and classify malicious traffic. The assessed models presented high performance and even achieved an F1-score of more than 90% while identifying malicious traffic. The “Farm-Flow” may support the training of intrusion detection methods, and the performance results contribute to future benchmarking.
近年来,物联网(IoT)通过各种装置和设备之间的无缝连接,实现了数据驱动决策,从而彻底改变了农业管理。随着人们对农业物联网(AG-IoT)设备的依赖程度越来越高,这些设备的安全性也变得越来越明显。另一方面,用于入侵检测的机器学习模型在识别漏洞方面大有可为,但其有效性取决于在代表性数据上进行的训练。事实上,AG-IoT 的网络入侵检测存在明显差距,因为用于训练机器学习模型的现有数据集缺乏 AG-IoT 场景的背景。此外,大多数现有数据集依赖于基于打包的特征(而非网络流数据),而分析此类数据可能会消耗大量资源。我们创建了一个真实的 AG-IoT 场景来构建数据集,并实施了八种类型的网络攻击。我们收集了 100 多万个相关数据实例,将其合并为网络流,并通过 http://doi.org/10.5281/zenodo.10964647.The 进行了整理和公开。我们使用多种入侵检测模型对所创建的数据集进行了评估,以确定其识别和分类恶意流量的能力。经过评估的模型表现出很高的性能,在识别恶意流量时的 F1 分数甚至超过了 90%。农场流 "可为入侵检测方法的培训提供支持,其性能结果有助于未来的基准测试。
{"title":"Farm-flow dataset: Intrusion detection in smart agriculture based on network flows","authors":"Rafael Ferreira,&nbsp;Ivo Bispo,&nbsp;Carlos Rabadão,&nbsp;Leonel Santos,&nbsp;Rogério Luís de C. Costa","doi":"10.1016/j.compeleceng.2024.109892","DOIUrl":"10.1016/j.compeleceng.2024.109892","url":null,"abstract":"<div><div>In recent years, the Internet of Things (IoT) revolutionized agricultural management by enabling data-driven decision-making through seamless connectivity among various devices and equipment. The security of Agricultural IoT (AG-IoT) devices becomes increasingly evident as reliance on them grows. On the other hand, machine learning models for intrusion detection show promise in identifying vulnerabilities, but their effectiveness depends on being trained on representative data. Indeed, there is a notable gap in network intrusion detection for AG-IoT, as existing datasets for training machine learning models lack the context of AG-IoT scenarios. Also, most existing ones rely on packed-based features (and not on network flow data), and analysing such data can be resource-consuming.</div><div>In this work, we present the “Farm-Flow” dataset. We created a realistic AG-IoT scenario to build the dataset and executed eight types of network attacks. Over one million instances of relevant data were collected, which we combined into network flows, organized and made publicly available via <span><span>http://doi.org/10.5281/zenodo.10964647</span><svg><path></path></svg></span>.</div><div>The dataset created has been evaluated using multiple intrusion detection models in terms of their capabilities to identify and classify malicious traffic. The assessed models presented high performance and even achieved an F1-score of more than 90% while identifying malicious traffic. The “Farm-Flow” may support the training of intrusion detection methods, and the performance results contribute to future benchmarking.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"121 ","pages":"Article 109892"},"PeriodicalIF":4.0,"publicationDate":"2024-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142720469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MarvelHideDroid: Reliable on-the-fly data anonymization based on Android virtualization MarvelHideDroid:基于安卓虚拟化的可靠即时数据匿名化
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-11-27 DOI: 10.1016/j.compeleceng.2024.109882
Francesco Pagano , Luca Verderame , Enrico Russo , Alessio Merlo
Modern mobile applications harvest many user-generated events during execution using proper libraries called analytic libraries. The collection of such events allows the app developers to acquire helpful information to further improve the app. The same collected events are likewise an essential source of information for analytic library providers (e.g., Google and Meta) to understand users’ preferences. However, the user is not involved in this process. To counteract this problem, some proposals arose from legal (e.g., General Data Protection Regulation (GDPR)) and research perspectives. Concerning the latter point, some research efforts led to the definition of solutions for the Android ecosystem that allow one to limit the gathering of such data before the analytic libraries collect it or give the user control of the process. To this aim, HideDroid was the first proposal to allow the user to define different privacy levels for each app installed on the device by leveraging k-anonymity and differential privacy techniques. Subsequently, VirtualHideDroid extended HideDroid by taking advantage of the same approach to virtualized Android environments, in which an application (plugin) can run within another application (container). In this scenario, VirtualHideDroid anonymizes user event data running as the container app. However, according to standard threat models regarding virtualized Android environments, assuming that the container app is fully trusted is too optimistic in real deployments.
For this reason, in this paper, we extend the work of the original VirtualHideDroid work by assuming that the same tool may be untrusted, i.e., controlled by an external attacker that has access to the container app, thereby having full access to the user data. To solve this problem, we define a new approach, named MarvelHideDroid, which gives reliable anonymization of event data in the Plugin app, even in the event of a malicious/compromised container. Moreover, and differently from VirtualHideDroid, MarvelHideDroid relies on LLM to automatically build up the generalizations required by k-anonymity, resulting in an anonymization strategy that is more reliable against modification in the data structure of the events captured by the analytic libraries. We empirically demonstrate the viability and reliability of the proposal by testing an implementation of MarvelHideDroid on a set of real Android apps in a virtualized environment.
现代移动应用程序使用称为分析库的适当库在执行过程中收集许多用户生成的事件。通过收集这些事件,应用程序开发人员可以获得有用的信息,从而进一步改进应用程序。同样,收集到的事件也是分析库提供商(如 Google 和 Meta)了解用户偏好的重要信息来源。然而,用户并不参与这一过程。为解决这一问题,从法律(如《通用数据保护条例》(GDPR))和研究角度提出了一些建议。关于后一点,一些研究工作导致为安卓生态系统定义了解决方案,允许人们在分析库收集数据之前限制此类数据的收集,或让用户控制这一过程。为此,HideDroid 是第一个允许用户利用 k-anonymity 和差异隐私技术为设备上安装的每个应用程序定义不同隐私级别的提案。随后,VirtualHideDroid 对 HideDroid 进行了扩展,将同样的方法用于虚拟化安卓环境,其中一个应用程序(插件)可以在另一个应用程序(容器)中运行。在这种情况下,VirtualHideDroid 会对作为容器应用程序运行的用户事件数据进行匿名处理。然而,根据有关虚拟化安卓环境的标准威胁模型,假设容器应用程序是完全可信的,这在实际部署中过于乐观。为此,我们在本文中扩展了最初 VirtualHideDroid 的工作,假设同一工具可能是不可信的,即由外部攻击者控制,而外部攻击者可以访问容器应用程序,从而完全访问用户数据。为了解决这个问题,我们定义了一种名为 MarvelHideDroid 的新方法,即使在容器遭到恶意/破坏的情况下,也能可靠地匿名化插件应用程序中的事件数据。此外,与 VirtualHideDroid 不同的是,MarvelHideDroid 依靠 LLM 自动建立 k-anonymity 所需的泛化,从而使匿名策略在分析库捕获的事件数据结构发生修改时更加可靠。我们通过在虚拟环境中测试 MarvelHideDroid 在一组真实 Android 应用程序上的实施情况,实证证明了该建议的可行性和可靠性。
{"title":"MarvelHideDroid: Reliable on-the-fly data anonymization based on Android virtualization","authors":"Francesco Pagano ,&nbsp;Luca Verderame ,&nbsp;Enrico Russo ,&nbsp;Alessio Merlo","doi":"10.1016/j.compeleceng.2024.109882","DOIUrl":"10.1016/j.compeleceng.2024.109882","url":null,"abstract":"<div><div>Modern mobile applications harvest many user-generated events during execution using proper libraries called <em>analytic libraries</em>. The collection of such events allows the app developers to acquire helpful information to further improve the app. The same collected events are likewise an essential source of information for analytic library providers (e.g., Google and Meta) to understand users’ preferences. However, the user is not involved in this process. To counteract this problem, some proposals arose from legal (e.g., General Data Protection Regulation (GDPR)) and research perspectives. Concerning the latter point, some research efforts led to the definition of solutions for the Android ecosystem that allow one to limit the gathering of such data before the analytic libraries collect it or give the user control of the process. To this aim, <em>HideDroid</em> was the first proposal to allow the user to define different privacy levels for each app installed on the device by leveraging k-anonymity and differential privacy techniques. Subsequently, <em>VirtualHideDroid</em> extended HideDroid by taking advantage of the same approach to virtualized Android environments, in which an application (plugin) can run within another application (container). In this scenario, VirtualHideDroid anonymizes user event data running as the container app. However, according to standard threat models regarding virtualized Android environments, assuming that the container app is fully trusted is too optimistic in real deployments.</div><div>For this reason, in this paper, we extend the work of the original VirtualHideDroid work by assuming that the same tool may be untrusted, i.e., controlled by an external attacker that has access to the container app, thereby having full access to the user data. To solve this problem, we define a new approach, named <em>MarvelHideDroid</em>, which gives reliable anonymization of event data in the Plugin app, even in the event of a malicious/compromised container. Moreover, and differently from VirtualHideDroid, <em>MarvelHideDroid</em> relies on LLM to automatically build up the generalizations required by k-anonymity, resulting in an anonymization strategy that is more reliable against modification in the data structure of the events captured by the analytic libraries. We empirically demonstrate the viability and reliability of the proposal by testing an implementation of <em>MarvelHideDroid</em> on a set of real Android apps in a virtualized environment.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"121 ","pages":"Article 109882"},"PeriodicalIF":4.0,"publicationDate":"2024-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142720541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A non-functional requirements classification model based on cooperative attention mechanism fused with label embedding 基于合作关注机制与标签嵌入融合的非功能性需求分类模型
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-11-27 DOI: 10.1016/j.compeleceng.2024.109856
Zuhua Dai, Yifu He
Intelligent classification of software requirements is a hot research issue in the field of requirements engineering. Complete and accurate identification of functional requirements (FRs) and non-functional requirements (NFRs) is the primary task of requirements engineering. However, in real software projects, NFRs are easily neglected and may become a potential risk of project failure. Text is the main source of information about software requirements. With the increasing scale of software projects, a large number of complex types of text materials are used for software requirements analysis. Manual identification of NFRs of software projects has the problems of easy omission, ambiguity, vagueness, and high time-consuming cost. Based on the above existing defects, a deep neural network model named CAFLE is designed in this paper to solve it. CAFLE is composed of two parts, Text-label cooperative attention encoder (TLCAE) and Label decoder (LD). TLCAE adopts a Bi-directional long short-term memory network (Bi-LSTM) and multi-head cooperative attention mechanism to generate an encoded representation of the mutual involvement of requirement classification labels and requirement text. LD is an LSTM decoder with an attention mechanism constructed for the multi-class classification task of requirement text. LD utilizes the representation generated by TLCAE for prediction. Experimental results on the PROMISE benchmark dataset show that CAFLE outperforms existing NFRs classification methods with an F1 score of 95%.
软件需求的智能分类是需求工程领域的一个热点研究课题。完整准确地识别功能需求(FRs)和非功能需求(NFRs)是需求工程的首要任务。然而,在实际软件项目中,非功能性需求很容易被忽视,成为项目失败的潜在风险。文本是软件需求信息的主要来源。随着软件项目规模的不断扩大,大量复杂类型的文本资料被用于软件需求分析。人工识别软件项目的 NFR 存在易遗漏、模糊、含糊、耗时成本高等问题。基于上述现有缺陷,本文设计了一种名为 CAFLE 的深度神经网络模型来解决这一问题。CAFLE 由文本-标签合作注意力编码器(TLCAE)和标签解码器(LD)两部分组成。TLCAE 采用双向长短期记忆网络(Bi-LSTM)和多头合作注意机制,生成需求分类标签和需求文本相互参与的编码表示。LD 是一种具有注意力机制的 LSTM 解码器,专为需求文本的多类分类任务而构建。LD 利用 TLCAE 生成的表示进行预测。在 PROMISE 基准数据集上的实验结果表明,CAFLE 优于现有的 NFRs 分类方法,F1 分数高达 95%。
{"title":"A non-functional requirements classification model based on cooperative attention mechanism fused with label embedding","authors":"Zuhua Dai,&nbsp;Yifu He","doi":"10.1016/j.compeleceng.2024.109856","DOIUrl":"10.1016/j.compeleceng.2024.109856","url":null,"abstract":"<div><div>Intelligent classification of software requirements is a hot research issue in the field of requirements engineering. Complete and accurate identification of functional requirements (FRs) and non-functional requirements (NFRs) is the primary task of requirements engineering. However, in real software projects, NFRs are easily neglected and may become a potential risk of project failure. Text is the main source of information about software requirements. With the increasing scale of software projects, a large number of complex types of text materials are used for software requirements analysis. Manual identification of NFRs of software projects has the problems of easy omission, ambiguity, vagueness, and high time-consuming cost. Based on the above existing defects, a deep neural network model named CAFLE is designed in this paper to solve it. CAFLE is composed of two parts, Text-label cooperative attention encoder (TLCAE) and Label decoder (LD). TLCAE adopts a Bi-directional long short-term memory network (Bi-LSTM) and multi-head cooperative attention mechanism to generate an encoded representation of the mutual involvement of requirement classification labels and requirement text. LD is an LSTM decoder with an attention mechanism constructed for the multi-class classification task of requirement text. LD utilizes the representation generated by TLCAE for prediction. Experimental results on the PROMISE benchmark dataset show that CAFLE outperforms existing NFRs classification methods with an F1 score of 95%.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"121 ","pages":"Article 109856"},"PeriodicalIF":4.0,"publicationDate":"2024-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142720539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A residual deep learning network for smartwatch-based user identification using activity patterns in daily living 利用日常生活中的活动模式识别智能手表用户的残差深度学习网络
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-11-27 DOI: 10.1016/j.compeleceng.2024.109883
Sakorn Mekruksavanich , Anuchit Jitpattanakul
User identification is a critical aspect of smartwatch security, ensuring that only authorized individuals gain access to sensitive information stored on the device. Conventional methods like passwords and biometrics have limitations, such as the risk of forgetting passwords or the potential for biometric data to be compromised. This research proposes a novel approach for user identification on smartwatches by analyzing activity patterns using a hybrid residual neural network called Att-ResBiLSTM. The proposed method leverages unique patterns of user interactions with their smartwatches, including application usage, typing behavior, and motion sensor data, to create an individualized user profile. Employing a deep learning network specifically designed for wearable devices, the system can reliably and promptly identify users by analyzing their activity patterns. The Att-ResBiLSTM architecture comprises three key components: convolutional layers, ResBiLSTM, and an attention layer. The convolutional layers extract spatial features from the pre-processed data. At the same time, the ResBiLSTM component captures long-term dependencies in the time-series data by combining the advantages of bidirectional long short-term memory (BiLSTM) and residual connections. The attention mechanism enhances the final recognition features by selectively prioritizing the most informative elements of the input data. The Att-ResBiLSTM model is trained and evaluated using a diverse dataset of user activity patterns. Experimental results demonstrate that the proposed approach achieves remarkable accuracy in user identification, with an accuracy rate of 98.29% and the highest F1-score of 98.24%. The research also conducts a comparative analysis to assess the efficacy of accelerometer data versus gyroscope data, revealing that combining both sensor modalities improves user identification performance. The proposed methodology provides a reliable and user-friendly alternative to conventional user authentication techniques for smartwatches. This approach leverages activity patterns and a hybrid residual deep learning network to offer a robust and efficient solution for user identification based on smartwatch data, thereby enhancing the overall security of wearable devices.
用户身份验证是智能手表安全的一个重要方面,可确保只有经过授权的人才能访问存储在设备上的敏感信息。密码和生物识别等传统方法有其局限性,如忘记密码的风险或生物识别数据被泄露的可能性。本研究提出了一种在智能手表上识别用户的新方法,即使用一种名为 Att-ResBiLSTM 的混合残差神经网络来分析活动模式。所提出的方法利用用户与智能手表互动的独特模式(包括应用程序使用、打字行为和运动传感器数据)来创建个性化的用户配置文件。该系统采用了专为可穿戴设备设计的深度学习网络,通过分析用户的活动模式,能够可靠、及时地识别用户。Att-ResBiLSTM 架构由三个关键部分组成:卷积层、ResBiLSTM 和注意力层。卷积层从预处理数据中提取空间特征。同时,ResBiLSTM 部分结合双向长短期记忆(BiLSTM)和残差连接的优势,捕捉时间序列数据中的长期依赖关系。注意力机制通过选择性地优先处理输入数据中信息量最大的元素来增强最终识别特征。Att-ResBiLSTM 模型是通过一个多样化的用户活动模式数据集进行训练和评估的。实验结果表明,所提出的方法在用户识别方面取得了显著的准确性,准确率达到 98.29%,最高 F1 分数为 98.24%。研究还进行了对比分析,以评估加速度计数据与陀螺仪数据的功效,结果表明结合两种传感器模式可提高用户识别性能。所提出的方法为智能手表的传统用户身份验证技术提供了一种可靠、用户友好的替代方法。这种方法利用活动模式和混合残差深度学习网络,为基于智能手表数据的用户识别提供了一种稳健高效的解决方案,从而提高了可穿戴设备的整体安全性。
{"title":"A residual deep learning network for smartwatch-based user identification using activity patterns in daily living","authors":"Sakorn Mekruksavanich ,&nbsp;Anuchit Jitpattanakul","doi":"10.1016/j.compeleceng.2024.109883","DOIUrl":"10.1016/j.compeleceng.2024.109883","url":null,"abstract":"<div><div>User identification is a critical aspect of smartwatch security, ensuring that only authorized individuals gain access to sensitive information stored on the device. Conventional methods like passwords and biometrics have limitations, such as the risk of forgetting passwords or the potential for biometric data to be compromised. This research proposes a novel approach for user identification on smartwatches by analyzing activity patterns using a hybrid residual neural network called Att-ResBiLSTM. The proposed method leverages unique patterns of user interactions with their smartwatches, including application usage, typing behavior, and motion sensor data, to create an individualized user profile. Employing a deep learning network specifically designed for wearable devices, the system can reliably and promptly identify users by analyzing their activity patterns. The Att-ResBiLSTM architecture comprises three key components: convolutional layers, ResBiLSTM, and an attention layer. The convolutional layers extract spatial features from the pre-processed data. At the same time, the ResBiLSTM component captures long-term dependencies in the time-series data by combining the advantages of bidirectional long short-term memory (BiLSTM) and residual connections. The attention mechanism enhances the final recognition features by selectively prioritizing the most informative elements of the input data. The Att-ResBiLSTM model is trained and evaluated using a diverse dataset of user activity patterns. Experimental results demonstrate that the proposed approach achieves remarkable accuracy in user identification, with an accuracy rate of 98.29% and the highest F1-score of 98.24%. The research also conducts a comparative analysis to assess the efficacy of accelerometer data versus gyroscope data, revealing that combining both sensor modalities improves user identification performance. The proposed methodology provides a reliable and user-friendly alternative to conventional user authentication techniques for smartwatches. This approach leverages activity patterns and a hybrid residual deep learning network to offer a robust and efficient solution for user identification based on smartwatch data, thereby enhancing the overall security of wearable devices.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"121 ","pages":"Article 109883"},"PeriodicalIF":4.0,"publicationDate":"2024-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142720540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Armed boundary sabotage: A case study of human malicious behaviors identification with computer vision and explainable reasoning methods 武装边界破坏:利用计算机视觉和可解释推理方法识别人类恶意行为的案例研究
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-11-26 DOI: 10.1016/j.compeleceng.2024.109924
Zhan Li, Xingyu Song, Shi Chen, Kazuyuki Demachi
Nowadays, the technologies in computer vision (CV) are labor-saving and convenient to identify human malicious behaviors. However, they usually fail to consider the robustness, generalization and interpretability of calculation frameworks. In this paper, a very common but sometimes difficult-to-detect case research called armed boundary sabotage is conducted, which is achieved by computer vision module (CVM) and reasoning module (RM). Among them, CVM is used for extracting the key information from raw videos, while RM is applied to obtain the final reasoning results. Considering the transient and confusing properties in such scenarios, a specific human-object interaction analysis process with soft constraint is proposed in CVM. In addition, two reasoning methods which are data-based reasoning method and language-based reasoning methods are implemented in RM. The results show that the human-object interaction analysis process with soft constraint prove to be effective and practical, while the optimal testing accuracy achieves 0.7871. Furthermore, the two proposed reasoning methods are promising for identification of human malicious behaviors. Among them, the advanced language-based reasoning method outperforms others, with highest precision value of 0.8750 and perfect recall value of 1.0000. Besides, these proposals are also verified to be high-performance in other external intrusion scenarios of our previous work. Finally, our research also obtain state-of-the-art results by comparing with other related works.
如今,计算机视觉(CV)技术在识别人类恶意行为方面既省力又方便。然而,它们通常没有考虑计算框架的鲁棒性、通用性和可解释性。本文通过计算机视觉模块(CVM)和推理模块(RM),对武装边界破坏这一非常常见但有时难以发现的案例进行了研究。其中,CVM 用于从原始视频中提取关键信息,而 RM 则用于获得最终的推理结果。考虑到此类场景的瞬时性和迷惑性,在 CVM 中提出了一种特定的具有软约束的人-物交互分析流程。此外,在 RM 中还实现了两种推理方法,即基于数据的推理方法和基于语言的推理方法。结果表明,带软约束的人-物交互分析流程被证明是有效和实用的,最佳测试精度达到了 0.7871。此外,所提出的两种推理方法在识别人类恶意行为方面具有良好的前景。其中,基于语言的高级推理方法优于其他推理方法,其最高精确度值为 0.8750,完美召回值为 1.0000。此外,这些建议在我们之前的其他外部入侵场景中也得到了高性能验证。最后,通过与其他相关工作的比较,我们的研究也获得了最先进的结果。
{"title":"Armed boundary sabotage: A case study of human malicious behaviors identification with computer vision and explainable reasoning methods","authors":"Zhan Li,&nbsp;Xingyu Song,&nbsp;Shi Chen,&nbsp;Kazuyuki Demachi","doi":"10.1016/j.compeleceng.2024.109924","DOIUrl":"10.1016/j.compeleceng.2024.109924","url":null,"abstract":"<div><div>Nowadays, the technologies in computer vision (CV) are labor-saving and convenient to identify human malicious behaviors. However, they usually fail to consider the robustness, generalization and interpretability of calculation frameworks. In this paper, a very common but sometimes difficult-to-detect case research called armed boundary sabotage is conducted, which is achieved by computer vision module (CVM) and reasoning module (RM). Among them, CVM is used for extracting the key information from raw videos, while RM is applied to obtain the final reasoning results. Considering the transient and confusing properties in such scenarios, a specific human-object interaction analysis process with soft constraint is proposed in CVM. In addition, two reasoning methods which are data-based reasoning method and language-based reasoning methods are implemented in RM. The results show that the human-object interaction analysis process with soft constraint prove to be effective and practical, while the optimal testing accuracy achieves 0.7871. Furthermore, the two proposed reasoning methods are promising for identification of human malicious behaviors. Among them, the advanced language-based reasoning method outperforms others, with highest precision value of 0.8750 and perfect recall value of 1.0000. Besides, these proposals are also verified to be high-performance in other external intrusion scenarios of our previous work. Finally, our research also obtain state-of-the-art results by comparing with other related works.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"121 ","pages":"Article 109924"},"PeriodicalIF":4.0,"publicationDate":"2024-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142720538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Text-independent speaker identification using modified SincNet with robust features from suitable acoustic region and appropriate optimizer for raw audio analysis 利用修改后的 SincNet 和来自合适声学区域的稳健特征以及用于原始音频分析的适当优化器,进行与文本无关的说话者识别
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-11-26 DOI: 10.1016/j.compeleceng.2024.109915
Nirupam Shome , Richik Kashyap , Rabul Hussain Laskar
Speaker identification is a method of identifying an individual from a set of speakers, and text-independent speaker identification systems allow speakers to utter any phrase without any constraints. This study is focused on raw audio analysis as phase, fine-grained frequency patterns, timing cues, and other minute characteristics are preserved when raw waveforms are processed as compared to handcrafted features like Mel-Frequency Cepstral Coefficients (MFCC) and visual representation of audio-like spectrogram. Due to the depth of information, which includes variations in speech rhythm, pitch, and vocal tract shape, it is beneficial for identifying speakers. The deep learning architecture known as SincNet has gained popularity in speaker identification because of its parametric Sinc functions that allow it to operate directly on the raw audio input. In this paper, we have considered SincNet as the baseline model for speaker identification. The effect of proper speech boundary detection, including high-level features and effective optimizer selection are analysed. The precise identification of the signal start and terminus point is important for eliminating the redundant non-speech regions. We have included endpoint detection module as a pre-processing step in the system. Proper feature extraction and selection are crucial to the model's success. To extract more abstract features from the data, we have added more convolution layers to the original SincNet model. Further, we investigated the hyperparameter tuning protocol's sensitivity to the optimizer and selected the suitable optimizer for raw audio analysis. With all the modifications in the system architecture, we are able to archive improvements of 12.76 %, 13.33 %, and 13.39 % respectively for training, validation, and testing over the original SincNet model. In terms of validation loss, our proposed approach attains 0.35 in comparison to the original SincNet loss of 1.02. With this significant improvement, the total training time is marginally increased by 20 minutes for our proposed model. We have performed our investigation on the LibriSpeech dataset to check the effectiveness of our proposed system in comparison to the other model..
扬声器识别是从一组扬声器中识别出一个人的方法,与文本无关的扬声器识别系统允许扬声器不受任何限制地说出任何短语。本研究的重点是原始音频分析,因为在处理原始波形时,相位、细粒度频率模式、时间线索和其他微小特征都会保留下来,而手工制作的特征(如梅尔频率倒频谱系数(MFCC)和类似音频频谱图的视觉表示)则不会。由于信息的深度,其中包括语音节奏、音高和声道形状的变化,因此有利于识别说话者。被称为 SincNet 的深度学习架构因其参数化 Sinc 函数可直接对原始音频输入进行操作而在扬声器识别领域大受欢迎。在本文中,我们将 SincNet 视为识别说话人的基准模型。本文分析了正确的语音边界检测(包括高级特征和有效的优化器选择)的效果。精确识别信号的起点和终点对于消除多余的非语音区域非常重要。我们在系统中加入了终点检测模块作为预处理步骤。正确的特征提取和选择是模型成功的关键。为了从数据中提取更多抽象特征,我们在原始 SincNet 模型中添加了更多卷积层。此外,我们还研究了超参数调整协议对优化器的敏感性,并为原始音频分析选择了合适的优化器。在对系统架构进行所有修改后,我们在训练、验证和测试方面分别比原始 SincNet 模型提高了 12.76%、13.33% 和 13.39%。在验证损失方面,我们提出的方法达到了 0.35,而原始 SincNet 的损失为 1.02。由于这一重大改进,我们提出的模型的总训练时间略微增加了 20 分钟。我们在 LibriSpeech 数据集上进行了调查,以检验我们提出的系统与其他模型相比的有效性。
{"title":"Text-independent speaker identification using modified SincNet with robust features from suitable acoustic region and appropriate optimizer for raw audio analysis","authors":"Nirupam Shome ,&nbsp;Richik Kashyap ,&nbsp;Rabul Hussain Laskar","doi":"10.1016/j.compeleceng.2024.109915","DOIUrl":"10.1016/j.compeleceng.2024.109915","url":null,"abstract":"<div><div>Speaker identification is a method of identifying an individual from a set of speakers, and text-independent speaker identification systems allow speakers to utter any phrase without any constraints. This study is focused on raw audio analysis as phase, fine-grained frequency patterns, timing cues, and other minute characteristics are preserved when raw waveforms are processed as compared to handcrafted features like Mel-Frequency Cepstral Coefficients (MFCC) and visual representation of audio-like spectrogram. Due to the depth of information, which includes variations in speech rhythm, pitch, and vocal tract shape, it is beneficial for identifying speakers. The deep learning architecture known as SincNet has gained popularity in speaker identification because of its parametric Sinc functions that allow it to operate directly on the raw audio input. In this paper, we have considered SincNet as the baseline model for speaker identification. The effect of proper speech boundary detection, including high-level features and effective optimizer selection are analysed. The precise identification of the signal start and terminus point is important for eliminating the redundant non-speech regions. We have included endpoint detection module as a pre-processing step in the system. Proper feature extraction and selection are crucial to the model's success. To extract more abstract features from the data, we have added more convolution layers to the original SincNet model. Further, we investigated the hyperparameter tuning protocol's sensitivity to the optimizer and selected the suitable optimizer for raw audio analysis. With all the modifications in the system architecture, we are able to archive improvements of 12.76 %, 13.33 %, and 13.39 % respectively for training, validation, and testing over the original SincNet model. In terms of validation loss, our proposed approach attains 0.35 in comparison to the original SincNet loss of 1.02. With this significant improvement, the total training time is marginally increased by 20 minutes for our proposed model. We have performed our investigation on the LibriSpeech dataset to check the effectiveness of our proposed system in comparison to the other model..</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"121 ","pages":"Article 109915"},"PeriodicalIF":4.0,"publicationDate":"2024-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142720491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Eco-power management system with operation and voltage security objectives of distribution system operator considering networked virtual power plants with electric vehicles parking lot and price-based demand response 考虑到带电动汽车停车场的网络虚拟发电厂和基于价格的需求响应,配电系统运营商具有运行和电压安全目标的生态电力管理系统
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-11-25 DOI: 10.1016/j.compeleceng.2024.109895
Jingyi Zhang , Haotian Wu , Ehsan Akbari , Leila Bagherzadeh , Sasan Pirouzi
<div><div>In the energy management of a network, it is expected that by extracting the optimal performance for the power sources, storage equipment, and responsive demand, a favorable economic and technology situation is achievable for the network and the mentioned elements. Virtual power plants, as a unit aggregating resources, storage, and responsive loads, can create more favorable conditions in network energy management. So, it is expected that the positive effect of the virtual power plant format on the economic and technical situation of the distribution system is far more than those of managing individual elements mentioned in the network. Consequently, the distribution network operator's economic, environmental, and technical goals are met through the concurrent administration of reactive and active power in the smart distribution network that is equipped with a flexible-sustainable virtual power plant. The system operator is accountable for reducing the weighted sum of the voltage security index, energy loss, and energy cost of the distribution network. This problem is associated with the optimal power flow formulation, which considers the environmental limits and security of voltage in the distribution network, the renewable resource operation model and flexibility in the form of a virtual power plant, and the system's flexibility constraints. Flexibility resources considered in the present study are price-based demand response and electric vehicle parking lots. Stochastic optimization relying on the Unscented Transform assists in providing a suitable model for uncertain quantities resulting from the amount of load, electric vehicles, renewable power, and price of energy and eventually shortens the computing time and accurately computes the flexibility index. The optimal compromise solution amongst various objective functions can be found through fuzzy decision-making. Some innovations of this research include concurrent administration of active and reactive power in virtual power plant, concurrent modeling of economic, operational, environmental, voltage security, and flexibility indicators in the distribution network, utilization of electric vehicles, and demand response as a source of flexibility, use of Unscented transform for modeling the uncertainties corresponding to the exact calculation of flexibility. The suggested method was simulated in the IEEE 69-bus radial smart distribution system. Regarding the numerical report obtained, the optimal performance of each of the renewable generation, demand response, and parking of electric vehicles can significantly impact the economic and technical condition of the distribution network. However, the best condition was obtained when the mentioned elements were placed in the form of a virtual power plant. So, in such a situation, the energy cost is around $1862 for the said network. The lowest value for the worst security index in this network is around 0.933 p.u. Energy loss, maximum volt
在网络能源管理中,通过提取电源、存储设备和响应性需求的最佳性能,有望为网络和上述要素带来有利的经济和技术条件。虚拟电厂作为资源、储能和响应负载的聚合单元,可以为网络能源管理创造更有利的条件。因此,预计虚拟电厂形式对配电系统经济和技术状况的积极影响要远远大于管理网络中提及的单个元素。因此,在配备了灵活可持续虚拟电厂的智能配电网中,通过同时管理无功功率和有功功率,可以实现配电网运营商的经济、环境和技术目标。系统运营商负责降低配电网的电压安全指数、能源损耗和能源成本的加权和。这个问题与最优功率流公式有关,其中考虑了配电网的环境限制和电压安全、可再生资源运行模式和虚拟电厂形式的灵活性,以及系统的灵活性约束。本研究中考虑的灵活性资源是基于价格的需求响应和电动汽车停车场。随机优化依赖于无符号变换,有助于为负载量、电动汽车、可再生能源和能源价格等不确定量提供合适的模型,最终缩短计算时间并准确计算出灵活性指数。通过模糊决策,可以在各种目标函数之间找到最佳折中方案。该研究的一些创新包括:虚拟发电厂有功功率和无功功率的并发管理;配电网中经济、运行、环境、电压安全和灵活性指标的并发建模;电动汽车的利用;作为灵活性来源的需求响应;使用无色变换对与精确计算灵活性相对应的不确定性进行建模。建议的方法在 IEEE 69 总线径向智能配电系统中进行了模拟。从得到的数值报告来看,可再生能源发电、需求响应和电动汽车停放各自的最佳性能会对配电网的经济和技术状况产生显著影响。然而,当上述要素以虚拟发电厂的形式放置时,就能获得最佳状态。因此,在这种情况下,上述网络的能源成本约为 1862 美元。该网络的最差安全指数最低值约为 0.933 p.u,能量损失、最大电压降和峰值负载能力分别为 1.902 MWh、0.047 p.u 和 5.624 MW。因此,根据数值结果,该方法可实现可持续的社会福利。与电力流研究相比,可持续系统的优化电力调度可使电网的经济性、电压安全性和运行状况分别提高约 43%、26.9% 和 47%-62% 。此外,虚拟发电厂的理想管理可使拟议计划实现 100% 的灵活性。此外,它还能大大降低配电网的污染程度。
{"title":"Eco-power management system with operation and voltage security objectives of distribution system operator considering networked virtual power plants with electric vehicles parking lot and price-based demand response","authors":"Jingyi Zhang ,&nbsp;Haotian Wu ,&nbsp;Ehsan Akbari ,&nbsp;Leila Bagherzadeh ,&nbsp;Sasan Pirouzi","doi":"10.1016/j.compeleceng.2024.109895","DOIUrl":"10.1016/j.compeleceng.2024.109895","url":null,"abstract":"&lt;div&gt;&lt;div&gt;In the energy management of a network, it is expected that by extracting the optimal performance for the power sources, storage equipment, and responsive demand, a favorable economic and technology situation is achievable for the network and the mentioned elements. Virtual power plants, as a unit aggregating resources, storage, and responsive loads, can create more favorable conditions in network energy management. So, it is expected that the positive effect of the virtual power plant format on the economic and technical situation of the distribution system is far more than those of managing individual elements mentioned in the network. Consequently, the distribution network operator's economic, environmental, and technical goals are met through the concurrent administration of reactive and active power in the smart distribution network that is equipped with a flexible-sustainable virtual power plant. The system operator is accountable for reducing the weighted sum of the voltage security index, energy loss, and energy cost of the distribution network. This problem is associated with the optimal power flow formulation, which considers the environmental limits and security of voltage in the distribution network, the renewable resource operation model and flexibility in the form of a virtual power plant, and the system's flexibility constraints. Flexibility resources considered in the present study are price-based demand response and electric vehicle parking lots. Stochastic optimization relying on the Unscented Transform assists in providing a suitable model for uncertain quantities resulting from the amount of load, electric vehicles, renewable power, and price of energy and eventually shortens the computing time and accurately computes the flexibility index. The optimal compromise solution amongst various objective functions can be found through fuzzy decision-making. Some innovations of this research include concurrent administration of active and reactive power in virtual power plant, concurrent modeling of economic, operational, environmental, voltage security, and flexibility indicators in the distribution network, utilization of electric vehicles, and demand response as a source of flexibility, use of Unscented transform for modeling the uncertainties corresponding to the exact calculation of flexibility. The suggested method was simulated in the IEEE 69-bus radial smart distribution system. Regarding the numerical report obtained, the optimal performance of each of the renewable generation, demand response, and parking of electric vehicles can significantly impact the economic and technical condition of the distribution network. However, the best condition was obtained when the mentioned elements were placed in the form of a virtual power plant. So, in such a situation, the energy cost is around $1862 for the said network. The lowest value for the worst security index in this network is around 0.933 p.u. Energy loss, maximum volt","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"121 ","pages":"Article 109895"},"PeriodicalIF":4.0,"publicationDate":"2024-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142701475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A magnetic equivalent circuit model for segmental translator linear switched reluctance motor 分段平移线性开关磁阻电机的磁等效电路模型
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-11-25 DOI: 10.1016/j.compeleceng.2024.109907
Milad Golzarzadeh , Hashem Oraee , Babak Ganji
Because of exclusive characteristics of Switched Reluctance Motor (SRM) particularly simple and robust structure and high reliability, it can be a good choice for many industrial applications. In terms of structure and performance principles, the Linear Switched Reluctance Motor (LSRM) is similar to rotary SRM (RSRM) and therefore their advantages are identical. The Segmental Translator Linear Switched Reluctance Motor (STLSRM) is a special type of LSRMs that can produce a higher thrust density in comparison to the simple type of LSRM. One of the most important models for predicting the characteristics of electric machines is the model based on the Magnetic Equivalent Circuit (MEC), which can be used to predict the performance characteristics of machines. Although the STLSRM has significant advantages, no MEC model has been introduced for it so far. With the aim of predicting the static and dynamic characteristics of this motor, a new analytical model based on MEC method is developed in the present paper. In addition to simplicity, the developed model has acceptable accuracy and speed. The proposed model is utilized for a three-phase STLSRM and different static and dynamic characteristics of the motor including static flux-linkage, static force, instantaneous current waveform and instantaneous thrust waveform are predicted. To validate these obtained simulation results, they are compared with those derived from the Finite Element Method (FEM).
由于开关磁阻电机(SRM)具有结构简单、坚固耐用、可靠性高等独特特点,因此在许多工业应用中都是不错的选择。就结构和性能原理而言,线性开关磁阻电机(LSRM)与旋转式开关磁阻电机(RSRM)相似,因此它们的优点是相同的。分段变换器线性开关磁阻电机 (STLSRM) 是一种特殊类型的 LSRM,与简单类型的 LSRM 相比,它能产生更高的推力密度。基于磁性等效电路 (MEC) 的模型是预测电机特性的最重要模型之一,可用于预测电机的性能特性。尽管 STLSRM 具有显著的优势,但迄今为止还没有针对它的 MEC 模型。为了预测该电机的静态和动态特性,本文基于 MEC 方法建立了一个新的分析模型。除了简单之外,所开发的模型还具有可接受的精度和速度。本文将所建模型用于三相 STLSRM,并预测了该电机的不同静态和动态特性,包括静磁通联结、静态力、瞬时电流波形和瞬时推力波形。为了验证这些仿真结果,将它们与有限元法(FEM)得出的结果进行了比较。
{"title":"A magnetic equivalent circuit model for segmental translator linear switched reluctance motor","authors":"Milad Golzarzadeh ,&nbsp;Hashem Oraee ,&nbsp;Babak Ganji","doi":"10.1016/j.compeleceng.2024.109907","DOIUrl":"10.1016/j.compeleceng.2024.109907","url":null,"abstract":"<div><div>Because of exclusive characteristics of Switched Reluctance Motor (SRM) particularly simple and robust structure and high reliability, it can be a good choice for many industrial applications. In terms of structure and performance principles, the Linear Switched Reluctance Motor (LSRM) is similar to rotary SRM (RSRM) and therefore their advantages are identical. The Segmental Translator Linear Switched Reluctance Motor (STLSRM) is a special type of LSRMs that can produce a higher thrust density in comparison to the simple type of LSRM. One of the most important models for predicting the characteristics of electric machines is the model based on the Magnetic Equivalent Circuit (MEC), which can be used to predict the performance characteristics of machines. Although the STLSRM has significant advantages, no MEC model has been introduced for it so far. With the aim of predicting the static and dynamic characteristics of this motor, a new analytical model based on MEC method is developed in the present paper. In addition to simplicity, the developed model has acceptable accuracy and speed. The proposed model is utilized for a three-phase STLSRM and different static and dynamic characteristics of the motor including static flux-linkage, static force, instantaneous current waveform and instantaneous thrust waveform are predicted. To validate these obtained simulation results, they are compared with those derived from the Finite Element Method (FEM).</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"121 ","pages":"Article 109907"},"PeriodicalIF":4.0,"publicationDate":"2024-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142701474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computers & Electrical Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1