首页 > 最新文献

Computers & Electrical Engineering最新文献

英文 中文
LbPV: Lattice-based Privacy-preserving mutual authentication scheme for VANET LbPV:基于网格的 VANET 隐私保护相互认证方案
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-10-17 DOI: 10.1016/j.compeleceng.2024.109765
Himun Jyoti Nath, Hiten Choudhury
This study addresses the critical challenge of achieving reliable message exchange among vehicles in Vehicular Ad-hoc Networks (VANETs). It is crucial to quickly share safety messages, traffic updates, available services, and road conditions among vehicles in VANETs. For security reasons, messages must originate exclusively from authenticated vehicles, ensuring secure message exchange and data privacy. Numerous schemes for privacy-preserving authentication have been proposed, yet they suffer from constant service provider involvement and the requirement for vehicles to generate parameters on the fly. To address these challenges, this paper introduces LbPV, a secure lattice-based privacy-preserving mutual authentication scheme emphasizing the reliability of messages, preventing spoofing and unauthorized access. LbPV eliminates service provider monitoring and allows vehicles to authenticate messages without generating parameters while on the move. This is achieved by exchanging a confidential token using lattice-based encryption and message signing. By verifying the signed message and using the shared token, receiving vehicles can confirm the authenticity of the messages. By using lattice-based cryptography, the proposed protocol is also designed with the potential to resist future attacks, including quantum attacks, enhancing its long-term security viability. The security analysis of LbPV includes formal and informal evaluations that demonstrate its robustness. Performance evaluations using the NTL library show that LbPV, with service provider parameters, outperforms existing approaches in the literature. Results of performance analysis indicate that when compared to the most efficient traditional non-lattice-based scheme discussed in this paper, the proposed protocol has increased computation cost, communication cost, and power consumption by 77.71%, 98.58%, and 77.71%, respectively. Conversely, when compared to the most efficient lattice-based scheme discussed in this paper, the proposed scheme demonstrates reductions in computation cost, communication cost, and power consumption by 71.95%, 2.16%, and 71.95%, respectively.
本研究探讨了在车载 Ad-hoc 网络 (VANET) 中实现车辆间可靠信息交换的关键挑战。在 VANET 中,车辆之间快速共享安全信息、交通更新、可用服务和路况至关重要。出于安全考虑,信息必须仅来自经过认证的车辆,以确保信息交换安全和数据隐私。目前已经提出了许多保护隐私的认证方案,但这些方案都存在服务提供商不断参与和车辆需要即时生成参数的问题。为了应对这些挑战,本文介绍了 LbPV,这是一种基于网格的安全隐私保护相互验证方案,强调信息的可靠性,防止欺骗和未经授权的访问。LbPV 消除了服务提供商的监控,允许车辆在移动过程中验证信息而无需生成参数。这是通过使用基于网格的加密和信息签名交换保密令牌来实现的。通过验证签名信息和使用共享令牌,接收车辆可以确认信息的真实性。通过使用基于网格的加密技术,所提出的协议还具有抵御未来攻击(包括量子攻击)的潜力,从而增强了其长期安全性。LbPV 的安全性分析包括正式和非正式评估,以证明其稳健性。使用 NTL 库进行的性能评估表明,LbPV 在带有服务提供商参数的情况下,性能优于文献中的现有方法。性能分析结果表明,与本文讨论的最有效的传统非网格方案相比,所提出的协议在计算成本、通信成本和功耗方面分别增加了 77.71%、98.58% 和 77.71%。相反,与本文讨论的最有效的基于网格的方案相比,拟议方案的计算成本、通信成本和功耗分别降低了 71.95%、2.16% 和 71.95%。
{"title":"LbPV: Lattice-based Privacy-preserving mutual authentication scheme for VANET","authors":"Himun Jyoti Nath,&nbsp;Hiten Choudhury","doi":"10.1016/j.compeleceng.2024.109765","DOIUrl":"10.1016/j.compeleceng.2024.109765","url":null,"abstract":"<div><div>This study addresses the critical challenge of achieving reliable message exchange among vehicles in Vehicular Ad-hoc Networks (VANETs). It is crucial to quickly share safety messages, traffic updates, available services, and road conditions among vehicles in VANETs. For security reasons, messages must originate exclusively from authenticated vehicles, ensuring secure message exchange and data privacy. Numerous schemes for privacy-preserving authentication have been proposed, yet they suffer from constant service provider involvement and the requirement for vehicles to generate parameters on the fly. To address these challenges, this paper introduces LbPV, a secure lattice-based privacy-preserving mutual authentication scheme emphasizing the reliability of messages, preventing spoofing and unauthorized access. LbPV eliminates service provider monitoring and allows vehicles to authenticate messages without generating parameters while on the move. This is achieved by exchanging a confidential token using lattice-based encryption and message signing. By verifying the signed message and using the shared token, receiving vehicles can confirm the authenticity of the messages. By using lattice-based cryptography, the proposed protocol is also designed with the potential to resist future attacks, including quantum attacks, enhancing its long-term security viability. The security analysis of LbPV includes formal and informal evaluations that demonstrate its robustness. Performance evaluations using the NTL library show that LbPV, with service provider parameters, outperforms existing approaches in the literature. Results of performance analysis indicate that when compared to the most efficient traditional non-lattice-based scheme discussed in this paper, the proposed protocol has increased computation cost, communication cost, and power consumption by 77.71%, 98.58%, and 77.71%, respectively. Conversely, when compared to the most efficient lattice-based scheme discussed in this paper, the proposed scheme demonstrates reductions in computation cost, communication cost, and power consumption by 71.95%, 2.16%, and 71.95%, respectively.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"120 ","pages":"Article 109765"},"PeriodicalIF":4.0,"publicationDate":"2024-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142444891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A robust secret data sharing through coverless video steganography based on average DC coefficient on bit plane segmentation 基于位平面分割的平均 DC 系数,通过无掩码视频隐写术实现稳健的秘密数据共享
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-10-17 DOI: 10.1016/j.compeleceng.2024.109766
Sourabh Debnath, Ramesh Kumar Mohapatra, Ratnakar Dash
Recently, coverless steganography has been gaining popularity in confidential information-hiding techniques due to its resistance to the detection of steganalysis. Whereas most coverless approaches are based on images as the transmission medium, few articles are based on video in coverless steganography. Whereas the hiding capacity per frame in the existing scheme is less, and to improve the capacity, a new secret data sharing through coverless video steganography is proposed based on the average Direct Current (DC) coefficient on the Bit plane. The bit planes are extracted from the video frame, generating multiple hash sequences from each bit plane. The bit plane is further partitioned into blocks. The average DC coefficient of consecutive subblocks within a block in a bit plane frame is compared to create the hash bit sequences. A video index database is created to store the generated hash sequences for easy retrieval. The receiver successfully recovered the secret information from the retrieval information and received videos. The observed findings show that the suggested method outperforms recent coverless video steganography techniques. The robustness is substantially stronger and superior to other existing schemes.
最近,无掩盖隐写术因其抗隐写分析检测的能力而在机密信息隐藏技术中越来越受欢迎。大多数无掩码方法都是以图像作为传输介质,而很少有文章以视频作为无掩码隐写术的传输介质。现有方案中每帧的隐藏能力较低,为了提高隐藏能力,提出了一种基于比特平面上平均直流(DC)系数的新的无掩盖视频隐写术秘密数据共享方法。从视频帧中提取位平面,从每个位平面生成多个哈希序列。位平面被进一步分割成块。比较位平面帧中一个块内连续子块的平均直流电系数,以创建哈希位序列。创建一个视频索引数据库来存储生成的哈希序列,以便于检索。接收器成功地从检索信息和接收到的视频中恢复了秘密信息。观察结果表明,所建议的方法优于最新的无掩码视频隐写技术。其稳健性大大强于其他现有方案。
{"title":"A robust secret data sharing through coverless video steganography based on average DC coefficient on bit plane segmentation","authors":"Sourabh Debnath,&nbsp;Ramesh Kumar Mohapatra,&nbsp;Ratnakar Dash","doi":"10.1016/j.compeleceng.2024.109766","DOIUrl":"10.1016/j.compeleceng.2024.109766","url":null,"abstract":"<div><div>Recently, coverless steganography has been gaining popularity in confidential information-hiding techniques due to its resistance to the detection of steganalysis. Whereas most coverless approaches are based on images as the transmission medium, few articles are based on video in coverless steganography. Whereas the hiding capacity per frame in the existing scheme is less, and to improve the capacity, a new secret data sharing through coverless video steganography is proposed based on the average Direct Current (DC) coefficient on the Bit plane. The bit planes are extracted from the video frame, generating multiple hash sequences from each bit plane. The bit plane is further partitioned into blocks. The average DC coefficient of consecutive subblocks within a block in a bit plane frame is compared to create the hash bit sequences. A video index database is created to store the generated hash sequences for easy retrieval. The receiver successfully recovered the secret information from the retrieval information and received videos. The observed findings show that the suggested method outperforms recent coverless video steganography techniques. The robustness is substantially stronger and superior to other existing schemes.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"120 ","pages":"Article 109766"},"PeriodicalIF":4.0,"publicationDate":"2024-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142444892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel DDoS detection method using multi-layer stacking in SDN environment 在 SDN 环境中使用多层堆叠的新型 DDoS 检测方法
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-10-17 DOI: 10.1016/j.compeleceng.2024.109769
Tasnim Alasali, Omar Dakkak
Software Defined Network (SDN) offers virtualized services compatible with infrastructure hosted computing, presenting a flexible, adaptive, and economical network architecture. Switches used in SDN prioritize packet matching in flow tables above packet processing, leaving them open to Denial of Service (DoS) attacks. These attacks, exemplified by Distributed Denial of Service Attacks (DDoS), target a victim while using many infected workstations at once. Due to its scalability and programmability, SDN is being used more and more for network management. However, it has specific security concerns, such as the controller’s susceptibility to cyberattacks, which might result in a single point of failure and network-wide risks. This study proposes a novel DDoS prediction model by developing stacking classifier model consisting of multiple base classifiers for an SDN environment. The proposed model is built on stacking several classifiers at the base level and the Meta level, which mixes varied or heterogeneous learners to provide reliable model results. The findings demonstrate that the proposed stacking model outperforms other existing models with respect to accuracy, sensitivity, specificity, precision, and F1 score. Finally, the stacking classifier model is evaluated in terms of binary classification. The evaluation shows the highest AUC of 0.9537 whereas Random Forest, Decision Tree, and Logistic Regression achieve AUC values around 0.93–0.95.
软件定义网络(SDN)提供与基础设施托管计算兼容的虚拟化服务,是一种灵活、自适应和经济的网络架构。SDN 中使用的交换机将流量表中的数据包匹配优先级置于数据包处理之上,从而使其容易受到拒绝服务 (DoS) 攻击。这些攻击以分布式拒绝服务攻击(DDoS)为例,目标是同时使用许多受感染工作站的受害者。由于具有可扩展性和可编程性,SDN 被越来越多地用于网络管理。然而,它也有一些特定的安全问题,如控制器易受网络攻击,可能导致单点故障和全网风险。本研究通过为 SDN 环境开发由多个基础分类器组成的堆叠分类器模型,提出了一种新型 DDoS 预测模型。所提出的模型是在基础层和元层堆叠多个分类器而建立的,它混合了不同或异构的学习者,以提供可靠的模型结果。研究结果表明,所提出的堆叠模型在准确度、灵敏度、特异性、精确度和 F1 分数方面都优于其他现有模型。最后,从二元分类的角度对堆积分类器模型进行了评估。评估结果显示,AUC 最高,为 0.9537,而随机森林、决策树和逻辑回归的 AUC 值约为 0.93-0.95。
{"title":"A novel DDoS detection method using multi-layer stacking in SDN environment","authors":"Tasnim Alasali,&nbsp;Omar Dakkak","doi":"10.1016/j.compeleceng.2024.109769","DOIUrl":"10.1016/j.compeleceng.2024.109769","url":null,"abstract":"<div><div>Software Defined Network (SDN) offers virtualized services compatible with infrastructure hosted computing, presenting a flexible, adaptive, and economical network architecture. Switches used in SDN prioritize packet matching in flow tables above packet processing, leaving them open to Denial of Service (DoS) attacks. These attacks, exemplified by Distributed Denial of Service Attacks (DDoS), target a victim while using many infected workstations at once. Due to its scalability and programmability, SDN is being used more and more for network management. However, it has specific security concerns, such as the controller’s susceptibility to cyberattacks, which might result in a single point of failure and network-wide risks. This study proposes a novel DDoS prediction model by developing stacking classifier model consisting of multiple base classifiers for an SDN environment. The proposed model is built on stacking several classifiers at the base level and the Meta level, which mixes varied or heterogeneous learners to provide reliable model results. The findings demonstrate that the proposed stacking model outperforms other existing models with respect to accuracy, sensitivity, specificity, precision, and F1 score. Finally, the stacking classifier model is evaluated in terms of binary classification. The evaluation shows the highest AUC of 0.9537 whereas Random Forest, Decision Tree, and Logistic Regression achieve AUC values around 0.93–0.95.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"120 ","pages":"Article 109769"},"PeriodicalIF":4.0,"publicationDate":"2024-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142444888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-faceted sustainability improvement in low voltage power distribution network employing DG and capacitor bank 利用 DG 和电容器组多方面改善低压配电网络的可持续性
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-10-17 DOI: 10.1016/j.compeleceng.2024.109789
Pappu Kumar Saurav, Swapna Mansani, Partha Kayal
Efficient distribution of active and reactive power in distribution networks is crucial for ensuring that consumer demand is met and that electrical power quality is maintained. This requires careful planning, particularly in terms of optimally placing and sizing distributed generator (DG) and capacitor bank (CB) units. These units play a key role in minimizing power losses and voltage fluctuations within the network. However, implementing DG and CB units in unbalanced distribution networks presents unique challenges due to inherent system unbalances. To address these challenges, this article proposes a method for allocating and sizing DG and CB units in unbalanced distribution networks. The approach accounts for the network's unbalance and targets multiple objectives, such as reducing power losses, improving multi-phase voltage stability, and minimizing phase-to-phase voltage unbalance. The fast and flexible radial power flow (FFRPF) technique is employed to model complex interactions and constraints within the network, leading to a multi-objective optimization problem. This optimization problem is solved using the weight aggregated particle swarm optimization (WA-PSO) method, a variant of particle swarm optimization tailored for multi-objective functions. WA-PSO simplifies the process by combining multiple objectives into a single function using weighted aggregation. The efficacy of this approach is validated on 19, 34, and 123-node unbalanced radial distribution networks (URDNs). The results show significant improvements in power delivery efficiency across all tested networks, especially when DG and CB units are operated simultaneously. Specifically, DG and CB integration led to a reduction in system losses by 89.90 %, 88.42 %, and 86.87 %, and a decrease in three-phase voltage unbalance indices by 88.75 %, 81.68 %, and 39.05 %, for the 19, 34, and 123-node systems, respectively, while maintaining voltage stability within acceptable limits. Additionally, CO2 emissions were reduced by 52 %, 62 %, and 53 % when microturbines were utilized instead of coal-based thermal power plants, further highlighting the environmental benefits of the proposed approach.
配电网络中有功和无功功率的有效分配对于确保满足用户需求和保持电能质量至关重要。这需要精心规划,特别是在优化分布式发电机 (DG) 和电容器组 (CB) 的布置和大小方面。这些设备在最大限度减少电网内的电力损耗和电压波动方面发挥着关键作用。然而,由于固有的系统不平衡,在不平衡配电网络中实施分布式发电机和电容器组单元面临着独特的挑战。为了应对这些挑战,本文提出了一种在不平衡配电网络中分配和确定 DG 和 CB 单元大小的方法。该方法考虑了配电网的不平衡性,并以降低功率损耗、改善多相电压稳定性和最大限度减少相间电压不平衡等多个目标为目标。该方法采用快速灵活的径向功率流(FFRPF)技术来模拟网络内复杂的相互作用和约束条件,从而产生一个多目标优化问题。该优化问题采用权重聚合粒子群优化(WA-PSO)方法解决,该方法是粒子群优化的一种变体,专为多目标函数量身定制。WA-PSO 利用加权聚合法将多个目标合并为一个函数,从而简化了过程。这种方法的有效性在 19、34 和 123 节点的不平衡径向配电网络 (URDN) 上得到了验证。结果表明,所有测试网络的电力输送效率都有明显改善,尤其是当 DG 和 CB 设备同时运行时。具体而言,在 19 节点、34 节点和 123 节点系统中,DG 和 CB 的集成使系统损耗分别降低了 89.90 %、88.42 % 和 86.87 %,三相电压不平衡指数分别降低了 88.75 %、81.68 % 和 39.05 %,同时将电压稳定性保持在可接受的范围内。此外,当使用微型涡轮机替代燃煤火力发电厂时,二氧化碳排放量分别减少了 52%、62% 和 53%,进一步凸显了拟议方法的环境效益。
{"title":"Multi-faceted sustainability improvement in low voltage power distribution network employing DG and capacitor bank","authors":"Pappu Kumar Saurav,&nbsp;Swapna Mansani,&nbsp;Partha Kayal","doi":"10.1016/j.compeleceng.2024.109789","DOIUrl":"10.1016/j.compeleceng.2024.109789","url":null,"abstract":"<div><div>Efficient distribution of active and reactive power in distribution networks is crucial for ensuring that consumer demand is met and that electrical power quality is maintained. This requires careful planning, particularly in terms of optimally placing and sizing distributed generator (DG) and capacitor bank (CB) units. These units play a key role in minimizing power losses and voltage fluctuations within the network. However, implementing DG and CB units in unbalanced distribution networks presents unique challenges due to inherent system unbalances. To address these challenges, this article proposes a method for allocating and sizing DG and CB units in unbalanced distribution networks. The approach accounts for the network's unbalance and targets multiple objectives, such as reducing power losses, improving multi-phase voltage stability, and minimizing phase-to-phase voltage unbalance. The fast and flexible radial power flow (FFRPF) technique is employed to model complex interactions and constraints within the network, leading to a multi-objective optimization problem. This optimization problem is solved using the weight aggregated particle swarm optimization (WA-PSO) method, a variant of particle swarm optimization tailored for multi-objective functions. WA-PSO simplifies the process by combining multiple objectives into a single function using weighted aggregation. The efficacy of this approach is validated on 19, 34, and 123-node unbalanced radial distribution networks (URDNs). The results show significant improvements in power delivery efficiency across all tested networks, especially when DG and CB units are operated simultaneously. Specifically, DG and CB integration led to a reduction in system losses by 89.90 %, 88.42 %, and 86.87 %, and a decrease in three-phase voltage unbalance indices by 88.75 %, 81.68 %, and 39.05 %, for the 19, 34, and 123-node systems, respectively, while maintaining voltage stability within acceptable limits. Additionally, CO<sub>2</sub> emissions were reduced by 52 %, 62 %, and 53 % when microturbines were utilized instead of coal-based thermal power plants, further highlighting the environmental benefits of the proposed approach.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"120 ","pages":"Article 109789"},"PeriodicalIF":4.0,"publicationDate":"2024-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142444887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Proposal automatic water purging system for machinery in high humidity environments controlled by an ECU 由 ECU 控制的用于高湿度环境中机械设备的自动水净化系统提案
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-10-16 DOI: 10.1016/j.compeleceng.2024.109775
Abdelkarim Zemmouri, Anass Barodi, Rachid Elgouri, Mohammed Benbrahim
This paper presents an advanced automatic water discharge system tailored for diesel-powered machinery, particularly for vehicles operating in diverse climates, including humid coastal regions. The system is designed to protect fuel circuits in tanks and diesel engines of boats, offering either automatic or semi-automatic protection against oxidation and corrosion. This enhancement extends the lifespan of diesel components and pipelines while simultaneously reducing maintenance costs and intervention times. Additionally, the system improves fuel purity, resulting in increased engine power and efficiency. The proposed solution was experimentally validated using an Arduino board coupled with a water-sensitive detector in diesel fuel, suitable for installation in diesel filters or tanks. Experimental findings demonstrated a remarkably swift separation time of 150 microseconds for diesel and water at a pressure of 1 bar, achieving an impressive efficiency of 99.84%. The system's rapid and effective separation capability highlights its practical value, particularly in scenarios where efficient water removal is critical to sustaining engine performance and longevity.
本文介绍了一种先进的自动排水系统,该系统专为柴油动力机械量身定制,尤其适用于在不同气候条件下运行的车辆,包括潮湿的沿海地区。该系统设计用于保护船舶油箱和柴油发动机中的燃料回路,提供自动或半自动保护,防止氧化和腐蚀。这种改进可延长柴油元件和管道的使用寿命,同时降低维护成本和干预时间。此外,该系统还能提高燃油纯度,从而增强发动机的动力和效率。我们使用 Arduino 电路板和柴油中的水敏探测器对所提出的解决方案进行了实验验证,该探测器适合安装在柴油过滤器或油箱中。实验结果表明,在 1 巴压力下,柴油和水的快速分离时间为 150 微秒,效率高达 99.84%。该系统快速有效的分离能力凸显了其实用价值,特别是在高效除水对维持发动机性能和使用寿命至关重要的情况下。
{"title":"Proposal automatic water purging system for machinery in high humidity environments controlled by an ECU","authors":"Abdelkarim Zemmouri,&nbsp;Anass Barodi,&nbsp;Rachid Elgouri,&nbsp;Mohammed Benbrahim","doi":"10.1016/j.compeleceng.2024.109775","DOIUrl":"10.1016/j.compeleceng.2024.109775","url":null,"abstract":"<div><div>This paper presents an advanced automatic water discharge system tailored for diesel-powered machinery, particularly for vehicles operating in diverse climates, including humid coastal regions. The system is designed to protect fuel circuits in tanks and diesel engines of boats, offering either automatic or semi-automatic protection against oxidation and corrosion. This enhancement extends the lifespan of diesel components and pipelines while simultaneously reducing maintenance costs and intervention times. Additionally, the system improves fuel purity, resulting in increased engine power and efficiency. The proposed solution was experimentally validated using an Arduino board coupled with a water-sensitive detector in diesel fuel, suitable for installation in diesel filters or tanks. Experimental findings demonstrated a remarkably swift separation time of 150 microseconds for diesel and water at a pressure of 1 bar, achieving an impressive efficiency of 99.84%. The system's rapid and effective separation capability highlights its practical value, particularly in scenarios where efficient water removal is critical to sustaining engine performance and longevity.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"120 ","pages":"Article 109775"},"PeriodicalIF":4.0,"publicationDate":"2024-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142441718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Corrigendum to “Intelligent hybrid energy system and grid integration using microcontrollers” [Computers and Electrical Engineering, Volume 110, September 2023, 108873] 使用微控制器的智能混合能源系统和电网集成》更正[《计算机与电气工程》,第 110 卷,2023 年 9 月,108873]
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-10-15 DOI: 10.1016/j.compeleceng.2024.109772
Majid Ali , Mohsin Ali Koondhar , Jyotsna Ogale , Ahmed Ali , Baseem Khan
{"title":"Corrigendum to “Intelligent hybrid energy system and grid integration using microcontrollers” [Computers and Electrical Engineering, Volume 110, September 2023, 108873]","authors":"Majid Ali ,&nbsp;Mohsin Ali Koondhar ,&nbsp;Jyotsna Ogale ,&nbsp;Ahmed Ali ,&nbsp;Baseem Khan","doi":"10.1016/j.compeleceng.2024.109772","DOIUrl":"10.1016/j.compeleceng.2024.109772","url":null,"abstract":"","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"120 ","pages":"Article 109772"},"PeriodicalIF":4.0,"publicationDate":"2024-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142433321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Steering authority allocation strategy for human-machine shared control based on driver take-over feasibility 基于驾驶员接管可行性的人机共享控制转向权限分配策略
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-10-15 DOI: 10.1016/j.compeleceng.2024.109753
Chengrui Su , Haohan Yang , Jie Li , Xiaodong Wu
Misoperation when a driver is distracted, e.g., turning the steering wheel unconsciously, preventing the machine from turning the steering wheel, etc., can lead to a false take-over of the vehicle, which poses a danger to shared control. Therefore, it is essential to evaluate the feasibility of driver take-over in distraction status. This paper proposes a steering authority allocation strategy based on driver take-over feasibility to reduce the interference of distracted driver behavior on shared control. First, a driver take-over feasibility framework is established based on quantified driver distraction levels and take-over intention. Then the shared control system is established based on a linear parameter-varying vehicle model and non-cooperative game theory to suppress the interference of time-varying speed and parameter uncertainty on shared control. Subsequently, the steering authority allocation strategy is constructed in conjunction with driver take-over feasibility and environmental risk evaluation. The proposed sigmoid-based mapping function ensures fast and smooth authority allocation. Finally, a series of driver-in-the-loop experiments are conducted to validate the effectiveness of our proposed strategy across various driving scenarios, and the results demonstrate that our strategy has superior performance than other advanced shared control schemes in reducing steering burden, improving driving safety, and enhancing vehicle stability, etc.
驾驶员分心时的错误操作,如无意识转动方向盘、阻止机器转动方向盘等,会导致错误接管车辆,从而给共享控制带来危险。因此,评估分心状态下驾驶员接管的可行性至关重要。本文提出了一种基于驾驶员接管可行性的转向权限分配策略,以减少驾驶员分心行为对共享控制的干扰。首先,根据量化的驾驶员分心程度和接管意图,建立驾驶员接管可行性框架。然后,基于线性参数变化车辆模型和非合作博弈论建立共享控制系统,以抑制时变速度和参数不确定性对共享控制的干扰。随后,结合驾驶员接管可行性和环境风险评估,构建了转向权限分配策略。所提出的基于 sigmoid 的映射函数确保了快速平稳的权限分配。最后,我们进行了一系列驾驶员在环实验,以验证我们提出的策略在各种驾驶场景下的有效性,结果表明,与其他先进的共享控制方案相比,我们的策略在减轻转向负担、提高驾驶安全性和增强车辆稳定性等方面具有更优越的性能。
{"title":"Steering authority allocation strategy for human-machine shared control based on driver take-over feasibility","authors":"Chengrui Su ,&nbsp;Haohan Yang ,&nbsp;Jie Li ,&nbsp;Xiaodong Wu","doi":"10.1016/j.compeleceng.2024.109753","DOIUrl":"10.1016/j.compeleceng.2024.109753","url":null,"abstract":"<div><div>Misoperation when a driver is distracted, e.g., turning the steering wheel unconsciously, preventing the machine from turning the steering wheel, etc., can lead to a false take-over of the vehicle, which poses a danger to shared control. Therefore, it is essential to evaluate the feasibility of driver take-over in distraction status. This paper proposes a steering authority allocation strategy based on driver take-over feasibility to reduce the interference of distracted driver behavior on shared control. First, a driver take-over feasibility framework is established based on quantified driver distraction levels and take-over intention. Then the shared control system is established based on a linear parameter-varying vehicle model and non-cooperative game theory to suppress the interference of time-varying speed and parameter uncertainty on shared control. Subsequently, the steering authority allocation strategy is constructed in conjunction with driver take-over feasibility and environmental risk evaluation. The proposed sigmoid-based mapping function ensures fast and smooth authority allocation. Finally, a series of driver-in-the-loop experiments are conducted to validate the effectiveness of our proposed strategy across various driving scenarios, and the results demonstrate that our strategy has superior performance than other advanced shared control schemes in reducing steering burden, improving driving safety, and enhancing vehicle stability, etc.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"120 ","pages":"Article 109753"},"PeriodicalIF":4.0,"publicationDate":"2024-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142441712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Corrigendum to “Maximum power point tracking for grid-connected photovoltaic system using Adaptive Fuzzy Logic Controller” [Computers and Electrical Engineering, Volume 110, September 2023, 108879] 利用自适应模糊逻辑控制器实现并网光伏系统的最大功率点跟踪"[《计算机与电气工程》,第 110 卷,2023 年 9 月,108879] 更正
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-10-15 DOI: 10.1016/j.compeleceng.2024.109773
Majid Ali , Mujtaba Ahmad , Mohsin Ali Koondhar , Muhammad Sarfraz Akram , Aanchal Verma , Baseem Khan
{"title":"Corrigendum to “Maximum power point tracking for grid-connected photovoltaic system using Adaptive Fuzzy Logic Controller” [Computers and Electrical Engineering, Volume 110, September 2023, 108879]","authors":"Majid Ali ,&nbsp;Mujtaba Ahmad ,&nbsp;Mohsin Ali Koondhar ,&nbsp;Muhammad Sarfraz Akram ,&nbsp;Aanchal Verma ,&nbsp;Baseem Khan","doi":"10.1016/j.compeleceng.2024.109773","DOIUrl":"10.1016/j.compeleceng.2024.109773","url":null,"abstract":"","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"120 ","pages":"Article 109773"},"PeriodicalIF":4.0,"publicationDate":"2024-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142433320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Landscape of learning techniques for intrusion detection system in IoT: A systematic literature review 物联网入侵检测系统学习技术的前景:系统性文献综述
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-10-15 DOI: 10.1016/j.compeleceng.2024.109725
Amina Khacha , Zibouda Aliouat , Yasmine Harbi , Chirihane Gherbi , Rafika Saadouni , Saad Harous
The IoT has interconnected devices that collaborate via the Internet. Yet, its widespread connectivity and data generation pose cybersecurity risks. Integrating robust intrusion detection systems (IDSs) into the architecture has become crucial. IDSs safeguard data, detect attacks, and ensure network security and privacy. Constructing anomaly-based intrusion detection systems using artificial intelligence methods, often termed learning techniques, has gained significant traction lately. In this context, this study undertakes a systematic literature review to comprehensively analyze the current landscape of research concerning IoT security, explicitly employing learning techniques. These techniques fall under four primary categories: machine learning, deep learning, transfer learning, and federated learning. From a pool of 646 papers published between 2018 and 2023, we have selected 36 papers encompassing all these techniques based on the keywords of the study. These chosen studies were then categorized based on their respective learning techniques, with an additional hybrid classification that combines federated learning and transfer learning. Moreover, the paper provides a comparative analysis of the studied articles across different dimensions. The research outcomes demonstrate the effectiveness of each learning technique, shed light on the datasets and metrics employed, and conclude with a discussion on open challenges and future recommendations in this domain
物联网通过互联网将设备相互连接并进行协作。然而,其广泛的连接性和数据生成带来了网络安全风险。在架构中集成强大的入侵检测系统(IDS)已变得至关重要。IDS 可保护数据、检测攻击并确保网络安全和隐私。最近,利用人工智能方法(通常称为学习技术)构建基于异常的入侵检测系统受到了广泛关注。在此背景下,本研究通过系统的文献综述,全面分析了当前明确采用学习技术的物联网安全研究的现状。这些技术主要分为四类:机器学习、深度学习、迁移学习和联合学习。从 2018 年至 2023 年间发表的 646 篇论文中,我们根据研究关键词选出了 36 篇包含所有这些技术的论文。然后,我们根据各自的学习技术对这些被选中的研究进行了分类,并结合联合学习和迁移学习进行了额外的混合分类。此外,本文还对所研究的文章进行了不同维度的比较分析。研究成果证明了每种学习技术的有效性,阐明了所使用的数据集和衡量标准,最后还讨论了该领域的挑战和未来建议。
{"title":"Landscape of learning techniques for intrusion detection system in IoT: A systematic literature review","authors":"Amina Khacha ,&nbsp;Zibouda Aliouat ,&nbsp;Yasmine Harbi ,&nbsp;Chirihane Gherbi ,&nbsp;Rafika Saadouni ,&nbsp;Saad Harous","doi":"10.1016/j.compeleceng.2024.109725","DOIUrl":"10.1016/j.compeleceng.2024.109725","url":null,"abstract":"<div><div>The IoT has interconnected devices that collaborate via the Internet. Yet, its widespread connectivity and data generation pose cybersecurity risks. Integrating robust intrusion detection systems (IDSs) into the architecture has become crucial. IDSs safeguard data, detect attacks, and ensure network security and privacy. Constructing anomaly-based intrusion detection systems using artificial intelligence methods, often termed learning techniques, has gained significant traction lately. In this context, this study undertakes a systematic literature review to comprehensively analyze the current landscape of research concerning IoT security, explicitly employing learning techniques. These techniques fall under four primary categories: machine learning, deep learning, transfer learning, and federated learning. From a pool of 646 papers published between 2018 and 2023, we have selected 36 papers encompassing all these techniques based on the keywords of the study. These chosen studies were then categorized based on their respective learning techniques, with an additional hybrid classification that combines federated learning and transfer learning. Moreover, the paper provides a comparative analysis of the studied articles across different dimensions. The research outcomes demonstrate the effectiveness of each learning technique, shed light on the datasets and metrics employed, and conclude with a discussion on open challenges and future recommendations in this domain</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"120 ","pages":"Article 109725"},"PeriodicalIF":4.0,"publicationDate":"2024-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142438379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Artificial neural network based decentralized current-sharing control for parallel connected DC-DC converters in DC microgrid application 直流微电网应用中基于人工神经网络的并联直流-直流转换器分散分流控制
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-10-14 DOI: 10.1016/j.compeleceng.2024.109731
Musharraf Ali Saddriwala, Mohd Alam
To create a non-interrupted, economical and reliable direct current (DC) microgrid, multiple DC-DC converters can be connected in parallel. Current sharing among these multiple converters becomes essential for proper operation of the system. This study proposes an artificial neural network (ANN) based control technique for parallel connected DC-DC boost converters which ensures accurate current sharing according to the specified maximum limits. Levenberg-Marquardt algorithm-based ANN network is used to reduce the training time and, also to achieve near ≈ 100 % accuracy of the training data. ANN control provides better voltage regulation, accurate current sharing unlike the conventional proportional-integral (PI) based control which faces issues such as inaccurate current sharing, high transient, peak overshoots and steady state error during sudden change in the system. The efficient functioning of the proposed control method is verified by simulating two parallel connected DC-DC converters using MATLAB/Simulink. A hardware prototype of converters rating ≈ 250 W using TMS320F28379D Digital signal processor controller is also developed to verify the performance and effectiveness of the ANN based control in comparison to PI based technique. The ANN based technique is faster to achieve the reference voltage, and the peak overshoot is approximately 75 % lesser than the PI based control.
为了创建一个不间断、经济可靠的直流(DC)微电网,可以并联多个直流-直流转换器。这些多个转换器之间的电流共享对系统的正常运行至关重要。本研究针对并联的直流-直流升压转换器提出了一种基于人工神经网络(ANN)的控制技术,可确保按照指定的最大限制精确分流。基于 Levenberg-Marquardt 算法的 ANN 网络可缩短训练时间,并使训练数据的准确率接近 ≈ 100%。与传统的基于比例-积分(PI)的控制不同,ANN 控制可提供更好的电压调节和精确的电流分担,而传统的比例-积分(PI)控制则面临着电流分担不精确、瞬态高、峰值过冲以及系统突变时的稳态误差等问题。通过使用 MATLAB/Simulink 对两个并联的 DC-DC 转换器进行仿真,验证了所提出的控制方法的高效运作。此外,还使用 TMS320F28379D 数字信号处理器控制器开发了额定功率≈250 W 的转换器硬件原型,以验证基于 ANN 的控制与基于 PI 的技术相比的性能和有效性。基于 ANN 的技术实现参考电压的速度更快,峰值过冲比基于 PI 的控制少约 75%。
{"title":"Artificial neural network based decentralized current-sharing control for parallel connected DC-DC converters in DC microgrid application","authors":"Musharraf Ali Saddriwala,&nbsp;Mohd Alam","doi":"10.1016/j.compeleceng.2024.109731","DOIUrl":"10.1016/j.compeleceng.2024.109731","url":null,"abstract":"<div><div>To create a non-interrupted, economical and reliable direct current (DC) microgrid, multiple DC-DC converters can be connected in parallel. Current sharing among these multiple converters becomes essential for proper operation of the system. This study proposes an artificial neural network (ANN) based control technique for parallel connected DC-DC boost converters which ensures accurate current sharing according to the specified maximum limits. Levenberg-Marquardt algorithm-based ANN network is used to reduce the training time and, also to achieve near ≈ 100 % accuracy of the training data. ANN control provides better voltage regulation, accurate current sharing unlike the conventional proportional-integral (PI) based control which faces issues such as inaccurate current sharing, high transient, peak overshoots and steady state error during sudden change in the system. The efficient functioning of the proposed control method is verified by simulating two parallel connected DC-DC converters using MATLAB/Simulink. A hardware prototype of converters rating ≈ 250 W using TMS320F28379D Digital signal processor controller is also developed to verify the performance and effectiveness of the ANN based control in comparison to PI based technique. The ANN based technique is faster to achieve the reference voltage, and the peak overshoot is approximately 75 % lesser than the PI based control.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"120 ","pages":"Article 109731"},"PeriodicalIF":4.0,"publicationDate":"2024-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142437854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computers & Electrical Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1