IEEE Access最新文献

筛选
英文 中文
An Interpretable Combined Forecasting Method for Stock Market Based on Fuzzy Time Series Model and Linear-Trend Fuzzy Information Granulation 基于模糊时间序列模型和线性趋势模糊信息粒化的可解释性股票市场组合预测方法
IF 3.4 3区 计算机科学
IEEE Access Pub Date : 2025-04-24 DOI: 10.1109/ACCESS.2025.3564135
Jindong Feng;Zengtai Gong
{"title":"An Interpretable Combined Forecasting Method for Stock Market Based on Fuzzy Time Series Model and Linear-Trend Fuzzy Information Granulation","authors":"Jindong Feng;Zengtai Gong","doi":"10.1109/ACCESS.2025.3564135","DOIUrl":"https://doi.org/10.1109/ACCESS.2025.3564135","url":null,"abstract":"Stock market forecasting demands models that balance high accuracy with interpretability, particularly when handling highly volatile and uncertain data. This study introduces a novel interpretable forecasting framework that integrates the Fuzzy Time Series (FTS) model with the Linear Fuzzy Information Granule (LFIG) method. The proposed model addresses two major limitations: the inability of conventional FTS models to effectively capture trend dynamics, and the limited capacity of the LFIG method to account for the influence of recent data. The core contributions of this work are threefold: 1) a variable-sized interval partitioning technique optimized via fuzzy C-means clustering and the principle of justifiable granularity, achieving adaptive data segmentation that balances coverage and specificity; 2) a trend extraction mechanism based on LFIG approach, which applies time-dependent linear functions within sliding windows to quantify short-term trends and associated uncertainties; and 3) a fusion of FTS and LFIG outputs via the ordered weighted averaging operator, which emphasizes trend-consistent predictions to enhance forecasting accuracy. Experimental evaluation on five benchmark datasets from Yahoo Finance demonstrates that the proposed model outperforms eight state-of-the-art forecasting methods in terms of predictive performance. Furthermore, it maintains interpretability through transparent fuzzy rules and explicit trend representations, providing a robust and explainable framework for stock market forecasting.","PeriodicalId":13079,"journal":{"name":"IEEE Access","volume":"13 ","pages":"73722-73734"},"PeriodicalIF":3.4,"publicationDate":"2025-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10975817","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143896348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Where the Women Are: Gender Imbalance in Computing and Faculty Perceptions of Theoretical and Applied Research 女性在哪里:计算机领域的性别失衡和教师对理论和应用研究的看法
IF 3.4 3区 计算机科学
IEEE Access Pub Date : 2025-04-24 DOI: 10.1109/ACCESS.2025.3564170
Samantha Kleinberg;Jessecae K. Marsh
{"title":"Where the Women Are: Gender Imbalance in Computing and Faculty Perceptions of Theoretical and Applied Research","authors":"Samantha Kleinberg;Jessecae K. Marsh","doi":"10.1109/ACCESS.2025.3564170","DOIUrl":"https://doi.org/10.1109/ACCESS.2025.3564170","url":null,"abstract":"Women remain under-represented in academic science, and this is especially true in computing. While there is limited research on gender differences in research focus, there is evidence that women may be more likely to conduct applied research. We surveyed tenured and tenure-track faculty in the United States to understand perceptions of hypothetical researchers who engage in applied or theoretical work. Faculty rated researchers engaged in applied research as less likely to publish their work, receive tenure/be promoted, obtain awards, and get funding for their work. Faculty further rated these researchers as less brilliant, creative, and technically skilled than they rated their theory-focused counterparts. Data from publications, hiring, funding, and awards suggests that applied research may indeed lead to worse career outcomes. We further show that women are more highly represented in applied research areas than theoretical ones. Negative perceptions of applied researchers must now be addressed to avoid exacerbating the gender gap.","PeriodicalId":13079,"journal":{"name":"IEEE Access","volume":"13 ","pages":"73520-73529"},"PeriodicalIF":3.4,"publicationDate":"2025-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10975775","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143896555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A DFT-Based Scheme for PAPR Reduction in SR-OFDM Systems 基于dft的SR-OFDM系统PAPR降低方案
IF 3.4 3区 计算机科学
IEEE Access Pub Date : 2025-04-24 DOI: 10.1109/ACCESS.2025.3564160
Haojia Lv
{"title":"A DFT-Based Scheme for PAPR Reduction in SR-OFDM Systems","authors":"Haojia Lv","doi":"10.1109/ACCESS.2025.3564160","DOIUrl":"https://doi.org/10.1109/ACCESS.2025.3564160","url":null,"abstract":"This paper focuses on the peak-to-average power ratio (PAPR) reduction in symbol repetition-based orthogonal frequency division multiplexing (SR-OFDM) systems, and a discrete Fourier transform (DFT)-based scheme is proposed to reduce the PAPR of SR-OFDM signals. It is demonstrated that an SR-OFDM system exhibits a larger PAPR than a classical orthogonal frequency division multiplexing (OFDM) system because of the signal superposition of multiple branches, although the cyclic prefix (CP) overhead can be reduced in SR-OFDM systems. Besides, it is shown that the high PAPR is mainly because of the inverse DFT operation at the SR-OFDM transmitter. Therefore, a DFT-based scheme is proposed in this paper to compensate for the inverse DFT operation, without requiring side information or causing signal distortion. To verify the proposed scheme, a theoretical analysis is provided for the signal characteristics, and simulation results of the complementary cumulative distribution function are also given, together with the bit error ratio.","PeriodicalId":13079,"journal":{"name":"IEEE Access","volume":"13 ","pages":"72930-72937"},"PeriodicalIF":3.4,"publicationDate":"2025-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10975283","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143896556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Density Peaks Clustering Algorithm Based on Neighborhood Radius and Membership Degree 基于邻域半径和隶属度的密度峰聚类算法
IF 3.4 3区 计算机科学
IEEE Access Pub Date : 2025-04-24 DOI: 10.1109/ACCESS.2025.3563990
Fuxiang Li;Tingting Jiang;Jia Wei;Shu Li;Yunxiao Shan
{"title":"Density Peaks Clustering Algorithm Based on Neighborhood Radius and Membership Degree","authors":"Fuxiang Li;Tingting Jiang;Jia Wei;Shu Li;Yunxiao Shan","doi":"10.1109/ACCESS.2025.3563990","DOIUrl":"https://doi.org/10.1109/ACCESS.2025.3563990","url":null,"abstract":"The density peaks clustering (DPC) algorithm is a density-based clustering method that effectively identifies clusters with uniform densities. However, if the datasets have uneven density, clusters with lower densities tend to have lower decision values, which often leads to the cluster centers being overlooked. To address this limitation, a novel density peaks clustering algorithm incorporating neighborhood radius and membership degree is proposed. The method begins by introducing k-nearest neighbor density estimation to establish a density threshold, segmenting datasets into high-density and low-density regions. In the high-density region, the DPC algorithm is applied to perform initial clustering, identifying prominent cluster structures. For low-density points, neighborhood radius and density criteria are employed to assign these points to appropriate high-density clusters, thereby reducing misclassification. In addition, the membership degree concept is incorporated to improve the accuracy of low-density point assignments. Low-density points that remain unassigned undergo secondary clustering using the DPC algorithm. The proposed approach is evaluated on eight synthetic datasets and eleven real-world datasets, with comparisons to DPC-KNN, DPC, K-means, and DBSCAN. The experimental results demonstrate that the proposed algorithm consistently outperforms these methods in clustering performance, highlighting its effectiveness and robustness.","PeriodicalId":13079,"journal":{"name":"IEEE Access","volume":"13 ","pages":"72329-72346"},"PeriodicalIF":3.4,"publicationDate":"2025-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10975780","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143896256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data-Driven Posture Control of Tensegrity Manipulator Based on Strut’s Inclination Angle 基于支撑倾角的张拉整体机械臂数据驱动姿态控制
IF 3.4 3区 计算机科学
IEEE Access Pub Date : 2025-04-23 DOI: 10.1109/ACCESS.2025.3563756
Kazuki Wada;Yuhei Yoshimitsu;Tufail Ahmad Bhat;Shuhei Ikemoto
{"title":"Data-Driven Posture Control of Tensegrity Manipulator Based on Strut’s Inclination Angle","authors":"Kazuki Wada;Yuhei Yoshimitsu;Tufail Ahmad Bhat;Shuhei Ikemoto","doi":"10.1109/ACCESS.2025.3563756","DOIUrl":"https://doi.org/10.1109/ACCESS.2025.3563756","url":null,"abstract":"Tensegrity structures have been utilised in soft robotics due to their flexible and lightweight nature. However, unlike traditional robots, these structures lack joint angles, which makes it challenging to use conventional angle sensors, and thus estimating the posture of the robot remains a challenge. To overcome this, we propose a data-driven approach for posture control of a redundant tensegrity manipulator using inclination angles of all struts, these angles are calculated relative to the gravitational direction. Specifically, we train a simple feedforward neural network (NN) to approximate a mapping from the inclination angles to the control inputs with a conditioning layer-wise averaged pressures. This network acts as a posture controller, mapping the desired inclination angles to the corresponding control inputs with conditioning by average pressure in the layer. The desired inclination angles corresponding to the desired posture can be obtained by demonstrating the robot in a direct teaching manner. We used the tensegrity manipulator consisting of 20 struts and 40 actuators to validate our approach. The experimental results showed that the tensegrity manipulator can reproduce the desired demonstrated postures.","PeriodicalId":13079,"journal":{"name":"IEEE Access","volume":"13 ","pages":"73785-73793"},"PeriodicalIF":3.4,"publicationDate":"2025-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10974957","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143896289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Real-Time Detection and Identification of ARP Spoofing Attacks in Microgrids 微电网中ARP欺骗攻击的实时检测与识别
IF 3.4 3区 计算机科学
IEEE Access Pub Date : 2025-04-23 DOI: 10.1109/ACCESS.2025.3563721
Kalinath Katuri;Ha Thi Nguyen;Emmanouil Anagnostou
{"title":"Real-Time Detection and Identification of ARP Spoofing Attacks in Microgrids","authors":"Kalinath Katuri;Ha Thi Nguyen;Emmanouil Anagnostou","doi":"10.1109/ACCESS.2025.3563721","DOIUrl":"https://doi.org/10.1109/ACCESS.2025.3563721","url":null,"abstract":"The integration of smart devices and advanced communication infrastructure has turned power systems into cyber-physical systems (CPS), introducing cyber vulnerabilities. One such vulnerability arises from the use of the address resolution protocol (ARP), which is commonly employed in power systems’ information technology (IT) infrastructure to assign internet protocol (IP) addresses to devices such as relays, controllers, and meters. Due to the lack of authentication in ARP, attackers can exploit it to infiltrate substation automation systems (SAS). To detect and locate ARP spoofing attacks, a novel network intrusion detection system (NIDS) was developed using Snort3, TShark, and Python scripts to monitor ARP broadcast messages. This detection method was tested on a dedicated, real-time multi-agent CPS testbed, where a microgrid is simulated as the physical layer using a real-time digital simulator (RTDS), while the cyber layer consists of a multi-agent control implemented in a graphical network simulator (GNS3) together with Raspberry Pi devices. The real-time operator’s view is developed in Grafana visualization, mimicking the real-world microgrid operation. Two common practical ARP attacks, known as man-in-the-middle (MITM) and false data injection (FDI) attacks, were conducted to evaluate the performance of the proposed NIDS method. Both MITM and FDI attacks were implemented using IT network testing tools, such as Ettercap and the Scapy library in Python. The results have shown that the proposed NIDS system can detect, localize, and publish the IP address of the attacker in both MITM and FDI attack scenarios. In addition, the impact analysis results indicated that for an identical malicious payload, the FDI attack is more severe when compared to MITM due to the intermittent nature of false data injection.","PeriodicalId":13079,"journal":{"name":"IEEE Access","volume":"13 ","pages":"72427-72441"},"PeriodicalIF":3.4,"publicationDate":"2025-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10975017","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143896505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Relationships Among e-Voting, e-Auction, e-Cheque, and e-Cash 电子投票、电子拍卖、电子支票和电子现金之间的关系
IF 3.4 3区 计算机科学
IEEE Access Pub Date : 2025-04-23 DOI: 10.1109/ACCESS.2025.3560552
Yun-Xing Kho;Swee-Huay Heng;Syh-Yuan Tan;Ji-Jian Chin
{"title":"Relationships Among e-Voting, e-Auction, e-Cheque, and e-Cash","authors":"Yun-Xing Kho;Swee-Huay Heng;Syh-Yuan Tan;Ji-Jian Chin","doi":"10.1109/ACCESS.2025.3560552","DOIUrl":"https://doi.org/10.1109/ACCESS.2025.3560552","url":null,"abstract":"This paper illustrates how a transformation technique can be used to demonstrate the relationship among e-voting, e-auction, e-cheque, and e-cash, even though they serve distinct purposes. Initially, we examine the definitions of e-cheque and e-cash schemes, along with their respective security models. Subsequently, we develop a systematic framework to transform e-cheque into e-cash, supported by formal proof demonstrating the security of the conversion. As a corollary, we further exemplify this integration with a generic transformation framework to obtain e-cash from e-voting directly by combining an existing transformation of e-voting into e-cheque and the transformation of e-cheque into e-cash which we established earlier. We apply our transformation framework to Li et al.’s transformed e-cheque scheme and Li et al.’s e-voting scheme to obtain a concrete, secure e-cash scheme that is IND-CCEA, IND-CIA, and EUF-CIA as an instance. Finally, we examine how our result contributes to the integration and relationship between e-voting, e-auction, e-cheque, and e-cash systems.","PeriodicalId":13079,"journal":{"name":"IEEE Access","volume":"13 ","pages":"71773-71791"},"PeriodicalIF":3.4,"publicationDate":"2025-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10975145","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143883350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic Mapping and 3D Perception Using Voxel Grid and Modified Artificial Potential Fields for Indoor Locomotion 基于体素网格和修正人工势场的室内运动动态映射和三维感知
IF 3.4 3区 计算机科学
IEEE Access Pub Date : 2025-04-23 DOI: 10.1109/ACCESS.2025.3563484
Trihastuti Agustinah;Yurid Eka Nugraha;Aqil Rabbani Nurhadi;Vincentius Charles Maynad
{"title":"Dynamic Mapping and 3D Perception Using Voxel Grid and Modified Artificial Potential Fields for Indoor Locomotion","authors":"Trihastuti Agustinah;Yurid Eka Nugraha;Aqil Rabbani Nurhadi;Vincentius Charles Maynad","doi":"10.1109/ACCESS.2025.3563484","DOIUrl":"https://doi.org/10.1109/ACCESS.2025.3563484","url":null,"abstract":"This paper proposes an advanced 3D indoor navigation system for a mobile robot. The proposed method integrates RTAB-Map with Voxel Grid Filters and Joint Probabilistic Data Association (JPDA) to generate surrounding environment map efficiency. Additionally, the local path planner combines pure pursuit with a modified Artificial Potential Field (APF) method to improve navigation capability. It generates steering commands and desired velocities and adjusts the attractive potential force equation to maintain balance and operational efficiency. This modification improves safety, pedestrian avoidance, and comfort by minimizing unnecessary rotations while ensuring smooth navigation. The proposed system improves the locomotion ability by reducing roll, pitch, and yaw fluctuations by approximately 30% compared to traditional APF methods. Voxel grid filtering enhances computational efficiency, reducing processing time per iteration by up to 73% - from 0.247 seconds (raw LiDAR) to 0.067 seconds (voxel size of 0.9) - while maintaining obstacle detection accuracy. The integration of JPDA ensures safe multi-target detection, with minimum safe distances of 0.94 meters from dynamic actors and a Threat Level Index (TLI) peaking at 0.24. In a scenario comparing two robots with different map knowledge, the robot with map knowledge reached the waypoint 20% faster, following an efficient path. However, despite lacking prior knowledge, the second robot reached the waypoint, demonstrating the system’s adaptability. These quantitative results confirm the proposed method’s capability to enhance safety, efficiency, and human comfort, making it suitable for real-time indoor navigation in dynamic environments.","PeriodicalId":13079,"journal":{"name":"IEEE Access","volume":"13 ","pages":"71288-71305"},"PeriodicalIF":3.4,"publicationDate":"2025-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10974978","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143888398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing Privacy in IoT Networks: A Comparative Analysis of Classification and Defense Methods 增强物联网网络中的隐私:分类与防御方法的比较分析
IF 3.4 3区 计算机科学
IEEE Access Pub Date : 2025-04-23 DOI: 10.1109/ACCESS.2025.3563799
Ahmet Emre Ergun;Ozgu Can;Murat Kantarcioglu
{"title":"Enhancing Privacy in IoT Networks: A Comparative Analysis of Classification and Defense Methods","authors":"Ahmet Emre Ergun;Ozgu Can;Murat Kantarcioglu","doi":"10.1109/ACCESS.2025.3563799","DOIUrl":"https://doi.org/10.1109/ACCESS.2025.3563799","url":null,"abstract":"The rapid proliferation of Internet of Things (IoT) devices has led to a substantial increase in network packet traffic, raising significant privacy concerns. Although traffic encryption is employed to protect the privacy of IoT devices, attackers can still leverage Machine Learning (ML) and Deep Learning (DL) techniques to classify device types by analyzing packet characteristics, such as size and timing. The main challenges in the state of the art are the lack of effective methods for exposing privacy violations in encrypted IoT traffic, and the absence of robust defense mechanisms to mitigate privacy breaches caused by network traffic analysis. Considering these challenges, this study presents two key contributions: (i) a novel vector-based classification method that enhances device-type identification from encrypted IoT traffic using advanced ML and DL techniques, and (ii) a robust defense mechanism based on Differential Privacy (DP) and advanced padding techniques against traffic analysis attacks. Therefore, the study examines privacy risks associated with sequential IoT device data and evaluates the effectiveness of ML algorithms using two datasets. The results demonstrate that the proposed vector-based classification method significantly improves the attacker’s classification accuracy, even when privacy-preserving techniques, such as padding, are used to obscure device-type classification. For this purpose, the study evaluates eXtreme Gradient Boosting (XGBoost), Long Short-Term Memory (LSTM), and Gated Recurrent Unit (GRU) for IoT traffic classification, achieving an accuracy rate of 99.61% with XGBoost, 96.74% with LSTM, and 96.94% with GRU. Additionally, the Decision Tree (DT), Random Forest (RF), k-Nearest Neighbors (kNN), and GRU classification algorithms are also evaluated and compared with the XGBoost and LSTM classifiers for the proposed attack model. As a defense mechanism, DP is applied using the Fourier Perturbation Algorithm (FPA) to optimize padding strategies while maintaining network efficiency. A comparative analysis with state of the art padding techniques, including Adaptive Packet Padding (APP), and the proposed DP-based defense mechanism demonstrates that the proposed defense approach achieves a superior privacy-utility balance. The findings reveal that while padding techniques reduce classification accuracy, the novel vector method significantly enhances attack performance, underscoring the need for stronger defense strategies. Consequently, this study addresses a critical gap in the literature by providing a comprehensive evaluation of privacy risks, classification robustness, and the effectiveness of DP-based defense in IoT network traffic. Thus, the proposed research provides practical insights for enhancing privacy preservation while maintaining network performance, thereby contributing to the development of more secure IoT communication frameworks.","PeriodicalId":13079,"journal":{"name":"IEEE Access","volume":"13 ","pages":"71611-71646"},"PeriodicalIF":3.4,"publicationDate":"2025-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10974975","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143888431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Common-Ground Bridgeless Unity Power Factor Single-Phase Rectifier 共地无桥统一功率因数单相整流器
IF 3.4 3区 计算机科学
IEEE Access Pub Date : 2025-04-23 DOI: 10.1109/ACCESS.2025.3563831
Ivo Barbi;Hugo Rolando Estofanero Larico
{"title":"Common-Ground Bridgeless Unity Power Factor Single-Phase Rectifier","authors":"Ivo Barbi;Hugo Rolando Estofanero Larico","doi":"10.1109/ACCESS.2025.3563831","DOIUrl":"https://doi.org/10.1109/ACCESS.2025.3563831","url":null,"abstract":"A common AC and DC ground bridgeless power converter topology is presented that performs the near-unity power factor function with low harmonic distortion of a single-phase rectifier with sinusoidal input line voltage. The operation principle and design-oriented analysis are presented, along with the transfer functions and closed-loop input current control strategy. A non-optimized experimental prototype was developed and tested in the laboratory to validate the operating principle and the results of theoretical analysis. The distinctive feature of the proposed rectifier is that it eliminates the leakage current that circulates through the parasitic capacitances existing between the power semiconductor and heatsink, which causes common-mode electromagnetic interference in conventional boost-based PFC rectifiers.","PeriodicalId":13079,"journal":{"name":"IEEE Access","volume":"13 ","pages":"72269-72278"},"PeriodicalIF":3.4,"publicationDate":"2025-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10974977","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143896234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信