Sivakumar Sangeetha, J. Logeshwaran, Muhammad Faheem, R. Kannadasan, Suganthi Sundararaju, Loganathan Vijayaraja
{"title":"Smart performance optimization of energy‐aware scheduling model for resource sharing in 5G green communication systems","authors":"Sivakumar Sangeetha, J. Logeshwaran, Muhammad Faheem, R. Kannadasan, Suganthi Sundararaju, Loganathan Vijayaraja","doi":"10.1049/tje2.12358","DOIUrl":"https://doi.org/10.1049/tje2.12358","url":null,"abstract":"This paper presents an analysis of the performance of the Energy Aware Scheduling Algorithm (EASA) in a 5G green communication system. 5G green communication systems rely on EASA to manage resource sharing. The aim of the proposed model is to improve the efficiency and energy consumption of resource sharing in 5G green communication systems. The main objective is to address the challenges of achieving optimal resource utilization and minimizing energy consumption in these systems. To achieve this goal, the study proposes a novel energy‐aware scheduling model that takes into consideration the specific characteristics of 5G green communication systems. This model incorporates intelligent techniques for optimizing resource allocation and scheduling decisions, while also considering energy consumption constraints. The methodology used involves a combination of mathematical analysis and simulation studies. The mathematical analysis is used to formulate the optimization problem and design the scheduling model, while the simulations are used to evaluate its performance in various scenarios. The proposed EASM reached a 91.58% false discovery rate, a 64.33% false omission rate, a 90.62% prevalence threshold, and a 91.23% critical success index. The results demonstrate the effectiveness of the proposed model in terms of reducing energy consumption while maintaining a high level of resource utilization.","PeriodicalId":22858,"journal":{"name":"The Journal of Engineering","volume":"28 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139965809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Integration of wind farm, energy storage and demand response for optimum management of generation and carbon emission","authors":"Kasra Shafiei, M. Tarafdar Hagh, Ali Seifi","doi":"10.1049/tje2.12348","DOIUrl":"https://doi.org/10.1049/tje2.12348","url":null,"abstract":"The optimal operation of power systems is one of the most critical issues for operators. Optimizing the operation of power systems while accommodating the increasing penetration of RES, owing to the intermittent and variable nature of these resources, stands as one of the most critical challenges for power systems. Numerous primary challenges, including fluctuations in load and nonlinear constraints, further complicate the issue, given its substantial dimensions. Therefore, this paper introduces an approach for improving the management of optimal generation and the associated carbon emissions costs of traditional power plants, which is achieved through integrating wind farms and incorporating battery energy storage. This enhancement is achieved by integrating wind farms and utilizing battery storage systems while considering the costs associated with traditional units using fossil fuels and the expenses related to carbon emissions. The simulation incorporates seven load customer types and five traditional generation sources integrated with wind farms and battery storage devices. The simulation results demonstrate that the new problem formulation has significantly improved the ability and performance of optimizing the scheduling of power plant generations.","PeriodicalId":22858,"journal":{"name":"The Journal of Engineering","volume":"51 8","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139634359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An integrated fuse information fusion method for infrared imaging detector and range finder based on improved particle filter","authors":"Daozhi Wei, Ning Li, Junwei Li","doi":"10.1049/tje2.12351","DOIUrl":"https://doi.org/10.1049/tje2.12351","url":null,"abstract":"Aiming at the traditional integrated fuse information fusion method that cannot simultaneously obtain high‐precision burst control parameters such as burst delay time, azimuth angle, and detection angle, the infrared imaging detector and range finder information fusion method based on particle filtering with BAS algorithm is proposed. Under the centralized information fusion structure that can obtain higher accuracy, first, use a faster linear interpolation method to realize the time alignment of the two asynchronous sensors. Second, for the strong non‐linear observation model in the missile target rendezvous model, use a particle filter framework that is not affected by the nonlinearity of the system function and non‐gaussian noise. Finally, Utilizing the single search BAS algorithm with low computational complexity to solve the problem of particle degradation in particle filtering and improve the accuracy of burst control. The experiment shows that in a typical simulation environment, the optimized information fusion method improves the burst delay time accuracy by 61.82%, azimuth accuracy by 66.28%, detection angle accuracy by 36.15%, and simulation time is shorter compared to traditional methods.","PeriodicalId":22858,"journal":{"name":"The Journal of Engineering","volume":"25 41","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139631727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Anton Abramovych, I. Zaitsev, Volodymyr Piddubnyi, V. Bereznychenko
{"title":"Application of the support vector machines method for metal analyse by an eddy current system","authors":"Anton Abramovych, I. Zaitsev, Volodymyr Piddubnyi, V. Bereznychenko","doi":"10.1049/tje2.12346","DOIUrl":"https://doi.org/10.1049/tje2.12346","url":null,"abstract":"The eddy current method of control analyzed and the possibility of its use for the identification of metals and alloys substantiated. It is shown that this can be done by modernizing the eddy current radio engineering system with dynamic scanning of metal samples, which consists in the use of modern microcontrollers with high‐precision ADC operation. The structural of the modernized system is presented, some aspects of processing the received response signal are considered, which made it possible to highlight the information coefficients that would represent the metal or alloy as a generalized image. It is proposed to use machine learning methods to compare an unknown sample of a metal or alloy under study with those available in the collected database, which is shown on the example of the support vector machine method, which allows for real‐time identification of metals and alloys, to carry out express control, without human intervention in the identification process.","PeriodicalId":22858,"journal":{"name":"The Journal of Engineering","volume":"62 S1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139640087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Nonpilot directional protection of a microgrid","authors":"Ardavan Mohammadhassani, A. Mehrizi‐Sani","doi":"10.1049/tje2.12334","DOIUrl":"https://doi.org/10.1049/tje2.12334","url":null,"abstract":"Protection of an islanded inverter‐based microgrid is challenging because of variable and small fault current contribution of inverter‐based resources (IBR) and the absence of sequence currents. This paper proposes a fast and robust nonpilot directional protection scheme to address this challenge. This scheme relies on support vector machines (SVM) and the harmonic current injection capability of IBRs. Examining the harmonic currents measured by a relay during a fault shows that harmonic currents have similar magnitudes but different orientation under forward and reverse faults. Additionally, harmonic currents have similar orientation but different magnitudes under forward faults at different locations along the protected line. Using this, six SVMs are trained for each relay, given that there are three main types of faults (three‐phase‐to‐ground, line‐to‐line, and line‐to‐ground): three as directional elements and three as zone detection elements. A fault is detected and classified by the undervoltage element of a relay. Then, the measured harmonic currents are routed to the appropriate directionality and zone detection SVMs to facilitate proper relay coordination. The performance of the proposed method is evaluated on the CIGRE North American MV distribution benchmark system under various types of contingency scenarios using PSCAD/EMTDC software.","PeriodicalId":22858,"journal":{"name":"The Journal of Engineering","volume":"9 48","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138623889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel blind detection algorithm for successive interference cancellation in non‐orthogonal multiple access system","authors":"Jia Liu, Hao Zhang, Bo Wang","doi":"10.1049/tje2.12339","DOIUrl":"https://doi.org/10.1049/tje2.12339","url":null,"abstract":"This paper considers a Non‐Orthogonal Multiple Access (NOMA) network, in which base station transmits a data packet by multi‐user superposition to a destination. In this system, Successive Interference Cancellation (SIC) receiver is used to eliminate the co‐channel interference. Some physical layer parameters, such as modulation order and precoding matrix indicator (PMI), are required for the SIC receiver to separate the overlapped signals. However, an abundance of parameters would bring a large number of signalling overhead. To reduce the signalling overhead, some of these parameters can be blindly detected instead of signalling notification. To detect these kinds of parameters, a novel blind detection algorithm is proposed in this paper. Firstly, feature extraction based on wavelet cluster is introduced to obtain feature information from received data. Then a filter is designed to reduce the interference among these features. Theoretical analysis and simulation results show that the proposed algorithm achieves high detection performance under the computation complexity of approximate the max‐log likelihood algorithm.","PeriodicalId":22858,"journal":{"name":"The Journal of Engineering","volume":"42 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139023065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fraud detection through data sharing using privacy‐preserving record linkage, digital signature (EdDSA), and the MinHash technique: Detect fraud using privacy preserving record links","authors":"Satish Thomas, James Sluss","doi":"10.1049/tje2.12341","DOIUrl":"https://doi.org/10.1049/tje2.12341","url":null,"abstract":"Fraud is a persistent and increasing problem in the telecom industry. Telcos work in isolation to prevent fraud. Sharing information is critical for detecting and preventing fraud. The primary constraint on sharing information is privacy preservation. Several techniques have been developed to share data while preserving privacy using privacy‐preserving record linkage (PPRL). Most of the PPRL techniques use a similarity measure like Jacquard similarity on homologous datasets, which are all prone to graph‐based attacks, rendering existing methods insecure. Many complex and slow techniques use the Bloom filter implementation, which can be compromised in a cryptanalysis attack. This paper proposes an attack‐proof PPRL method using existing infrastructure of a telco without a complex multistep protocol. First, a novel way of matching two non‐homologous datasets using attack‐proof digital signature schemes, like the Edwards‐curve digital signature algorithm is proposed. Here, Jaccard similarity can only be estimated using this method and not on the datasets directly. Second, two parties transact with a simple request–reply method. To validate the match accuracy, privacy preservation, and performance of this approach, it was tested on a large public dataset (North Carolina Voter Database). This method is secure against attacks and achieves 100% match accuracy with improved performance.","PeriodicalId":22858,"journal":{"name":"The Journal of Engineering","volume":"149 ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138992839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Digital backpropagation based on binary logarithmic step size distribution for fibre non‐linearity compensation","authors":"Albert Dede, E. Akowuah, S. Haxha","doi":"10.1049/tje2.12340","DOIUrl":"https://doi.org/10.1049/tje2.12340","url":null,"abstract":"Capacity crunch has become critical in recent years as commercial communication systems approach their theoretical data rate limits. This work presents a low‐complexity digital backpropagation (DBP) implementation approach based on step size distribution that uses a binary logarithmic step size method to achieve high data rate optical transmission. The proposed scheme shows performance improvements (∆Q) of 2.36, 1.19, and 0.71 dB over linear compensation, constant step size (CSS) DBP, and logarithmic step size DBP techniques in a 2400 km 112 Gbit/s DP‐16 quadrature amplitude modulation (QAM) system, respectively. At 13 dBm, a high performance (Q) of 10.9 dB (BER = 2.25 × 10−4) is achieved, above the 3.80 × 10−3 hard‐decision forward error correction (HD‐FEC) limit, using the proposed scheme. Also, the allowable transmission distance is extended by 960 km at the HD‐FEC limit over the linear compensation technique. The optimization achieves a 38% saving in the number of DBP calculation steps compared to the CSS DBP, which considerably reduces the computational cost since a few steps are required for effective non‐linearity compensation.","PeriodicalId":22858,"journal":{"name":"The Journal of Engineering","volume":"162 ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139026604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Pandey, Ankit Kumar, D. P. Yadav, Anurag Sinha, M. Hassan, N. K. Singh, Yash Bhatnagar, Namit Garg
{"title":"Health evaluation and dangerous reptile detection using a novel framework powered by the YOLO algorithm to design high‐content cellular imaging systems","authors":"S. Pandey, Ankit Kumar, D. P. Yadav, Anurag Sinha, M. Hassan, N. K. Singh, Yash Bhatnagar, Namit Garg","doi":"10.1049/tje2.12335","DOIUrl":"https://doi.org/10.1049/tje2.12335","url":null,"abstract":"This novel approach in animal biology could revolutionize identifying endangered species, addressing the issue of misclassifying potentially harmful animals based solely on visual characteristics. Particularly impactful for farmers in agricultural fields, it aims to reduce the heightened risk of venomous animal attacks, ultimately improving safety. Due to a lack of accessible education, illiterate farmers are more susceptible to adopting superstitious beliefs, which tragically leads to fatal snakebites even when medical treatment is readily available. Furthermore, environmental factors can unexpectedly hold typically non‐threatening animals responsible for a large number of human deaths each year. However, the complexity of human recognition of these hazards has prompted the development of a novel design approach aimed at simplifying the process. Integration of the ResNet learning algorithm in conjunction with You Only Look Once (YOLOv5) within the framework is recommended to facilitate real‐time processing and improve accuracy. This combined approach not only speeds up animal recognition but also takes advantage of ResNet's deep learning capabilities. The first phase entails deploying YOLOv5 to detect the presence of snakes in the proposed study, achieving a remarkable 87% precision in snake detection thanks to the synergistic fusion of ResNet and YOLOv5.","PeriodicalId":22858,"journal":{"name":"The Journal of Engineering","volume":"85 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138622365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimization method of 3D reconstruction of metal cultural relics based on 3D laser scanning data reduction","authors":"Xiang Chen, Ling Wang, Feng Ding","doi":"10.1049/tje2.12337","DOIUrl":"https://doi.org/10.1049/tje2.12337","url":null,"abstract":"The extraction effect and feature matching are poor in the three‐dimensional reconstruction of metal cultural relics, which leads to a poor reconstruction effect. Therefore, an optimization method of three‐dimensional reconstruction of metal cultural relics based on 3D laser scanning data reduction is proposed. The overall technical design route of the method is shown as follows. Based on this model, the 3D laser scanning method is used to collect 3D images of metal artefacts, combined with colour space and 2D entropy detection methods to pre‐process 3D images, and feature matching of point clouds is carried out to extract and optimize the significant value of superpixels, and a 3D reconstructed visual model is constructed. Affine transformation is used to obtain the affine invariant moment of the structural light parameters of the visual feature lines of metal cultural relics. The light stability adjustment of the three‐dimensional reconstruction of metal cultural relics is realized by using the linear structural light adjustment method in the HSV colour space. The rigid and non‐rigid registration methods are introduced to match the point cloud. The product quantization algorithm is used to linearize the error function, and the block feature detection and matching model of spatial image is obtained. The noise number is judged by the threshold value, and the three‐dimensional reconstruction technology is combined to realize the three‐dimensional reconstruction of metal relics. The simulation results show that this method has good visual expression ability, high feature recognition rate, and improves the three‐dimensional reconstruction ability of metal relics.","PeriodicalId":22858,"journal":{"name":"The Journal of Engineering","volume":"282 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139018395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}