Wei Pan , Yang Wang , Bangjun Lv , Liming Wang , Longmei Li
{"title":"Research on multi-UUV mission planning for mine countermeasures based on preferred multi-objective optimization","authors":"Wei Pan , Yang Wang , Bangjun Lv , Liming Wang , Longmei Li","doi":"10.1016/j.asej.2024.103006","DOIUrl":"10.1016/j.asej.2024.103006","url":null,"abstract":"<div><div>Facing rising maritime security threats, this study presents T-MOEA/D, a sophisticated evolutionary algorithm enhancing UUVs’ capabilities in mine detection and neutralization. The algorithm tackles the multi-objective challenge by balancing time and energy, integrating user preferences into its optimization process. It leverages genetic operators such as dual chromosome encoding and partially mapped crossover to evolve efficient solutions, outperforming T-NSGA-II and T-NSGA-III in hypervolume and operational time. The UUV, directed by T-MOEA/D, navigates to operational areas and employs StyleGAN and YOLOv9 for accurate mine perception, crucial for executing mine countermeasure tasks. The system’s effectiveness is confirmed through Unity3D simulations and real-world tests, demonstrating its practicality and reliability. The study’s findings offer strategic guidance for planning large-scale mine countermeasure missions with multiple UUVs, ensuring operational efficiency and safety in complex underwater environments. The Pareto optimal solutions align with user preferences, reflecting a tailored approach to mine countermeasure missions.</div></div>","PeriodicalId":48648,"journal":{"name":"Ain Shams Engineering Journal","volume":"15 11","pages":"Article 103006"},"PeriodicalIF":6.0,"publicationDate":"2024-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142652361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hassan Ali , Nisar Ali , Ahmed Sayed M. Metwally , Arshad Ali , Musarrat Jabeen
{"title":"Analysis of Monte-Carlo collision method with argon and helium background gases at different RF-powers and pressures in ELTRAP device","authors":"Hassan Ali , Nisar Ali , Ahmed Sayed M. Metwally , Arshad Ali , Musarrat Jabeen","doi":"10.1016/j.asej.2024.102999","DOIUrl":"10.1016/j.asej.2024.102999","url":null,"abstract":"<div><div>The impact of confined excited electron with argon and helium background gases is systematically studied using Monte-Carlo particle-in-cell simulations for various low powers (1.0–8.0 V) and pressures (1.50 × 10<sup>−8</sup> Torr and 3.75 × 10<sup>−9</sup> Torr) in ELTRAP device. The results of these numerical studies showed that the heating effect of the excited confined electron plasma density of 5 × 10<sup>14</sup> m<sup>−3</sup> within the Brillouin limit (<span><math><mrow><msub><mi>n</mi><mi>e</mi></msub><mo>≤</mo><mfrac><mrow><msub><mi>ε</mi><mn>0</mn></msub><msup><mi>B</mi><mn>2</mn></msup></mrow><mrow><mn>2</mn><msub><mi>m</mi><mi>e</mi></msub></mrow></mfrac><mo>=</mo><mn>31.086</mn><mo>×</mo><msup><mn>10</mn><mn>19</mn></msup><mspace></mspace><msup><mrow><mtext>m</mtext></mrow><mrow><mo>-</mo><mn>3</mn></mrow></msup></mrow></math></span>) resulted a higher temperature (eV) and increased collision time in argon as a background gas as compared to helium gas. The axial temperature (eV) has a higher value than the radial temperature (eV) and increases with the increase in RF-Powers and pressures. The maximum kinetic energy of excited confined electrons occurred in the range of 0.03–0.04 m radially due to the maximum self-electric field intensity in simulation time up to 20 µs. The electric field decreases when the collision frequency is increased. The secondary electron production and ionization are higher than expected at a background pressure of 1.50 × 10<sup>−8</sup> Torr as compared to 3.75 × 10<sup>−9</sup> Torr. The remaining secondary electrons were always ejected from the symmetry axis of the device. It was observed that the production of secondary electrons is proportional to the ionization rate.</div></div>","PeriodicalId":48648,"journal":{"name":"Ain Shams Engineering Journal","volume":"15 11","pages":"Article 102999"},"PeriodicalIF":6.0,"publicationDate":"2024-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142209455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Noha Negm , Hayam Alamro , Randa Allafi , Majdi Khalid , Amal M. Nouri , Radwa Marzouk , Aladdin Yahya Othman , Noura Abdelaziz Ahmed
{"title":"Tasmanian devil optimization with deep autoencoder for intrusion detection in IoT assisted unmanned aerial vehicle networks","authors":"Noha Negm , Hayam Alamro , Randa Allafi , Majdi Khalid , Amal M. Nouri , Radwa Marzouk , Aladdin Yahya Othman , Noura Abdelaziz Ahmed","doi":"10.1016/j.asej.2024.102943","DOIUrl":"10.1016/j.asej.2024.102943","url":null,"abstract":"<div><h3>Background</h3><div>Recently, a developing count of physical objects is linked to the Internet at an unprecedented rate, calcifying the knowledge of the Internet of Things (IoT). In several paradigms of IoT applications, unmanned aerial vehicles (UAVs) and satellites for IoT have concerned much attention and are experiencing quick progress. As for UAVs, because of their superiority in maneuverability and cost, it is established an increasingly extensive consumption in several IoT scenarios like disaster relief, rapid transportation, and environment monitoring. Security remains a main problem in the IoT supported UAV networks that are solved by the employ of intrusion detection system (IDS) methods.</div></div><div><h3>Objective</h3><div>This article aims to present a Tasmanian Devil Optimization with Deep Autoencoder for Intrusion Detection System (TDODAE-IDS) technique in IoT assisted Unmanned Aerial Vehicle Networks.</div></div><div><h3>Methods</h3><div>The presented TDODAE-IDS technique majorly concentrates on the effectual identification of the intrusions in the IoT based UAV networks. To accomplish this, the presented TDODAE-IDS system designs a new TDO algorithm for the feature subset selection process. Moreover, the DAE model classifies the existence of intrusion in the UAV network and the hyperparameter tuning of the DAE model takes place using the dragonfly algorithm (DFA).</div></div><div><h3>Results</h3><div>The simulation results of the TDODAE-IDS approach were tested on a benchmark IDS dataset and the results are assessed under several measures.</div></div><div><h3>Conclusion</h3><div>The comprehensive comparative analysis highlighted the enhanced outcomes of the TDODAE-IDS algorithm over other recent approaches with maximum accuracy of 99.36%. Therefore, the proposed model can be employed to accomplish security in the IoT assisted UAV networks.</div></div>","PeriodicalId":48648,"journal":{"name":"Ain Shams Engineering Journal","volume":"15 11","pages":"Article 102943"},"PeriodicalIF":6.0,"publicationDate":"2024-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142652301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Denoising of partial discharges in switchgear insulation material using hybrid wavelet denoising-optimization-machine learning","authors":"Shiyu Chen, Hazlee Azil Illias, Jee Keen Raymond Wong, Nurulafiqah Nadzirah Mansor","doi":"10.1016/j.asej.2024.103032","DOIUrl":"10.1016/j.asej.2024.103032","url":null,"abstract":"<div><div>Partial discharge (PD) diagnosis is essential for assessing the insulation status of power equipment, but onsite interferences often contaminate PD signals with noise, impacting diagnostic accuracy. This work proposes an adaptive wavelet threshold denoising technique, where the PD signal is first decomposed into wavelet coefficients using discrete wavelet transform (DWT). Traditional threshold selection methods rely on experience and statistical factors, challenging optimal threshold determination. To address this issue, Particle Swarm Optimization (PSO), Energy Valley Optimization (EVO) and Subtraction Average Based Optimization (SABO) are applied to achieve the best adaptive threshold. The proposed method is evaluated against traditional sqtwolog-based threshold methods using root mean square error (RMSE) and the recognition accuracy of classifiers, including Artificial Neural Networks (ANN), Support Vector Machines (SVM), Gradient Boosting Decision Trees (GBDT) and K-Nearest Neighbours (KNN). The results show that the proposed technique can find the best threshold and increase the recognition accuracy by 19% compared to the traditional method, demonstrating its superior performance.</div></div>","PeriodicalId":48648,"journal":{"name":"Ain Shams Engineering Journal","volume":"15 11","pages":"Article 103032"},"PeriodicalIF":6.0,"publicationDate":"2024-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142652357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Somayeh Davoodabadi Farahani , As'ad Alizadeh , Mohammed A. Tashkandi , Lioua Kolsi , Aliakbar Karimipour
{"title":"Artificial intelligence approach in mixed convection heat transfer under transverse mechanical vibrations in a rectangular cavity","authors":"Somayeh Davoodabadi Farahani , As'ad Alizadeh , Mohammed A. Tashkandi , Lioua Kolsi , Aliakbar Karimipour","doi":"10.1016/j.asej.2024.103012","DOIUrl":"10.1016/j.asej.2024.103012","url":null,"abstract":"<div><div>In the current research, the mixed convection heat transfer in a rectangular chamber with walls with sinusoidal oscillations and mechanical vibrations has been investigated. Mechanical vibrations on the chamber, sinusoidal oscillations of the hot wall and flow due to buoyancy are considered. The finite volume method is utilized for simulation. The efficacy of changes in governing parameters, such as frequency, oscillation amplitude, <span><math><mrow><mi>Ra</mi></mrow></math></span>, chamber length to width ratio, change of fluid type on <span><math><mrow><mi>Nu</mi></mrow></math></span> has been investigated. The results indicate that there is an optimal ratio of chamber dimensions that has the maximum <span><math><mrow><mi>Nu</mi></mrow></math></span> in the fixed <span><math><mrow><mi>Ra</mi></mrow></math></span>, and this ratio depends on the type of fluid. In the presence of sinusoidal oscillations of the hot wall and transverse mechanical vibrations of the cylinder, it increases the heat transfer by about 96 % and 75 %, respectively, compared to the state without vibration. The increase in the frequency and amplitude of oscillations in the case where the hot wall oscillates sinusoidally is negligible on the Nusselt number. Increasing the frequency and amplitude of oscillations of transverse vibrations of the chamber has a significant efficacy on <span><math><mrow><mi>Nu</mi></mrow></math></span>, and the amplitude of oscillations has a greater efficacy than the frequency of oscillations on heat transfer. Based on the available data and using artificial intelligence, GMDH, <span><math><mrow><mi>Nu</mi></mrow></math></span> has been estimated. The results indicate that this modeling has been able to estimate the Nusselt number with good accuracy with <span><math><mrow><msup><mrow><mi>R</mi></mrow><mn>2</mn></msup><mo>=</mo><mn>0.948</mn></mrow></math></span>.</div></div>","PeriodicalId":48648,"journal":{"name":"Ain Shams Engineering Journal","volume":"15 11","pages":"Article 103012"},"PeriodicalIF":6.0,"publicationDate":"2024-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142652360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic S-boxes generation for IoT security enhancement: A genetic algorithm approach","authors":"Amina Msolli, Imen Hagui, Abdelhamid Helali","doi":"10.1016/j.asej.2024.103049","DOIUrl":"10.1016/j.asej.2024.103049","url":null,"abstract":"<div><div>We are witnessing an explosion in the concept of the Internet of Things (IoT) as smart objects become more important in our daily lives to make it easier to achieve our goals. It is obvious that the application areas of IoT are extremely diverse. Indeed, several sectors will be deeply impacted by IoT applications. Of which, security in the Internet of Things (IoT) has become a major concern due to increasing vulnerabilities and threats. Connected devices, often with limited security capabilities, have become attractive targets for attackers. Vulnerabilities in IoT devices, whether resulting from unmodified default configurations, lack of regular updates, or insecure communication protocols, expose these systems to potential risks. Cryptography, as a discipline dedicated to securing communications, uses advanced mathematical techniques to guarantee the confidentiality of electronic exchanges by making the data incomprehensible to unauthorized persons.</div><div>In this paper, we show an in-depth exploration of the generation of new S-boxes using the genetic algorithm. These new S-boxes are dynamically generated with the new genetic algorithm-based approach. This new method offers adaptive optimization, iteratively exploring the solution space to identify robust S-boxes, thereby strengthening the security of the encryption system. The study continues with the evaluation of these S-boxes through dedicated metrics, allowing an in-depth analysis of their performance in terms of resistance to cryptographic attacks and preservation of substitution properties. Finally, this evaluation extends to the incorporation of these newly generated S-boxes into the AES encryption algorithm, where different dimensions, such as cryptanalysis resistance, scene visibility, and other performance levels, will be examined.</div></div>","PeriodicalId":48648,"journal":{"name":"Ain Shams Engineering Journal","volume":"15 11","pages":"Article 103049"},"PeriodicalIF":6.0,"publicationDate":"2024-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142652216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yasha Li , Guojiang Xiong , Seyedali Mirjalili , Ali Wagdy Mohamed
{"title":"Optimal equivalent circuit models for photovoltaic cells and modules using multi-source guided teaching–learning-based optimization","authors":"Yasha Li , Guojiang Xiong , Seyedali Mirjalili , Ali Wagdy Mohamed","doi":"10.1016/j.asej.2024.102988","DOIUrl":"10.1016/j.asej.2024.102988","url":null,"abstract":"<div><div>The complexity of equivalent circuit models of photovoltaic cells and modules poses a difficult task to the parameter extraction methods. Teaching-learning-based optimization (TLBO) is a potent metaheuristic-based parameter extraction method, but it suffers from insufficient precision and low dependability. This study presented a multi-source guided TLBO through improving its two optimization phases. A multi-source guided approach with one-to-one and step-by-step teaching strategies was designed to guide different learners in the teacher phase. Besides, different strategies based on multiple learners were introduced for learners with different knowledge reserves to strengthen information exchanging. With the improvements, it is advantageous to lessen the likelihood of hitting a local optimum and thereby the global convergence can be accelerated. The resultant method was verified on single diode model, double diode model, and three additional modules. The findings demonstrate that it obtained better solutions in precision and dependability, and stood out from the crowd of algorithms.</div></div>","PeriodicalId":48648,"journal":{"name":"Ain Shams Engineering Journal","volume":"15 11","pages":"Article 102988"},"PeriodicalIF":6.0,"publicationDate":"2024-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142652114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shehzad Haneef , Zeeshan Rashid , Syed Aqeel Haider , Zeeshan Ahmad Arfeen , Nusrat Husain , Ashraf Yahya , Muhammad Amjad , Hafeez ur Rehman
{"title":"Stochastic optimal PV placement and command based power control for voltage and power factor correction using MOPSO algorithm","authors":"Shehzad Haneef , Zeeshan Rashid , Syed Aqeel Haider , Zeeshan Ahmad Arfeen , Nusrat Husain , Ashraf Yahya , Muhammad Amjad , Hafeez ur Rehman","doi":"10.1016/j.asej.2024.102990","DOIUrl":"10.1016/j.asej.2024.102990","url":null,"abstract":"<div><div>This paper addresses a multi-objective particle swarm optimization (MOPSO) algorithm to locate the best position at which a single distributed generator (DG) with optimum voltage amplitude and phase can be installed. The objective is to maximize the power factor and voltage in IEEE 9-Bus system and voltage in IEEE 15-Bus system using MATLAB/SIMULINK software. Systematic simulations revealed that a single DG at Bus-5 with voltage amplitude/phase of 230 kV/-13<sup>∘</sup> caused highest objective function value of 1.9919 with an improvement in power factor and voltage of 1.39% and 1.15% respectively. In IEEE 15-Bus system, DG at Bus-3 caused the highest objective function (0.8828) with DG voltage amplitude/phase of 10.735 kV/23.12<sup>∘</sup> and 11.89% voltage improvement. Finally, a robust control program in <span><math><mi>d</mi><mi>q</mi><mn>0</mn></math></span> domain is developed to achieve calculated powers from photovoltaic generator at DG bus whose effect is validated to be the same at all buses as given by the MOPSO algorithm.</div></div>","PeriodicalId":48648,"journal":{"name":"Ain Shams Engineering Journal","volume":"15 11","pages":"Article 102990"},"PeriodicalIF":6.0,"publicationDate":"2024-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142652115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Peide Liu , Mudasser Hussain Asim , Sikander Ali , Muhammad Azeem , Bandar Almohsen
{"title":"Utilizing lexicographic max product of picture fuzzy graph in human trafficking","authors":"Peide Liu , Mudasser Hussain Asim , Sikander Ali , Muhammad Azeem , Bandar Almohsen","doi":"10.1016/j.asej.2024.103009","DOIUrl":"10.1016/j.asej.2024.103009","url":null,"abstract":"<div><div>Graph structures are an essential tool for solving combinatorial problems in computer science and computational intelligence. With an emphasis on signed graphs, picture-fuzzy graphs, and graphs with colored or labeled edges, this study explores the properties of picture-fuzzy graph topologies. Within these frameworks, it presents key ideas such as the lexicographic-max product, vertex degree, and total degree. The use of picture-fuzzy graphs' lexicographic-max product to tackle intricate problems like human trafficking is a key component of this study. The study illustrates how this strategy can improve decision-making processes in such crucial areas by utilizing the special qualities of picture-fuzzy graphs. The study is supported by informative numerical examples that show how useful these ideas are in real-world situations. In addition, the study offers a thorough algorithmic foundation for applying the lexicographic-max product in practical situations, especially those involving human trafficking. The goal of this framework is to provide a workable approach for applying picture-fuzzy graph structures to enhance decision-making and tackle important societal issues.</div></div>","PeriodicalId":48648,"journal":{"name":"Ain Shams Engineering Journal","volume":"15 11","pages":"Article 103009"},"PeriodicalIF":6.0,"publicationDate":"2024-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142652297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An integrated blockchain and fractional DCT based highly secured framework for storage and retrieval of retinal images","authors":"Abhay Kumar Yadav, Virendra P. Vishwakarma","doi":"10.1016/j.asej.2024.103047","DOIUrl":"10.1016/j.asej.2024.103047","url":null,"abstract":"<div><div>The digital image capability of storing large amount of data has resulted in it’s increased popularity. Images are used to transmit large amount of information across different geographical locations using different cloud services. Securing these digitally stored images has remained a challenging task for researchers as they are prone to cyber- attacks. A potential solution to this problem can be blockchain, which provide secure and unchangeable storage. However, securing images on blockchain has another challenge as the image size increases the associated cost involved in blockchain. Fractional Discrete Cosine Transform(fctDCT) has the capability to minimizes the amount of data necessary for expressing an image in a secure way. This paper presents a novel framework for securely storing and retrieving medical images by extracting feature maps from medical images by fctDCT, followed by encoding and storing the feature map on decentralized cloud and linking them on blockchain. The integration has been implemented by using four different α angles which are stored on blockchain and are needed to be same at storage and retrieval stage as only the authentic user would have access to unique α angles and number of coefficients that have been used in storing their medical images. The performance of proposed framework has been evaluated by employing image quality metric such as Mean Square Error (MSE), Peak Signal to Noise Ratio (PSNR), Structural Similarity Index Measure (SSIM) and multi-SSIM by comparing it with correct and incorrect α values on four different values of α.</div></div>","PeriodicalId":48648,"journal":{"name":"Ain Shams Engineering Journal","volume":"15 11","pages":"Article 103047"},"PeriodicalIF":6.0,"publicationDate":"2024-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142652302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}