Ain Shams Engineering Journal最新文献

筛选
英文 中文
Research on multi-UUV mission planning for mine countermeasures based on preferred multi-objective optimization 基于优先多目标优化的多 UUV 反雷任务规划研究
IF 6 2区 工程技术
Ain Shams Engineering Journal Pub Date : 2024-11-01 DOI: 10.1016/j.asej.2024.103006
Wei Pan , Yang Wang , Bangjun Lv , Liming Wang , Longmei Li
{"title":"Research on multi-UUV mission planning for mine countermeasures based on preferred multi-objective optimization","authors":"Wei Pan ,&nbsp;Yang Wang ,&nbsp;Bangjun Lv ,&nbsp;Liming Wang ,&nbsp;Longmei Li","doi":"10.1016/j.asej.2024.103006","DOIUrl":"10.1016/j.asej.2024.103006","url":null,"abstract":"<div><div>Facing rising maritime security threats, this study presents T-MOEA/D, a sophisticated evolutionary algorithm enhancing UUVs’ capabilities in mine detection and neutralization. The algorithm tackles the multi-objective challenge by balancing time and energy, integrating user preferences into its optimization process. It leverages genetic operators such as dual chromosome encoding and partially mapped crossover to evolve efficient solutions, outperforming T-NSGA-II and T-NSGA-III in hypervolume and operational time. The UUV, directed by T-MOEA/D, navigates to operational areas and employs StyleGAN and YOLOv9 for accurate mine perception, crucial for executing mine countermeasure tasks. The system’s effectiveness is confirmed through Unity3D simulations and real-world tests, demonstrating its practicality and reliability. The study’s findings offer strategic guidance for planning large-scale mine countermeasure missions with multiple UUVs, ensuring operational efficiency and safety in complex underwater environments. The Pareto optimal solutions align with user preferences, reflecting a tailored approach to mine countermeasure missions.</div></div>","PeriodicalId":48648,"journal":{"name":"Ain Shams Engineering Journal","volume":"15 11","pages":"Article 103006"},"PeriodicalIF":6.0,"publicationDate":"2024-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142652361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Monte-Carlo collision method with argon and helium background gases at different RF-powers and pressures in ELTRAP device 分析 ELTRAP 设备中不同射频功率和压力下氩气和氦气背景气体的蒙特卡洛碰撞方法
IF 6 2区 工程技术
Ain Shams Engineering Journal Pub Date : 2024-11-01 DOI: 10.1016/j.asej.2024.102999
Hassan Ali , Nisar Ali , Ahmed Sayed M. Metwally , Arshad Ali , Musarrat Jabeen
{"title":"Analysis of Monte-Carlo collision method with argon and helium background gases at different RF-powers and pressures in ELTRAP device","authors":"Hassan Ali ,&nbsp;Nisar Ali ,&nbsp;Ahmed Sayed M. Metwally ,&nbsp;Arshad Ali ,&nbsp;Musarrat Jabeen","doi":"10.1016/j.asej.2024.102999","DOIUrl":"10.1016/j.asej.2024.102999","url":null,"abstract":"<div><div>The impact of confined excited electron with argon and helium background gases is systematically studied using Monte-Carlo particle-in-cell simulations for various low powers (1.0–8.0 V) and pressures (1.50 × 10<sup>−8</sup> Torr and 3.75 × 10<sup>−9</sup> Torr) in ELTRAP device. The results of these numerical studies showed that the heating effect of the excited confined electron plasma density of 5 × 10<sup>14</sup> m<sup>−3</sup> within the Brillouin limit (<span><math><mrow><msub><mi>n</mi><mi>e</mi></msub><mo>≤</mo><mfrac><mrow><msub><mi>ε</mi><mn>0</mn></msub><msup><mi>B</mi><mn>2</mn></msup></mrow><mrow><mn>2</mn><msub><mi>m</mi><mi>e</mi></msub></mrow></mfrac><mo>=</mo><mn>31.086</mn><mo>×</mo><msup><mn>10</mn><mn>19</mn></msup><mspace></mspace><msup><mrow><mtext>m</mtext></mrow><mrow><mo>-</mo><mn>3</mn></mrow></msup></mrow></math></span>) resulted a higher temperature (eV) and increased collision time in argon as a background gas as compared to helium gas. The axial temperature (eV) has a higher value than the radial temperature (eV) and increases with the increase in RF-Powers and pressures. The maximum kinetic energy of excited confined electrons occurred in the range of 0.03–0.04 m radially due to the maximum self-electric field intensity in simulation time up to 20 µs. The electric field decreases when the collision frequency is increased. The secondary electron production and ionization are higher than expected at a background pressure of 1.50 × 10<sup>−8</sup> Torr as compared to 3.75 × 10<sup>−9</sup> Torr. The remaining secondary electrons were always ejected from the symmetry axis of the device. It was observed that the production of secondary electrons is proportional to the ionization rate.</div></div>","PeriodicalId":48648,"journal":{"name":"Ain Shams Engineering Journal","volume":"15 11","pages":"Article 102999"},"PeriodicalIF":6.0,"publicationDate":"2024-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142209455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tasmanian devil optimization with deep autoencoder for intrusion detection in IoT assisted unmanned aerial vehicle networks 利用深度自动编码器进行塔斯马尼亚魔鬼优化,用于物联网辅助无人机网络的入侵检测
IF 6 2区 工程技术
Ain Shams Engineering Journal Pub Date : 2024-11-01 DOI: 10.1016/j.asej.2024.102943
Noha Negm , Hayam Alamro , Randa Allafi , Majdi Khalid , Amal M. Nouri , Radwa Marzouk , Aladdin Yahya Othman , Noura Abdelaziz Ahmed
{"title":"Tasmanian devil optimization with deep autoencoder for intrusion detection in IoT assisted unmanned aerial vehicle networks","authors":"Noha Negm ,&nbsp;Hayam Alamro ,&nbsp;Randa Allafi ,&nbsp;Majdi Khalid ,&nbsp;Amal M. Nouri ,&nbsp;Radwa Marzouk ,&nbsp;Aladdin Yahya Othman ,&nbsp;Noura Abdelaziz Ahmed","doi":"10.1016/j.asej.2024.102943","DOIUrl":"10.1016/j.asej.2024.102943","url":null,"abstract":"<div><h3>Background</h3><div>Recently, a developing count of physical objects is linked to the Internet at an unprecedented rate, calcifying the knowledge of the Internet of Things (IoT). In several paradigms of IoT applications, unmanned aerial vehicles (UAVs) and satellites for IoT have concerned much attention and are experiencing quick progress. As for UAVs, because of their superiority in maneuverability and cost, it is established an increasingly extensive consumption in several IoT scenarios like disaster relief, rapid transportation, and environment monitoring. Security remains a main problem in the IoT supported UAV networks that are solved by the employ of intrusion detection system (IDS) methods.</div></div><div><h3>Objective</h3><div>This article aims to present a Tasmanian Devil Optimization with Deep Autoencoder for Intrusion Detection System (TDODAE-IDS) technique in IoT assisted Unmanned Aerial Vehicle Networks.</div></div><div><h3>Methods</h3><div>The presented TDODAE-IDS technique majorly concentrates on the effectual identification of the intrusions in the IoT based UAV networks. To accomplish this, the presented TDODAE-IDS system designs a new TDO algorithm for the feature subset selection process. Moreover, the DAE model classifies the existence of intrusion in the UAV network and the hyperparameter tuning of the DAE model takes place using the dragonfly algorithm (DFA).</div></div><div><h3>Results</h3><div>The simulation results of the TDODAE-IDS approach were tested on a benchmark IDS dataset and the results are assessed under several measures.</div></div><div><h3>Conclusion</h3><div>The comprehensive comparative analysis highlighted the enhanced outcomes of the TDODAE-IDS algorithm over other recent approaches with maximum accuracy of 99.36%. Therefore, the proposed model can be employed to accomplish security in the IoT assisted UAV networks.</div></div>","PeriodicalId":48648,"journal":{"name":"Ain Shams Engineering Journal","volume":"15 11","pages":"Article 102943"},"PeriodicalIF":6.0,"publicationDate":"2024-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142652301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Denoising of partial discharges in switchgear insulation material using hybrid wavelet denoising-optimization-machine learning 利用混合小波去噪-优化-机器学习对开关设备绝缘材料中的局部放电进行去噪处理
IF 6 2区 工程技术
Ain Shams Engineering Journal Pub Date : 2024-11-01 DOI: 10.1016/j.asej.2024.103032
Shiyu Chen, Hazlee Azil Illias, Jee Keen Raymond Wong, Nurulafiqah Nadzirah Mansor
{"title":"Denoising of partial discharges in switchgear insulation material using hybrid wavelet denoising-optimization-machine learning","authors":"Shiyu Chen,&nbsp;Hazlee Azil Illias,&nbsp;Jee Keen Raymond Wong,&nbsp;Nurulafiqah Nadzirah Mansor","doi":"10.1016/j.asej.2024.103032","DOIUrl":"10.1016/j.asej.2024.103032","url":null,"abstract":"<div><div>Partial discharge (PD) diagnosis is essential for assessing the insulation status of power equipment, but onsite interferences often contaminate PD signals with noise, impacting diagnostic accuracy. This work proposes an adaptive wavelet threshold denoising technique, where the PD signal is first decomposed into wavelet coefficients using discrete wavelet transform (DWT). Traditional threshold selection methods rely on experience and statistical factors, challenging optimal threshold determination. To address this issue, Particle Swarm Optimization (PSO), Energy Valley Optimization (EVO) and Subtraction Average Based Optimization (SABO) are applied to achieve the best adaptive threshold. The proposed method is evaluated against traditional sqtwolog-based threshold methods using root mean square error (RMSE) and the recognition accuracy of classifiers, including Artificial Neural Networks (ANN), Support Vector Machines (SVM), Gradient Boosting Decision Trees (GBDT) and K-Nearest Neighbours (KNN). The results show that the proposed technique can find the best threshold and increase the recognition accuracy by 19% compared to the traditional method, demonstrating its superior performance.</div></div>","PeriodicalId":48648,"journal":{"name":"Ain Shams Engineering Journal","volume":"15 11","pages":"Article 103032"},"PeriodicalIF":6.0,"publicationDate":"2024-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142652357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Artificial intelligence approach in mixed convection heat transfer under transverse mechanical vibrations in a rectangular cavity 矩形腔横向机械振动下混合对流传热的人工智能方法
IF 6 2区 工程技术
Ain Shams Engineering Journal Pub Date : 2024-11-01 DOI: 10.1016/j.asej.2024.103012
Somayeh Davoodabadi Farahani , As'ad Alizadeh , Mohammed A. Tashkandi , Lioua Kolsi , Aliakbar Karimipour
{"title":"Artificial intelligence approach in mixed convection heat transfer under transverse mechanical vibrations in a rectangular cavity","authors":"Somayeh Davoodabadi Farahani ,&nbsp;As'ad Alizadeh ,&nbsp;Mohammed A. Tashkandi ,&nbsp;Lioua Kolsi ,&nbsp;Aliakbar Karimipour","doi":"10.1016/j.asej.2024.103012","DOIUrl":"10.1016/j.asej.2024.103012","url":null,"abstract":"<div><div>In the current research, the mixed convection heat transfer in a rectangular chamber with walls with sinusoidal oscillations and mechanical vibrations has been investigated. Mechanical vibrations on the chamber, sinusoidal oscillations of the hot wall and flow due to buoyancy are considered. The finite volume method is utilized for simulation. The efficacy of changes in governing parameters, such as frequency, oscillation amplitude, <span><math><mrow><mi>Ra</mi></mrow></math></span>, chamber length to width ratio, change of fluid type on <span><math><mrow><mi>Nu</mi></mrow></math></span> has been investigated. The results indicate that there is an optimal ratio of chamber dimensions that has the maximum <span><math><mrow><mi>Nu</mi></mrow></math></span> in the fixed <span><math><mrow><mi>Ra</mi></mrow></math></span>, and this ratio depends on the type of fluid. In the presence of sinusoidal oscillations of the hot wall and transverse mechanical vibrations of the cylinder, it increases the heat transfer by about 96 % and 75 %, respectively, compared to the state without vibration. The increase in the frequency and amplitude of oscillations in the case where the hot wall oscillates sinusoidally is negligible on the Nusselt number. Increasing the frequency and amplitude of oscillations of transverse vibrations of the chamber has a significant efficacy on <span><math><mrow><mi>Nu</mi></mrow></math></span>, and the amplitude of oscillations has a greater efficacy than the frequency of oscillations on heat transfer. Based on the available data and using artificial intelligence, GMDH, <span><math><mrow><mi>Nu</mi></mrow></math></span> has been estimated. The results indicate that this modeling has been able to estimate the Nusselt number with good accuracy with <span><math><mrow><msup><mrow><mi>R</mi></mrow><mn>2</mn></msup><mo>=</mo><mn>0.948</mn></mrow></math></span>.</div></div>","PeriodicalId":48648,"journal":{"name":"Ain Shams Engineering Journal","volume":"15 11","pages":"Article 103012"},"PeriodicalIF":6.0,"publicationDate":"2024-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142652360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic S-boxes generation for IoT security enhancement: A genetic algorithm approach 为增强物联网安全性生成动态 S-box:遗传算法方法
IF 6 2区 工程技术
Ain Shams Engineering Journal Pub Date : 2024-11-01 DOI: 10.1016/j.asej.2024.103049
Amina Msolli, Imen Hagui, Abdelhamid Helali
{"title":"Dynamic S-boxes generation for IoT security enhancement: A genetic algorithm approach","authors":"Amina Msolli,&nbsp;Imen Hagui,&nbsp;Abdelhamid Helali","doi":"10.1016/j.asej.2024.103049","DOIUrl":"10.1016/j.asej.2024.103049","url":null,"abstract":"<div><div>We are witnessing an explosion in the concept of the Internet of Things (IoT) as smart objects become more important in our daily lives to make it easier to achieve our goals. It is obvious that the application areas of IoT are extremely diverse. Indeed, several sectors will be deeply impacted by IoT applications. Of which, security in the Internet of Things (IoT) has become a major concern due to increasing vulnerabilities and threats. Connected devices, often with limited security capabilities, have become attractive targets for attackers. Vulnerabilities in IoT devices, whether resulting from unmodified default configurations, lack of regular updates, or insecure communication protocols, expose these systems to potential risks. Cryptography, as a discipline dedicated to securing communications, uses advanced mathematical techniques to guarantee the confidentiality of electronic exchanges by making the data incomprehensible to unauthorized persons.</div><div>In this paper, we show an in-depth exploration of the generation of new S-boxes using the genetic algorithm. These new S-boxes are dynamically generated with the new genetic algorithm-based approach. This new method offers adaptive optimization, iteratively exploring the solution space to identify robust S-boxes, thereby strengthening the security of the encryption system. The study continues with the evaluation of these S-boxes through dedicated metrics, allowing an in-depth analysis of their performance in terms of resistance to cryptographic attacks and preservation of substitution properties. Finally, this evaluation extends to the incorporation of these newly generated S-boxes into the AES encryption algorithm, where different dimensions, such as cryptanalysis resistance, scene visibility, and other performance levels, will be examined.</div></div>","PeriodicalId":48648,"journal":{"name":"Ain Shams Engineering Journal","volume":"15 11","pages":"Article 103049"},"PeriodicalIF":6.0,"publicationDate":"2024-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142652216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal equivalent circuit models for photovoltaic cells and modules using multi-source guided teaching–learning-based optimization 利用基于多源引导的教学优化,优化光伏电池和模块的等效电路模型
IF 6 2区 工程技术
Ain Shams Engineering Journal Pub Date : 2024-11-01 DOI: 10.1016/j.asej.2024.102988
Yasha Li , Guojiang Xiong , Seyedali Mirjalili , Ali Wagdy Mohamed
{"title":"Optimal equivalent circuit models for photovoltaic cells and modules using multi-source guided teaching–learning-based optimization","authors":"Yasha Li ,&nbsp;Guojiang Xiong ,&nbsp;Seyedali Mirjalili ,&nbsp;Ali Wagdy Mohamed","doi":"10.1016/j.asej.2024.102988","DOIUrl":"10.1016/j.asej.2024.102988","url":null,"abstract":"<div><div>The complexity of equivalent circuit models of photovoltaic cells and modules poses a difficult task to the parameter extraction methods. Teaching-learning-based optimization (TLBO) is a potent metaheuristic-based parameter extraction method, but it suffers from insufficient precision and low dependability. This study presented a multi-source guided TLBO through improving its two optimization phases. A multi-source guided approach with one-to-one and step-by-step teaching strategies was designed to guide different learners in the teacher phase. Besides, different strategies based on multiple learners were introduced for learners with different knowledge reserves to strengthen information exchanging. With the improvements, it is advantageous to lessen the likelihood of hitting a local optimum and thereby the global convergence can be accelerated. The resultant method was verified on single diode model, double diode model, and three additional modules. The findings demonstrate that it obtained better solutions in precision and dependability, and stood out from the crowd of algorithms.</div></div>","PeriodicalId":48648,"journal":{"name":"Ain Shams Engineering Journal","volume":"15 11","pages":"Article 102988"},"PeriodicalIF":6.0,"publicationDate":"2024-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142652114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Stochastic optimal PV placement and command based power control for voltage and power factor correction using MOPSO algorithm 利用 MOPSO 算法实现电压和功率因数校正的随机优化光伏布局和基于指令的功率控制
IF 6 2区 工程技术
Ain Shams Engineering Journal Pub Date : 2024-11-01 DOI: 10.1016/j.asej.2024.102990
Shehzad Haneef , Zeeshan Rashid , Syed Aqeel Haider , Zeeshan Ahmad Arfeen , Nusrat Husain , Ashraf Yahya , Muhammad Amjad , Hafeez ur Rehman
{"title":"Stochastic optimal PV placement and command based power control for voltage and power factor correction using MOPSO algorithm","authors":"Shehzad Haneef ,&nbsp;Zeeshan Rashid ,&nbsp;Syed Aqeel Haider ,&nbsp;Zeeshan Ahmad Arfeen ,&nbsp;Nusrat Husain ,&nbsp;Ashraf Yahya ,&nbsp;Muhammad Amjad ,&nbsp;Hafeez ur Rehman","doi":"10.1016/j.asej.2024.102990","DOIUrl":"10.1016/j.asej.2024.102990","url":null,"abstract":"<div><div>This paper addresses a multi-objective particle swarm optimization (MOPSO) algorithm to locate the best position at which a single distributed generator (DG) with optimum voltage amplitude and phase can be installed. The objective is to maximize the power factor and voltage in IEEE 9-Bus system and voltage in IEEE 15-Bus system using MATLAB/SIMULINK software. Systematic simulations revealed that a single DG at Bus-5 with voltage amplitude/phase of 230 kV/-13<sup>∘</sup> caused highest objective function value of 1.9919 with an improvement in power factor and voltage of 1.39% and 1.15% respectively. In IEEE 15-Bus system, DG at Bus-3 caused the highest objective function (0.8828) with DG voltage amplitude/phase of 10.735 kV/23.12<sup>∘</sup> and 11.89% voltage improvement. Finally, a robust control program in <span><math><mi>d</mi><mi>q</mi><mn>0</mn></math></span> domain is developed to achieve calculated powers from photovoltaic generator at DG bus whose effect is validated to be the same at all buses as given by the MOPSO algorithm.</div></div>","PeriodicalId":48648,"journal":{"name":"Ain Shams Engineering Journal","volume":"15 11","pages":"Article 102990"},"PeriodicalIF":6.0,"publicationDate":"2024-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142652115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Utilizing lexicographic max product of picture fuzzy graph in human trafficking 在人口贩运中利用图片模糊图的词典最大乘积
IF 6 2区 工程技术
Ain Shams Engineering Journal Pub Date : 2024-11-01 DOI: 10.1016/j.asej.2024.103009
Peide Liu , Mudasser Hussain Asim , Sikander Ali , Muhammad Azeem , Bandar Almohsen
{"title":"Utilizing lexicographic max product of picture fuzzy graph in human trafficking","authors":"Peide Liu ,&nbsp;Mudasser Hussain Asim ,&nbsp;Sikander Ali ,&nbsp;Muhammad Azeem ,&nbsp;Bandar Almohsen","doi":"10.1016/j.asej.2024.103009","DOIUrl":"10.1016/j.asej.2024.103009","url":null,"abstract":"<div><div>Graph structures are an essential tool for solving combinatorial problems in computer science and computational intelligence. With an emphasis on signed graphs, picture-fuzzy graphs, and graphs with colored or labeled edges, this study explores the properties of picture-fuzzy graph topologies. Within these frameworks, it presents key ideas such as the lexicographic-max product, vertex degree, and total degree. The use of picture-fuzzy graphs' lexicographic-max product to tackle intricate problems like human trafficking is a key component of this study. The study illustrates how this strategy can improve decision-making processes in such crucial areas by utilizing the special qualities of picture-fuzzy graphs. The study is supported by informative numerical examples that show how useful these ideas are in real-world situations. In addition, the study offers a thorough algorithmic foundation for applying the lexicographic-max product in practical situations, especially those involving human trafficking. The goal of this framework is to provide a workable approach for applying picture-fuzzy graph structures to enhance decision-making and tackle important societal issues.</div></div>","PeriodicalId":48648,"journal":{"name":"Ain Shams Engineering Journal","volume":"15 11","pages":"Article 103009"},"PeriodicalIF":6.0,"publicationDate":"2024-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142652297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An integrated blockchain and fractional DCT based highly secured framework for storage and retrieval of retinal images 基于区块链和分数 DCT 的高度安全视网膜图像存储和检索集成框架
IF 6 2区 工程技术
Ain Shams Engineering Journal Pub Date : 2024-11-01 DOI: 10.1016/j.asej.2024.103047
Abhay Kumar Yadav, Virendra P. Vishwakarma
{"title":"An integrated blockchain and fractional DCT based highly secured framework for storage and retrieval of retinal images","authors":"Abhay Kumar Yadav,&nbsp;Virendra P. Vishwakarma","doi":"10.1016/j.asej.2024.103047","DOIUrl":"10.1016/j.asej.2024.103047","url":null,"abstract":"<div><div>The digital image capability of storing large amount of data has resulted in it’s increased popularity. Images are used to transmit large amount of information across different geographical locations using different cloud services. Securing these digitally stored images has remained a challenging task for researchers as they are prone to cyber- attacks. A potential solution to this problem can be blockchain, which provide secure and unchangeable storage. However, securing images on blockchain has another challenge as the image size increases the associated cost involved in blockchain. Fractional Discrete Cosine Transform(fctDCT) has the capability to minimizes the amount of data necessary for expressing an image in a secure way. This paper presents a novel framework for securely storing and retrieving medical images by extracting feature maps from medical images by fctDCT, followed by encoding and storing the feature map on decentralized cloud and linking them on blockchain. The integration has been implemented by using four different α angles which are stored on blockchain and are needed to be same at storage and retrieval stage as only the authentic user would have access to unique α angles and number of coefficients that have been used in storing their medical images. The performance of proposed framework has been evaluated by employing image quality metric such as Mean Square Error (MSE), Peak Signal to Noise Ratio (PSNR), Structural Similarity Index Measure (SSIM) and multi-SSIM by comparing it with correct and incorrect α values on four different values of α.</div></div>","PeriodicalId":48648,"journal":{"name":"Ain Shams Engineering Journal","volume":"15 11","pages":"Article 103047"},"PeriodicalIF":6.0,"publicationDate":"2024-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142652302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信