Computers & Electrical Engineering最新文献

筛选
英文 中文
Comprehensive survey on deoldifying images and videos 对图像和视频去污的综合调查
IF 4 3区 计算机科学
Computers & Electrical Engineering Pub Date : 2025-04-26 DOI: 10.1016/j.compeleceng.2025.110396
Aradhana Mishra, Bumshik Lee
{"title":"Comprehensive survey on deoldifying images and videos","authors":"Aradhana Mishra,&nbsp;Bumshik Lee","doi":"10.1016/j.compeleceng.2025.110396","DOIUrl":"10.1016/j.compeleceng.2025.110396","url":null,"abstract":"<div><div>In the field of image processing, Deoldify refers to the revitalization of aging visual media, such as historical photos and videos, which present unique challenges due to accumulated defects, unpredictable degradation, and physical damage. Traditional restoration techniques, such as manual retouching, chemical treatments, and manual colorization, are often insufficient for addressing the complexity of these tasks, particularly in areas such as denoising, super-resolution, brightness enhancement, deblurring, colorization, compression, and inpainting. These methods lack automation, scalability, and precision, especially when dealing with severely degraded media. This survey highlights the limitations of conventional approaches. We focus on how recent advancements in deep learning, including convolutional neural networks, variational autoencoders, generative adversarial networks, Transformers, and diffusion models, have surpassed traditional methods in these subtasks. By leveraging deep learning, tasks such as noise reduction, contrast restoration, and resolution enhancement are performed with greater accuracy and efficiency, significantly improving restoration outcomes. This work aims to provide a comprehensive review of these techniques, showcasing their superiority over traditional methods while identifying challenges such as dataset limitations and the need for better handling of extreme degradation,and proposing directions for future research in old media restoration.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"124 ","pages":"Article 110396"},"PeriodicalIF":4.0,"publicationDate":"2025-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143876539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimizing wind energy integration with fuzzy PID DSTACOM and hybrid MPPT for reduced harmonic distortion 利用模糊PID DSTACOM和混合MPPT优化风能集成以降低谐波失真
IF 4 3区 计算机科学
Computers & Electrical Engineering Pub Date : 2025-04-26 DOI: 10.1016/j.compeleceng.2025.110391
Shinagam Rajshekar, Lalit Chandra Saikia, Lavanya Nandyala
{"title":"Optimizing wind energy integration with fuzzy PID DSTACOM and hybrid MPPT for reduced harmonic distortion","authors":"Shinagam Rajshekar,&nbsp;Lalit Chandra Saikia,&nbsp;Lavanya Nandyala","doi":"10.1016/j.compeleceng.2025.110391","DOIUrl":"10.1016/j.compeleceng.2025.110391","url":null,"abstract":"<div><div>Wind Energy Conversion Systems (WECS) play a crucial role in renewable energy generation but face challenges such as fluctuating wind speeds and grid instability, leading to power quality issues and voltage fluctuations. This study proposes an advanced integration of a wind-connected grid with a Battery Energy Storage System (BESS), optimized through a fuzzy PID-controlled DSTATCOM and a hybrid Maximum Power Point Tracking (MPPT) algorithm combining Perturb and Observe (P&amp;O) with Incremental Conductance (InCon). The fuzzy PID-controlled DSTATCOM provides dynamic reactive power compensation, stabilizes voltage, and mitigates harmonic distortions, while the BESS ensures efficient energy storage and dispatch under varying wind conditions. Simulation results demonstrate a significant reduction in Total Harmonic Distortion (THD), with the DFIG current THD peaking at 10 % before stabilization, while grid and load currents were reduced to below 0.15 % and 0.02 %, respectively. The findings confirm that the proposed system enhances power extraction, minimizes harmonic distortions, and improves grid stability. These results suggest that the developed methodology provides a robust and efficient solution for integrating wind energy into modern smart grids.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"124 ","pages":"Article 110391"},"PeriodicalIF":4.0,"publicationDate":"2025-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143873706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A taxonomy of key management schemes of SCADA systems SCADA 系统密钥管理方案分类法
IF 4 3区 计算机科学
Computers & Electrical Engineering Pub Date : 2025-04-25 DOI: 10.1016/j.compeleceng.2025.110366
Pramod TC
{"title":"A taxonomy of key management schemes of SCADA systems","authors":"Pramod TC","doi":"10.1016/j.compeleceng.2025.110366","DOIUrl":"10.1016/j.compeleceng.2025.110366","url":null,"abstract":"<div><div>The communication messages exchanged between industrial plant devices contain sensitive data. Secure communication plays a vital role in securing the communications of industrial devices. A key management mechanism is necessary for automation systems to handle the crypto keys used for secure communication. This paper focuses on presenting a framework for evaluating key management schemes specific to SCADA (Supervisory Control and Data Acquisition) requirements. It also aims to present a detailed review of key management schemes proposed for SCADA systems. The review considered the symmetric, asymmetric, and hybrid schemes, quantum key distribution, and blockchain-based key management schemes of SCADA systems. The paper outlines the existing SCADA key management schemes highlighting the benefits, limitations, and future scope. The future directions give the research gaps of SCADA key management schemes and possible research scope in the key management domain for industrial system security.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"124 ","pages":"Article 110366"},"PeriodicalIF":4.0,"publicationDate":"2025-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143867931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
HaKAN-6T: Hybrid algorithm for DIS attack detection and mitigation using CoJP in RPL-based 6TiSCH networks HaKAN-6T:在基于rpl的6TiSCH网络中使用CoJP检测和缓解DIS攻击的混合算法
IF 4 3区 计算机科学
Computers & Electrical Engineering Pub Date : 2025-04-25 DOI: 10.1016/j.compeleceng.2025.110362
Hakan Aydin, Burak Aydin, Sedat Gormus
{"title":"HaKAN-6T: Hybrid algorithm for DIS attack detection and mitigation using CoJP in RPL-based 6TiSCH networks","authors":"Hakan Aydin,&nbsp;Burak Aydin,&nbsp;Sedat Gormus","doi":"10.1016/j.compeleceng.2025.110362","DOIUrl":"10.1016/j.compeleceng.2025.110362","url":null,"abstract":"<div><div>The Internet of Things relies on robust networking protocols like the Routing Protocol for Low-Power and Lossy Networks (RPL) to enable efficient communication in resource-constrained environments, particularly in 6TiSCH networks combining IEEE 802.15.4e TSCH with IPv6. However, RPL remains vulnerable to control message attacks, such as DIS flooding and rank manipulation, which degrade network stability, increase energy consumption, and disrupt performance. To address these challenges, this study introduces HaKAN-6T, a hybrid security framework designed to enhance RPL-based 6TiSCH networks through integrated detection and mitigation mechanisms. HaKAN-6T combines the Constrained Join Protocol (CoJP) for secure device authentication with a Network Analyzer for real-time anomaly detection. CoJP ensures only authorized devices join the network, preventing unauthorized access, while the Network Analyzer monitors node behavior to identify attacks like DIS flooding, increased rank, and decreased rank attacks. The performance of HaKAN-6T is evaluated through extensive simulations in grid and random topologies with 30 and 40 nodes, measuring key metrics such as packet delivery ratio (PDR), end-to-end delay (E2ED), control packet overhead, average power consumption (APC), processing overhead, and average detection latency. The results demonstrate that HaKAN-6T significantly mitigates the impact of DIS flooding attacks, reducing control packet overhead by up to 28.5% and improving PDR from 82.7% to 88.45% in 30-node scenarios. Against increased rank attacks, it minimizes E2ED, reducing delays by 19.3% while maintaining a stable network topology. For decreased rank attacks, it prevents excessive topology changes and lowers APC by up to 10.5%, enhancing energy efficiency.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"124 ","pages":"Article 110362"},"PeriodicalIF":4.0,"publicationDate":"2025-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143867933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Attack detection and network recovery using Correlation Aware Lotus Effect Hierarchical Dual Graph Neural Networks 基于关联感知莲花效应的分层对偶图神经网络攻击检测与网络恢复
IF 4 3区 计算机科学
Computers & Electrical Engineering Pub Date : 2025-04-25 DOI: 10.1016/j.compeleceng.2025.110315
Leena R , Sneha Karamadi , Manjesh R
{"title":"Attack detection and network recovery using Correlation Aware Lotus Effect Hierarchical Dual Graph Neural Networks","authors":"Leena R ,&nbsp;Sneha Karamadi ,&nbsp;Manjesh R","doi":"10.1016/j.compeleceng.2025.110315","DOIUrl":"10.1016/j.compeleceng.2025.110315","url":null,"abstract":"<div><div>The recent advancements in Software Defined-Wireless Sensor Networks (SD-WSNs) have revealed the susceptibility of the systems to future enhancement in cyber–physical attacks. However, intrusion detection creates an anomalous behavior that bypasses traditional detection systems. To address these problems, the Correlation Lotus Effect Hierarchical Dual Graph Neural Networks (CLEHDGNN) is a new proposed method to guarantee the correct classification of various types of attacks. This approach utilizes a correlation-sensitive framework is used to efficiently discern the relationships between features for attack detection. Density-Based Spatial Clustering (DBSC) is employed for clustering time-oriented data, whereas the selection of cluster heads is achieved through a Particle-Guided Metaheuristic Algorithm (PGMA) to ensure effective cluster management. This method serves to facilitate and enhance the rapid identification of emerging attack patterns for improved detection accuracy performance. This approach is based on the integration of the Lotus Effect Optimization Algorithm, which improves the identification and classification of attacks. The proposed method has shown astonishing results, reaching a maximum accuracy of 98.5%, F1-score of 97.9%, precision of 98.6%, recall of 98.95%, and specificity of 99.6 as compared to existing techniques. Overall, the proposed model holds significant potential for bolstering the reliability of security in cyber–physical systems.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"124 ","pages":"Article 110315"},"PeriodicalIF":4.0,"publicationDate":"2025-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143873707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quasi-Z-source on-board charger based on reducing the size of the DC-Side active power buffer for electric vehicle applications 基于减小电动汽车直流侧有源电源缓冲器尺寸的准z源车载充电器
IF 4 3区 计算机科学
Computers & Electrical Engineering Pub Date : 2025-04-25 DOI: 10.1016/j.compeleceng.2024.110050
Naser Fakhri Saray , Mansour Rafiee , Mohammad Salay Naderi , Ali Mosallanejad , Abdolreza Esmaeli
{"title":"Quasi-Z-source on-board charger based on reducing the size of the DC-Side active power buffer for electric vehicle applications","authors":"Naser Fakhri Saray ,&nbsp;Mansour Rafiee ,&nbsp;Mohammad Salay Naderi ,&nbsp;Ali Mosallanejad ,&nbsp;Abdolreza Esmaeli","doi":"10.1016/j.compeleceng.2024.110050","DOIUrl":"10.1016/j.compeleceng.2024.110050","url":null,"abstract":"<div><div>Active power buffer (APB) modules in single-phase quasi-Z-source rectifiers (qZSRs) can effectively decrease the double-line frequency power ripple. APB modules can eliminate bulky passive devices, potentially improving system power density and reliability. However, single-phase qZSR systems with AC-side active power buffers (AC-SAPBs) raise system costs, power losses, and control complexity. They require low-reliability aluminum electrolytic capacitors (Al-Caps) and large inductors on the power grid input side to absorb the second-frequency ripple. This study, for the first time, proposes the inclusion of DC-side active power buffer (DC-SAPB) in single-phase qZSRs. The proposed system not only offers the benefits of AC-SAPBs but also reduces the power loss and control complexity. Moreover, metallized polypropylene film capacitors (MPPF-Caps) or multilayer ceramic capacitors (MLC<img>Caps), and small inductors can be used with higher reliability levels. The proposed topology can be employed in the integrated on-board charger of electric vehicles. A comparison between the DC-SAPB and AC-SAPB modules reveals that the former provides a higher performance and efficiency than those of the latter owing to its reduced weight and volume; hence, a large amount of energy can be stored in the battery. The simulation and experimental results verified the performance of the proposed system.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"124 ","pages":"Article 110050"},"PeriodicalIF":4.0,"publicationDate":"2025-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143867922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine learning techniques in maritime environmental sustainability: A comprehensive review of the state of the art 海洋环境可持续性中的机器学习技术:全面回顾最新技术
IF 4 3区 计算机科学
Computers & Electrical Engineering Pub Date : 2025-04-24 DOI: 10.1016/j.compeleceng.2025.110395
Yixue Li , Ruqi Zhou , Yang Zhou , Zhong Shuo Chen
{"title":"Machine learning techniques in maritime environmental sustainability: A comprehensive review of the state of the art","authors":"Yixue Li ,&nbsp;Ruqi Zhou ,&nbsp;Yang Zhou ,&nbsp;Zhong Shuo Chen","doi":"10.1016/j.compeleceng.2025.110395","DOIUrl":"10.1016/j.compeleceng.2025.110395","url":null,"abstract":"<div><div>With the development of the global maritime industry and the intensification of environmental challenges, machine learning technology has emerged as an innovative solution to the environmental sustainability issues in the maritime industry. This study comprehensively reviews the applications of machine learning in the field, with a focus on two key sectors: ships and ports. It delves into important topics such as ship energy consumption prediction, ship emission prediction, ship emission monitoring, port emission prediction, port air quality prediction, and so on. This review provides an in-depth analysis of the current research status, challenges, and future directions. The review finds that in terms of applications, research related to ships is relatively mature, while research related to ports is limited. In terms of algorithms, Random Forest, Artificial Neural Networks, and Gradient Boosting Machines are the most widely used. As the industry continues to grow, future research may focus on the integration of multi-source heterogeneous data, improvement of the interpretability and generalizability of machine learning models, and utilization of more advanced models and algorithms, which are expected to improve the development in the field and contribute to maritime environmental sustainability.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"124 ","pages":"Article 110395"},"PeriodicalIF":4.0,"publicationDate":"2025-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143868068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CLEMO: Cost, load, energy, and makespan-based optimized scheduler for internet of things applications in cloud-fog environment CLEMO:基于成本、负载、能源和最大时间跨度的优化调度程序,适用于云雾环境下的物联网应用
IF 4 3区 计算机科学
Computers & Electrical Engineering Pub Date : 2025-04-24 DOI: 10.1016/j.compeleceng.2025.110377
Amritesh Singh, Rohit Kumar Tiwari, Sushil Kumar Saroj
{"title":"CLEMO: Cost, load, energy, and makespan-based optimized scheduler for internet of things applications in cloud-fog environment","authors":"Amritesh Singh,&nbsp;Rohit Kumar Tiwari,&nbsp;Sushil Kumar Saroj","doi":"10.1016/j.compeleceng.2025.110377","DOIUrl":"10.1016/j.compeleceng.2025.110377","url":null,"abstract":"<div><div>The rapid expansion of Internet of Things (IoT) devices has led to a substantial increase in data that needs to be processed efficiently. However, IoT devices face numerous challenges like constrained computational power, limited storage capacity, and finite battery life that hinder their ability to process extensive data efficiently. To address these issues, IoT devices are using the advantages of cloud and fog computing to process large tasks. However, task scheduling in cloud fog is another challenge as it is an NP-hard problem. In this study, we have introduced Cost, Load, Energy and Makespan based Optimized task scheduler (CLEMO) that assigns tasks to different cloud and fog nodes considering the cost, load, energy usage, and makespan involved in processing the dependent tasks. The CLEMO aims to identify optimal solutions for task scheduling in cloud fog by harnessing the inherent capabilities of genetic algorithms. To assess the performance of CLEMO, we conducted various exhaustive experiments and compared the results with other state-of-the-art methods. The outcomes demonstrate that the CLEMO outperforms other methods in terms of cost, load distribution, energy efficiency, and makespan. That indicated that the proposed method can make IoT applications more cost-efficient, conserve energy effectively with better execution time, and optimally utilize available resources in a cloud-fog environment.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"124 ","pages":"Article 110377"},"PeriodicalIF":4.0,"publicationDate":"2025-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143867921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An adaptive and large payload audio watermarking against jittering attacks 针对抖动攻击的自适应大载荷音频水印
IF 4 3区 计算机科学
Computers & Electrical Engineering Pub Date : 2025-04-24 DOI: 10.1016/j.compeleceng.2025.110321
Tianyu Yang , Canghong Shi , Minfeng Shao , Sani M. Abdullahi , Imran Mumtaz , Yong Liu , Ling Xiong
{"title":"An adaptive and large payload audio watermarking against jittering attacks","authors":"Tianyu Yang ,&nbsp;Canghong Shi ,&nbsp;Minfeng Shao ,&nbsp;Sani M. Abdullahi ,&nbsp;Imran Mumtaz ,&nbsp;Yong Liu ,&nbsp;Ling Xiong","doi":"10.1016/j.compeleceng.2025.110321","DOIUrl":"10.1016/j.compeleceng.2025.110321","url":null,"abstract":"<div><div>In most watermarking algorithms, the choice of parameters directly affects the performance of the algorithms, and they are not resistant to the jittering attacks or have insufficient capacity. To address the effect of parameters on performance, inadequate capacity, and jittering attacks of digital watermarking, we propose a high-capacity and adaptive watermarking based on Shamir secret sharing. By applying improved Shamir secret sharing encryption, one of the generated shares serves as the encrypted watermark. This enables the recovery of the original watermark by embedding only one-third of the total watermark information. Then, we embed and extract the encrypted watermark by calculating the ratio of the singular values of the front and back segments of each frame of the first-level Discrete Wavelet Transform (DWT) approximation coefficients. We also derived the optimal modification method in the embedding process using the signal-to-noise ratio (SNR) formula which further optimizes the performance of the proposed algorithm. Compared with state-of-the-art audio watermarking algorithms, the proposed algorithm is more robust and has higher capacity. The average value of the bit error rate (BER) is lower than 10% when the value of SNR is greater than 20 dB. For jittering attacks, the proposed scheme achieves an average BER of 2.34%. Additionally, the watermarking capacity reaches 128 bits per second (bps) and the watermarking scheme can efficiently defend against the jittering attack.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"124 ","pages":"Article 110321"},"PeriodicalIF":4.0,"publicationDate":"2025-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143867932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Entropy driven integrated fractional particle swarm optimization - gravitational search algorithm optimization expedition for optimal coordination of directional over current relays 熵驱动积分分数粒子群优化-重力搜索算法优化探索定向过电流继电器的最优协调
IF 4 3区 计算机科学
Computers & Electrical Engineering Pub Date : 2025-04-23 DOI: 10.1016/j.compeleceng.2025.110392
Asim Iqbal , Yasir Muhammad , Saeed Ehsan Awan , Bakht Muhammad Khan , Muhammad Asif Zahoor Raja
{"title":"Entropy driven integrated fractional particle swarm optimization - gravitational search algorithm optimization expedition for optimal coordination of directional over current relays","authors":"Asim Iqbal ,&nbsp;Yasir Muhammad ,&nbsp;Saeed Ehsan Awan ,&nbsp;Bakht Muhammad Khan ,&nbsp;Muhammad Asif Zahoor Raja","doi":"10.1016/j.compeleceng.2025.110392","DOIUrl":"10.1016/j.compeleceng.2025.110392","url":null,"abstract":"<div><div>The protective system is an essential part of all power network subsystems, including the protection systems of generation, transmission, and distribution networks, in order to ensure the integrity of the power system components, such as generators, bus bars, transformers, and feeder lines thus, a combination of different types of protection relays is utilized in the protection system, i.e., the prevention of the overcurrent, line to ground, line to line, double line to ground, faults in the associated system. In the current study, the performance of legacy power system protection is enhanced by means of reducing the total time of operation, including the directional over current relay (DOCR) operating time and coordination time among primary and backup DOCRs, while keeping the coordination time of interval (CTI), pickup tap setting (PTS), and time dial setting (TDS) within acceptable limits, during the protection of standard power system. In order to reduce the fitness evaluation function in IEEE 3-bus, 8-bus, and 15-bus systems, a new approach called fractional particle swarm optimization gravitational search algorithm entropy metric (FPSOGSA-EM) is designed for determining the optimal settings of the CTI, PTS, and TDS. The FPSOGSA-EM incorporates the underlying theories of fractional derivatives inside the mathematical framework of canonical particle swarm optimization aided with gravitational search algorithm along with entropy metric to improve its convergence rate and avoid sub optimality. The yielded results from FPSOGSA-EM are compared to those from other cutting-edge counterpart algorithms such as modified particle swarm optimization, modified water cycle technique, modified electromagnetic field optimization, enhanced grey wolf optimization, seeker algorithm, teaching learning-based optimization, harmony search algorithm and FPSOGSA. By sharply reducing the period of operation of DOCRs in traditional IEEE 3-bus, 8-bus, and 15-bus test systems, the FPSOGSA-EM has outperformed these previously described methods. While the consistency, robustness, optimization brilliance, reliability and stability of the proposed scheme are ascertained by means of statistical interpretations such as minimum fitness evolution, cumulative distribution function (CDF), Boxplot representations, histograms plots and quantile–quantile plot demonstrations as a measure of center tendency and diversity.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"124 ","pages":"Article 110392"},"PeriodicalIF":4.0,"publicationDate":"2025-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143859000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信