Computers & Electrical Engineering最新文献

筛选
英文 中文
QBCMVT: An effective quantum based coati-mobilevit model for intrusion detection in IIoT QBCMVT:用于工业物联网入侵检测的有效量子涂层-移动模型
IF 4 3区 计算机科学
Computers & Electrical Engineering Pub Date : 2025-06-18 DOI: 10.1016/j.compeleceng.2025.110503
Surendra Reddy Vinta , Giribabu Sadineni , Kunda Suresh Babu , Srinivasa Rao Pokuri
{"title":"QBCMVT: An effective quantum based coati-mobilevit model for intrusion detection in IIoT","authors":"Surendra Reddy Vinta ,&nbsp;Giribabu Sadineni ,&nbsp;Kunda Suresh Babu ,&nbsp;Srinivasa Rao Pokuri","doi":"10.1016/j.compeleceng.2025.110503","DOIUrl":"10.1016/j.compeleceng.2025.110503","url":null,"abstract":"<div><div>The widespread usage of the Industrial Internet of Things (IIoT) in industrial environments has increased the possibilities of security risks and attacks. To prevent the network from attacks, intrusion detection systems (IDS) are developed to identify hostile activity inside the network flow, in which deep learning and machine learning play a significant role. However, most of the IDS solutions suffer from large feature dimensions, models based on outdated datasets, a lack of attention to the issue of imbalanced datasets, and a lack of comprehensiveness about the types of attacks. As a result, this study introduces a Quantum-based Coati-MobileViT (QBCMVT) model intended for IIoT network analysis and malicious activity detection. In this work, to obtain the best feature subset, the Quantum based Coati optimization algorithm (QCOA) calculates the significance value for each input feature. This allows it to remove duplicate and disruptive characteristics. These features are then processed by a deep learning network based on MobileViT to identify IIoT network behaviour. Moreover, we have utilized a Tabular Generative Adversarial Network (TGAN) based data augmentation method to address the problem of data imbalance. The effectiveness of the QBCMVT framework is evaluated by the Edge-IIoT and WUSTL-IIoT-2021 datasets. The improved performance and efficacy of the suggested model are further illustrated by a thorough comparison with existing ML and DL models and with pertinent studies.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"126 ","pages":"Article 110503"},"PeriodicalIF":4.0,"publicationDate":"2025-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144306960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Wireless embedded wearable haptic assistance navigation device based on networked technology for the visually impaired 基于网络技术的视障人士无线嵌入式可穿戴触觉辅助导航装置
IF 4 3区 计算机科学
Computers & Electrical Engineering Pub Date : 2025-06-18 DOI: 10.1016/j.compeleceng.2025.110540
Shang-Hsien Liu , Guo-Hua Feng
{"title":"Wireless embedded wearable haptic assistance navigation device based on networked technology for the visually impaired","authors":"Shang-Hsien Liu ,&nbsp;Guo-Hua Feng","doi":"10.1016/j.compeleceng.2025.110540","DOIUrl":"10.1016/j.compeleceng.2025.110540","url":null,"abstract":"<div><div>This paper presents HAND (Haptic Assistance Navigation Device), a wearable device designed to help people with visual impairments navigate their surroundings more safely and independently. Worn on the back of the hand, HAND uses a combination of an ultrasonic sensor and an infrared Time-of-Flight sensor to detect obstacles. When an obstacle is detected, HAND provides clear and precise tactile feedback through small vibrating motors, giving the user immediate information about their environment. The paper details the device's design, including its power system, how the sensors work together, and the vibration feedback system. The performance of the device is ensured through extensive testing procedures. Our tests showed that both sensors are highly accurate, detecting distances with very little error. We also confirmed that the vibration motors respond quickly and provide easily noticeable feedback. Demonstrations with users indicate that HAND successfully identifies obstacles and helps users understand their environment through touch. Looking ahead, HAND has the potential for further improvements, such as integrating a sensor to track spatial orientation and refining the vibration system. As a component of a larger electronic travel aid, HAND shows great promise in significantly assisting individuals with visual impairments.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"126 ","pages":"Article 110540"},"PeriodicalIF":4.0,"publicationDate":"2025-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144306962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Rewriting blockchain: A hybrid consensus that defeats the trilemma paradox 改写b区块链:击败三难悖论的混合共识
IF 4 3区 计算机科学
Computers & Electrical Engineering Pub Date : 2025-06-17 DOI: 10.1016/j.compeleceng.2025.110494
G.M. Abdullah Al-Kafi , Golam Ali , Saha Reno
{"title":"Rewriting blockchain: A hybrid consensus that defeats the trilemma paradox","authors":"G.M. Abdullah Al-Kafi ,&nbsp;Golam Ali ,&nbsp;Saha Reno","doi":"10.1016/j.compeleceng.2025.110494","DOIUrl":"10.1016/j.compeleceng.2025.110494","url":null,"abstract":"<div><div>Existing blockchain consensus algorithms encounter significant challenges regarding security, time efficiency, and versatility in rapidly evolving environments. This research addresses these issues by proposing and implementing a novel consensus algorithm aimed at overcoming the blockchain trilemma, achieving a balance triad of decentralization, security, and scalability. Built on a federated Byzantine agreement method, the proposed consensus integrates advanced features from diverse consensus methodologies to achieve an optimal balance. By incorporating adaptive validation procedures, such as iteratively refining consensus and dynamically adapting its validation criteria to accommodate varying network conditions, the adaptability is improved. Security is strengthened through a fault tolerance protocol, such as redundancy strategy, dynamic quorum adjustments and decentralized fault detection, combined with a robust identity management system system, providing robust protection against malicious entities. This proposed consensus also optimizes scalability by streamlining the consensus mechanism and utilizing a nomination and ballot protocol. Empirical analysis of the proposed consensus performance reveals a transaction throughput of 527 TPS and a reduced latency of 45 ms, ensuring secure transactions. The system exhibits a notable reduction in block time, achieving a 90.9% safeguard against the risk of double-spending attacks, while maintaining a low fork probability of 10%. The proposed system ensures higher chain quality and resilience against adversarial mining. The consensus is quantitatively assessed for decentralization with a notable score of 8.104 out of 10, underscoring its efficacy in maintaining a distributed ledger that is both secure and scalable.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"126 ","pages":"Article 110494"},"PeriodicalIF":4.0,"publicationDate":"2025-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144298693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Assessing the impact of Modbus/TCP protocol attacks on critical infrastructure: WWTP case study 评估Modbus/TCP协议攻击对关键基础设施的影响:WWTP案例研究
IF 4 3区 计算机科学
Computers & Electrical Engineering Pub Date : 2025-06-17 DOI: 10.1016/j.compeleceng.2025.110485
Valentine Machaka , Santiago Figueroa-Lorenzo , Saioa Arrizabalaga , Beñat Elduayen-Echave , Josune Hernantes
{"title":"Assessing the impact of Modbus/TCP protocol attacks on critical infrastructure: WWTP case study","authors":"Valentine Machaka ,&nbsp;Santiago Figueroa-Lorenzo ,&nbsp;Saioa Arrizabalaga ,&nbsp;Beñat Elduayen-Echave ,&nbsp;Josune Hernantes","doi":"10.1016/j.compeleceng.2025.110485","DOIUrl":"10.1016/j.compeleceng.2025.110485","url":null,"abstract":"<div><div>Cyberattacks pose significant risks to the safety and functionality of industrial control systems (ICS), particularly in critical sectors such as water. Understanding the implications of these cyberattacks is essential for evaluating their environmental and economic repercussions to develop defensive strategies and implement security mechanisms. This study seeks to create a controlled and reproducible virtualised ICS testbed, enabling a risk-free environment for cybersecurity testing. Based on the IEC 62264 Industrial Automation Pyramid (IAP), the proposed virtual ICS testbed features a scalable multi-layered network architecture that supports multiple ICS protocols. This case study features an Operational Technology (OT) environment with a digital twin of a Wastewater Treatment Plant (WWTP) developed using MATLAB/Simulink, OpenPLC and SCADA-LTS. The MITRE ATT&amp;CK adversary emulation technique was utilised to assess the potential impacts of Modbus/TCP protocol attacks on a WWTP industrial process by targeting levels 1 and 2 of the IAP. The findings highlight the necessity for threat emulation to simulate real-world attack scenarios, vulnerability assessments, and operational impact analysis. Furthermore, establishing robust detection mechanisms guarantees that threats are identified early, minimising potential risks to operational integrity and environmental safety. In conclusion, the significance of creating ICS testbeds for cybersecurity testing is emphasised, ultimately suggesting directions for future research.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"126 ","pages":"Article 110485"},"PeriodicalIF":4.0,"publicationDate":"2025-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144298694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Stress detection through wearable EEG technology: A signal-based approach 基于可穿戴EEG技术的应力检测:一种基于信号的方法
IF 4 3区 计算机科学
Computers & Electrical Engineering Pub Date : 2025-06-17 DOI: 10.1016/j.compeleceng.2025.110478
Rakesh Kumar Rai, Dushyant Kumar Singh
{"title":"Stress detection through wearable EEG technology: A signal-based approach","authors":"Rakesh Kumar Rai,&nbsp;Dushyant Kumar Singh","doi":"10.1016/j.compeleceng.2025.110478","DOIUrl":"10.1016/j.compeleceng.2025.110478","url":null,"abstract":"<div><div>Accurate and non-invasive stress detection is critical for mental health monitoring and early intervention. Among various physiological signals, electroencephalography (EEG) offers a unique advantage as it captures direct neural activity, making it more responsive to cognitive and emotional stress compared to peripheral markers like heart rate or skin conductance. In this work, we propose a novel EEG-based stress detection framework that combines Fuzzy Attention-based Fully Convolutional Network (FA-FCN) for dynamic signal segmentation, Hybrid Wavelet-Short-Time Fourier Transform (HW-STFT) for rich time–frequency feature extraction, Recursive LASSO (RLASSO) for optimal feature selection, and an Adam-Optimized Sequential Generative Adversarial Network (AOS-GAN) for robust classification. Each component is specifically designed to address the limitations of existing methods FA-FCN enhances signal relevance by focusing on stress-related EEG regions, while HW-STFT captures transient frequency shifts with high resolution. RLASSO improves computational efficiency by reducing dimensionality, and AOS-GAN enhances classification in imbalanced conditions using adversarial learning. Our model achieves an accuracy of 94%, significantly outperforming other state-of-the-art methods, which typically report accuracies around 85%–89%. This demonstrates the model’s strong potential for real-world deployment in high-stress environments such as emergency response, cognitive workload monitoring, or workplace mental health systems. Future work will focus on validating this approach across larger and more diverse EEG datasets, enabling real-time deployment on edge devices, and exploring multimodal integration with other physiological signals for holistic stress assessment.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"126 ","pages":"Article 110478"},"PeriodicalIF":4.0,"publicationDate":"2025-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144298696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A neural cantonese speech converter using QCA for nanocomputing 基于QCA的纳米计算神经广东话语音转换器
IF 4 3区 计算机科学
Computers & Electrical Engineering Pub Date : 2025-06-17 DOI: 10.1016/j.compeleceng.2025.110536
Angshuman Khan , Rohit Kumar Shaw , Ali Newaz Bahar
{"title":"A neural cantonese speech converter using QCA for nanocomputing","authors":"Angshuman Khan ,&nbsp;Rohit Kumar Shaw ,&nbsp;Ali Newaz Bahar","doi":"10.1016/j.compeleceng.2025.110536","DOIUrl":"10.1016/j.compeleceng.2025.110536","url":null,"abstract":"<div><div>This research explores the pioneering integration of Quantum-dot Cellular Automata (QCA) for designing a combinational neuro-fuzzy logic circuit within a feedforward neural network-based Cantonese speech converter. Cantonese, a tonal language with intricate phonetic structures, presents substantial speech recognition and synthesis challenges. The proposed QCA-based speech conversion circuit leverages the quantum mechanical tunnelling properties of quantum dots to achieve ultra-fast processing, minimal power dissipation, and enhanced energy efficiency, making it a highly suitable alternative to conventional speech recognition systems. The architectural design ensures precise phonetic recognition, tone preservation, and high intelligibility, optimizing real-time speech processing. Simulation results confirm that the circuit consumes only 2.338 nanowatts of power, demonstrating a 45 % enhancement in energy-delay cost compared to conventional speech recognition systems. Additionally, the proposed system achieves excellent recognition accuracy for frequently used Cantonese keywords in eBook reading applications. The study underscores QCA’s transformative potential in low-power nanocomputing, positioning it as a breakthrough technology for efficient, high-speed, and sustainable speech processing in next-generation natural language interfaces.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"126 ","pages":"Article 110536"},"PeriodicalIF":4.0,"publicationDate":"2025-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144306961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
3DSPECSN: Adaptive 3D spatial patch based siamese network for robust hyperspectral image analysis 3DSPECSN:基于自适应三维空间补丁的暹罗网络,用于鲁棒高光谱图像分析
IF 4 3区 计算机科学
Computers & Electrical Engineering Pub Date : 2025-06-16 DOI: 10.1016/j.compeleceng.2025.110520
Ravikant Kumar Nirala , Gautam Kumar , Rishav Singh , Chandra Prakash
{"title":"3DSPECSN: Adaptive 3D spatial patch based siamese network for robust hyperspectral image analysis","authors":"Ravikant Kumar Nirala ,&nbsp;Gautam Kumar ,&nbsp;Rishav Singh ,&nbsp;Chandra Prakash","doi":"10.1016/j.compeleceng.2025.110520","DOIUrl":"10.1016/j.compeleceng.2025.110520","url":null,"abstract":"<div><div>The classification of hyperspectral image (HSI) remains a challenging task due to high dimensionality, spatial correlation of the features and variability of the HSI data sources. This research introduces 3D Spatial Patch Extraction (3DSPE) technology which uses a Siamese Network framework to successfully capture multi-dimensional spectral-spatial data patterns for enhanced unmixing outcomes. The 3DSPE technique generates superior multiple spectral mixture signature detection due to its fusion of spectral and spatial features. The performance increases for endmember recovery and spatial distribution analysis when spectral patterns combine with spatial dependencies through the implementation of a Siamese Network architecture. A trainable image stratification approach for hyperspectral data increases speed of convergence and limits overfitting and builds generalized performance through adaptive optimization techniques at lower processing times for large datasets. The proposed framework shows strong performance in terms of Overall Accuracy (OA), Average Accuracy (AA), and Kappa Coefficient (κ) measurements from Indian Pines, Pavia University, and Salinas tests which attains nearly 99 % accuracies. The methodology not only achieved high accuracy, also enabling stable development of improved hyperspectral unmixing models that deliver better remote sensing results through improved precision along with enhanced flexibility and scalability. The approach provides a scalable efficient solution which can be applied to multiple remote sensing tasks, land-cover analyses and resource monitoring operations with potential seamless integration of other spectral analysis tools.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"126 ","pages":"Article 110520"},"PeriodicalIF":4.0,"publicationDate":"2025-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144298695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Image encryption architecture exploiting finite-precision error for System-on-Chip and programmable logic devices 利用片上系统和可编程逻辑器件有限精度误差的图像加密体系结构
IF 4 3区 计算机科学
Computers & Electrical Engineering Pub Date : 2025-06-15 DOI: 10.1016/j.compeleceng.2025.110482
Arthur M. Lima , Lucas G. Nardo , Erivelton Nepomuceno , Janier Arias-Garcia , Jones Yudi
{"title":"Image encryption architecture exploiting finite-precision error for System-on-Chip and programmable logic devices","authors":"Arthur M. Lima ,&nbsp;Lucas G. Nardo ,&nbsp;Erivelton Nepomuceno ,&nbsp;Janier Arias-Garcia ,&nbsp;Jones Yudi","doi":"10.1016/j.compeleceng.2025.110482","DOIUrl":"10.1016/j.compeleceng.2025.110482","url":null,"abstract":"<div><div>Security in interconnected System-on-Chip (SoC) devices is increasingly critical as their adoption expands, driving demand for cryptographic solutions that are both robust and cost-effective. Hence, this work addresses the challenges of implementing chaos-based encryption schemes on digital hardware by introducing a novel image encryption approach based on the mathematical complexity of Chua’s circuit. It exploits finite-precision computational errors as a noise-like entropy source within the encryption process. Using High-Level Synthesis (HLS) with C/C<span><math><mrow><mo>+</mo><mo>+</mo></mrow></math></span>, we implement two parallelized Digital Chua’s Circuits (DCCs), each numerically resolved via the fourth-order Runge–Kutta method and using distinct natural interval extensions. The lower-bound error is then extracted from the chaotic circuits and used to generate the final keystream. Optimized for IEEE-754 floating-point arithmetic, our stream cipher enables efficient hardware synthesis and achieves high cryptographic performance, reaching the target error threshold within a few clock cycles. The proposed image encryption design passes the NIST SP 800-22 test suite and achieves strong NPCR and UACI scores (over 99.6 % and 33.4 %, respectively), demonstrating efficiency and robustness against common attacks. Moreover, implemented on a ZCU104 evaluation board, the architecture can process one pixel in just 70 clock cycles with a low energy cost of 0.42 <span><math><mrow><mi>μ</mi><mi>J</mi></mrow></math></span> using only 48 DSPs (2.48 % of available resources). By bridging chaotic dynamics and practical SoC architectures, this work provides an encryption solution that balances hardware consumption and energy efficiency.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"126 ","pages":"Article 110482"},"PeriodicalIF":4.0,"publicationDate":"2025-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144291477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Stealthy Backdoor Attacks on Graph Neural Networks via Relational Constraint Modeling 基于关系约束建模的图神经网络隐形后门攻击
IF 4 3区 计算机科学
Computers & Electrical Engineering Pub Date : 2025-06-14 DOI: 10.1016/j.compeleceng.2025.110483
Deshan Yang , Limin Pan , Jinjie Zhou , Senlin Luo , Peng Luan
{"title":"Stealthy Backdoor Attacks on Graph Neural Networks via Relational Constraint Modeling","authors":"Deshan Yang ,&nbsp;Limin Pan ,&nbsp;Jinjie Zhou ,&nbsp;Senlin Luo ,&nbsp;Peng Luan","doi":"10.1016/j.compeleceng.2025.110483","DOIUrl":"10.1016/j.compeleceng.2025.110483","url":null,"abstract":"<div><div>Graph Neural Networks (GNNs) have achieved significant success in tasks like node and graph classification, yet they remain vulnerable to backdoor attacks. Traditional attack methods often rely on node feature manipulation, neglecting the structural relationships within graphs, which makes their triggers more detectable. To address this limitation, we propose a <u>R</u>elationally <u>C</u>onstrained <u>C</u>onditional GAN <u>B</u>ackdoor <u>A</u>ttack (RCCBA). Our method employs a hybrid expert model that combines diverse graph neural network architectures to capture both feature and structural information, thus enabling more robust trigger node selection via a centrality-based rule that identifies nodes with minimal impact on neighboring nodes. Additionally, relationship constraints ensure that the triggers generated by the conditional GAN closely mimic the original graph, enhancing imperceptible and attack success. Experimental results demonstrate that RCCBA achieves an average attack success rate exceeding 90% with a minimal poisoning rate of less than 0.1%, and successfully circumvents pruning-based and outlier detection defenses. The real-world implications of this work are significant for domains such as social networks, recommendation systems, and fraud detection, and our findings highlight the need for future defense strategies that address both feature and structural vulnerabilities in GNN security.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"126 ","pages":"Article 110483"},"PeriodicalIF":4.0,"publicationDate":"2025-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144279906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure and optimized drone swarm operations with decentralized Adaptive Differential Evolution 基于分散自适应差分进化的安全优化无人机群操作
IF 4 3区 计算机科学
Computers & Electrical Engineering Pub Date : 2025-06-14 DOI: 10.1016/j.compeleceng.2025.110487
Usama Arshad , Zahid Halim
{"title":"Secure and optimized drone swarm operations with decentralized Adaptive Differential Evolution","authors":"Usama Arshad ,&nbsp;Zahid Halim","doi":"10.1016/j.compeleceng.2025.110487","DOIUrl":"10.1016/j.compeleceng.2025.110487","url":null,"abstract":"<div><div>Efficient drone swarm management requires real-time adaptive optimization and secure decentralized communication to ensure robust performance in dynamic environments. Traditional optimization methods such as Particle Swarm Optimization (PSO) and Genetic Algorithms (GA) suffer from premature convergence and lack the adaptability required for large-scale swarm coordination. Similarly, centralized communication frameworks introduce security vulnerabilities, including single points of failure and susceptibility to cyberattacks. This study presents a novel integration of Adaptive Differential Evolution (ADE) and blockchain technology, leveraging ADE’s dynamic parameter tuning to improve swarm intelligence while utilizing blockchain’s decentralized ledger to secure inter-drone communication. The proposed framework was evaluated through extensive simulations on drone swarms ranging from 20 to 200 drones, demonstrating a 27% improvement in convergence speed and a 35% increase in task efficiency compared to PSO-based methods. Blockchain integration ensured 99.3% data integrity, preventing unauthorized modifications and cyber threats such as man-in-the-middle attacks and data corruption attempts. Energy consumption analysis indicated that ADE reduced power usage by 18% compared to traditional heuristic approaches. Additionally, adversarial testing revealed that denial-of-service (DoS) resilience improved by 42% due to the blockchain’s consensus validation mechanisms. These results highlight the feasibility of secure and adaptive drone swarm management, making it suitable for real-world applications in disaster response, autonomous surveillance, and smart logistics.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"126 ","pages":"Article 110487"},"PeriodicalIF":4.0,"publicationDate":"2025-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144279909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信