Recent Advances in Electrical & Electronic Engineering - Volume 18, Issue 5, 2025
Volume 18, Issue 5, 2025
-
-
Current State of Deepfake Detection and Generation: A Review
Authors: Ruby Chauhan, Isha Kansal, Renu Popli, Rajeev Kumar and Ashutosh SharmaEmploying machine learning algorithms to produce synthetic media, known as deepfake technology, has garnered considerable interest in contemporary times owing to its capacity for both favorable and unfavorable implications. The paper thoroughly examines deepfake technology, encompassing its creation and identification methods and its legal, ethical, and societal ramifications. The article commences by presenting a comprehensive summary of the technology behind deepfake and its fundamental machine-learning algorithms. The subsequent discourse pertains to the basic metrics employed in assessing deepfake generation, the identification methodologies, and the prevalent benchmarks and datasets utilized for evaluating these algorithms. The study thoroughly examines deepfake technology, encompassing its methods of generation and detection, metrics for evaluation, datasets for benchmarking, and the challenges and constraints associated with its use. The review scrutinizes diverse techniques for generating deep fakes, encompassing Generative Adversarial Networks (GANs), autoencoders, and neural networks. Style transfer, alongside their corresponding metrics for evaluation, namely Peak Signal-to-Noise Ratio (PSNR), Structural Similarity Index (SSIM), Fréchet Inception Distance (FID), and Inception Score (IS). The text delves into an analysis of deepfake detection techniques, encompassing image and video-based methodologies and the corresponding evaluation metrics. These metrics include accuracy, recall, F1 score, accuracy, AUC-ROC, and AUC-PR. The article additionally examines the benchmarks and datasets employed to evaluate the efficacy of deepfake detection algorithms. These include the Deepfake Detection Challenge (DFDC), the FaceForensics++, Celeb-DF, and DeeperForensics-1.0 datasets. This paper presents an overview of the challenges and limitations of generating and detecting deepfakes.
-
-
-
Safeguarding Software-Defined Networks: Comprehensive Frameworks and Best Practices for Security Threat Mitigation
Authors: Jyoti Verma, Manish Snehi, Isha Kansal, Rajiv Kumar, Kanu Goel and Ranvijay SinghThe proliferation of IoT devices such as sensors, actuators, sensors, and other endpoints has resulted in a significant surge in data generation. Ensuring the security and efficiency of data transmission necessitates the implementation of an internet design that possesses the capability to scale as required. This study investigates the potential impact of SDN on enhancing the performance of IoT networks. This study examines the ability to adapt network resources in real-time to meet the demands of IoT applications. It is imperative to address the security vulnerabilities in the SDN architecture to ensure secure and reliable network operations. This paper thoroughly examines the challenges, various security solutions, and recommended practices for effectively protecting SDN infrastructures. This study comprehensively analyzes the pertinent scholarly works, conducts a comparative analysis of diverse security approaches, and assesses their respective advantages and limitations. The need for further investigation into the security aspects of SDN is also acknowledged. This article highlights the importance of enhancing security practices, implementing continuous monitoring, and identifying potential threats. Additionally, it presents case studies that exemplify real-world security challenges associated with SDN. Further, this study incorporates security solutions into SDN frameworks, emphasizing the significance of meticulous strategic preparation, comprehensive testing, and ongoing upkeep to ensure seamless interoperability with current systems. This study is significant as it contributes to the expanding literature on security in SDN. The comprehensive examination of existing literature, meticulous analysis, thorough review of security approaches, identification of issues and limitations, and exploration of potential avenues for future research in this work render it a valuable resource for researchers and practitioners investigating SDN security. The primary objective of this study is to improve the reproducibility and pragmatic assessment of security measures in SDN settings. This study provides comprehensive information on implementation, testbed settings, datasets, and experimental procedures to promote transparency and repeatability. The study presents findings from extensive testing and benchmarking, showcasing the effectiveness of security solutions in addressing different types of threats. The study focuses on achieving a harmonious equilibrium between accuracy and efficient utilization of resources. The primary objective of this study is to improve the reproducibility and pragmatic assessment of security measures in SDN settings. This study includes comprehensive information on implementation, testbed configuration, datasets, and experimental procedures to promote transparency and reproducibility. The study presents empirical evidence and analysis to support the effectiveness of security solutions in addressing different types of threats. It specifically focuses on achieving a trade-off between accuracy and efficient use of resources.
-
-
-
A Novel Time-frequency Domain Reflectometry Method Based on S-transform for Power Cable Defect Localization
By Lei ZhangBackgroundThe large-scale aging of cross-linked polyethylene (XPLE) leads to an increase in the frequency of power cable accidents, which poses a threat to the safe operation of the power grid.
ObjectiveTraditional time-frequency domain reflectometry (TFDR) techniques for fault localization in power cables are susceptible to cross-terms interference, which makes it impossible to accurately locate defects. To overcome the limitation, this paper has proposed a novel cable fault localization method based on S-transform.
MethodsThe method employs S-transform to perform time-frequency analysis on the collected signals of TFDR, mapping the time-domain signals into time-frequency domain signals. Then, cross-correlation of the time-frequency domain signals is estimated, allowing for accurate positioning of cable defects.
ResultsThe results of the field experiments conducted on a 10 kV cross-linked polyethylene cable with artificially introduced defects have demonstrated that the proposed method could effectively locate the cable defects with small absolute error.
ConclusionCompared to existing TFDR methods, the proposed method has been found to be free from interference of cross-terms, resulting in higher reliability and smaller blind spots for detecting cable defects.
-
-
-
Distributed Dynamic State Estimation of Power Systems Considering Dynamic State Constraints based on Phasor Measurements Units
Authors: Juan Li, Jia-ming Wang, Yun-long Jiang, XiongYang1, Mao-lin Zhu and Hao LiuBackgroundDynamic state estimation can provide detailed information about power systems. However, there is no clear, dynamic equation for the state transition of bus voltages in power systems. Currently, smoothing methods based on historical data are commonly used, but they cannot ensure accurate state prediction in power systems with a large amount of renewable energy. Moreover, the fast sampling rate of phasor measurement units generates a vast amount of real-time data for the dispatch center, making it challenging for centralized state estimation to meet real-time demands.
ObjectiveThis paper proposes a distributed power system state estimation considering dynamic state constraints to address the above issues.
MethodsBy incorporating the constraints between the dynamic states of the system dynamic components and the bus voltage phasors, the state transition equations for bus voltage phasors are constructed based on the predicted dynamic states and the nodal injection power equations. This allows taking the dynamic model constraints into account when predicting bus voltage phasors. Then, based on the principle of hierarchical coordination and distributed state estimation, the method of estimation-coordination-correction is adopted to acquire system state information quickly and accurately.
ResultsFurthermore, an IEEE 9-bus system and an IEEE 39-bus system are used to validate the proposed method. The proposed method is compared with other algorithms to prove its superiority.
ConclusionThe simulation results show that the proposed method can effectively improve the accuracy of the state estimation results of power systems under dynamic conditions.
-
-
-
Fault Feature Mining and Identification Method of 10kV XLPE Cable Combining SAE and RF
Authors: Taibiao Liu, Jin Zhang, Yibing Xie and Jingkang ZhangBackgroundFeature extraction methods such as statistical features and image features based on traditional partial discharge spectrograms require the support of expert experience and prior knowledge, making their engineering applications have significant limitations. Currently, electrical equipment fault diagnosis is moving towards intelligent and scientific directions, and how to apply deep learning methods for more accurate, intelligent, and autonomous diagnosis has become a hot issue in the current field.
MethodsThe construction and optimal selection of high-voltage cable partial discharge feature space is an important means to improve recognition accuracy. This paper proposes a new method that can independently and deeply mine partial discharge image features to quickly identify partial discharge types. Firstly, a self encoder is used to encode and decode partial discharge images, and a multi-level stack structure is used to achieve the goal of deep feature mining; then, the partial discharge data features decoded based on a stack self encoder are imported into a random forest network for type recognition; Finally, based on the random forest algorithm, the redundant feature space is optimized and compared with other traditional recognition methods.
ResultsThe recognition accuracy of the proposed method is about 10% higher than that of traditional methods.
ConclusionThe optimized feature parameters can maintain more than 90% recognition accuracy in both random forest algorithms, common support vector machines, and BP neural networks, proving the feasibility and effectiveness of the method in this paper.
-
-
-
Rural Photovoltaic Storage and Charging Integrated Charging Station Capacity Allocation Strategy based on Tariff Compensation Mechanism
Authors: Yongxiang Cai, Hao Bai, Lei Wang, Xiaobing Xiao, Wei Li and Yang WangBackgroundIn order to help the “carbon peaking and carbon neutrality goals”, the current new energy vehicle to the countryside policy for the local use of renewable energy and demand-side carbon reduction provides a good opportunity but also requires rural townships and villages of electric vehicle charging infrastructure planning ahead. However, due to the current low rural electric vehicle ownership, the charging price compensation mechanism is not yet perfect, resulting in the planning period of electric vehicle growth and the willingness to respond to the tariff compensation policy is difficult to accurately assess.
MethodsThis paper proposes a rural photovoltaic storage and charging integrated charging station capacity allocation strategy based on the tariff compensation mechanism. Firstly, we construct a spatial-temporal dynamic distribution model of rural EV charging load coupled with distribution network - transportation network, and on this basis, we consider the rural EV charging time-sharing tariff and tariff compensation policy incentive, and amend the EV charging load transfer model; and then we construct an optimization planning model of charging station with the goal of minimizing the cost of construction, operation and maintenance, and maximizing the charging benefit of the integrated charging station in the rural area, and obtain the optimal synergistic planning scheme under the tariff compensation mechanism in the planning period.
ResultsThe optimal collaborative planning scheme under the electricity price compensation mechanism is obtained, and the correctness and validity of the proposed optimal planning method of the rural optical storage charging station under the electricity price compensation mechanism is verified by the example, which is of positive significance in the promotion of the charging facilities to go to the countryside in an appropriate manner, and in the stimulation of the willingness of the rural consumers in the townships to purchase vehicles.
Conclusion(1) The spatial and temporal distribution and transfer model of rural EV charging loads with price incentives is constructed by taking into account the preferential charging price policies such as rural time-sharing tariff and tariff compensation mechanism. By comparing the operating revenues of optical storage-charging integrated charging stations with and without time-sharing tariffs and tariff compensation policies, we verified the incentive effect of multiple types of price incentives for the over-planning of rural electric vehicle charging facilities. (2) The proposed optimal configuration method of rural photovoltaic, storage and charging integration charging station can realize the in-situ utilization of rural renewable energy, tap the price competitiveness of photovoltaic, storage and charging integration, and weaken the cost of electricity consumption. By comparing the optimized configuration scheme with and without joint planning, it is verified that the moderate configuration of in-situ photovoltaic and energy storage equipment on the basis of the planning of charging piles brings benefits far exceeding the investment cost, and has a great role in increasing the operational efficiency of rural charging facilities.
-
-
-
Mirror Symmetry Coils for Foreign Object Detection and Location with Wireless Power Transmission
More LessBackgroundWireless power transmission technology effectively avoids safety issues caused by accidental contact, wire aging, and friction. However, due to the presence of foreign objects, other severe accidents such as fire hazard can occur, and the charging system can be interfered with and even damaged by the foreign objects.
MethodsTherefore, this paper proposes (MSD) mirror symmetry detection coils to detect and locate foreign objects. First, we conduct theoretical analysis and derive formulas to validate our proposed method. Next, we employ ANSYS Maxwell to simulate the (WPT) wireless power transmission system, considering various sizes and materials of foreign objects and comparing them to a system without foreign objects.
ResultsFurthermore, we conducted experiments using mirror symmetrical detection coils to detect and locate foreign objects, providing additional verification for our proposed method.
ConclusionThe simulation and experimental results show that the proposed method of mirror symmetry detection coils can effectively identify and locate the foreign objects.
-
-
-
An Advanced Encryption Algorithm for Enhancing Data Security in Cloud Computing
Authors: R. Anandh, A. Swaminathan, Swati Dhondiram Jadhav, P. Valarmathi, N. Gopinath and Kanchan S. TiwariAimCloud computing (CC) is a revolutionary new archetype in which users pool their computing resources to provide greater efficiency for everyone. Data become increasingly vulnerable to diverse security threats from attackers when millions of users circulate the same network for data transmission. Protecting these reports has shifted to the vanguard of priorities. The existing data security approach prioritizes protecting data at rest in cloud storage but gives less thought to protecting data in transit. During transmission, the data are vulnerable to intrusion attempts.
MethodsThe third-party auditor is provided access to data during the transfer phase, which is also the current pattern. As the attacker can now pose as a trusted third party, it makes the data more susceptible to unauthorized access. However, growing concerns regarding data privacy and security have made outsourcing sensitive information to faraway data centers difficult. As a result, new security concerns in the cloud necessitate an improved version of the tried-and-true advanced encryption standard (AES) algorithm. Key aspects presented in this study include a secure and private framework for owner data. It improves upon the 128 AES technique by adding a second round of encryption using a different key, allowing for a throughput of 1000 blocks per second. However, the standard method uses a single round key and only 800 blocks per second. The suggested approach reduces energy consumption, improves load distribution, and optimizes network trust and resource management.
ResultsThe proposed architecture allows for the use of AES with cipher lengths of 16, 32, 64, and 128 bytes. The effectiveness of the algorithm in terms of attaining target quality metrics is illustrated graphically via simulation results. This strategy reduces power consumption by 13.23%, network utilization by 12.43%, and delay by 16.53%, according to the outcomes.
ConclusionAs a result, the recommended architecture enhances safety, cuts down on wasted resources, and speeds up the rollout of computational cloud services.
-
-
-
Multilingual Speaker Recognition using Mel-frequency Cepstral Coefficients and Gaussian Mixture Model
Authors: Mayur Rahul, Sonu Kumar Jha, Ayushi Prakash, Sarvachan Verma and Vikash YadavIntroductionPeople can recognize a speaker with the help of their voice via mobile or digital devices.
MethodsTo obtain this congenital human being ability, authentication techniques based on speaker biometrics like automated speaker recognition (ASR) have been proposed. An ASR identifies speakers by speech signals analysis and salient feature extraction from their voices.
ResultsThis will become an important part of recent research in the voice biometrics field. This paper proposes multilingual speaker recognition with the help of MFCC as feature extraction and GMM as classification techniques using various available datasets such as TIMIT, librespeech, etc.
ConclusionThe results achieved from the given datasets enhance the recognition rate of 70.98% with MFCC.
-
Most Read This Month
