To see the other types of publications on this topic, follow the link: Power tampering.

Journal articles on the topic 'Power tampering'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Power tampering.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Agarwal, Shubham, and Mayur Agarwal. "Wireless Power Theft Monitoring System." International Journal of Advance Research and Innovation 1, no. 2 (2013): 36–39. http://dx.doi.org/10.51976/ijari.121309.

Full text
Abstract:
The scope of this paper is to identify the most commonly adapted techniques of power tampering. We detect the tampering methods by means of respective embedded circuit and intimate it to the electricity board via sound buzzer alert, our microcontroller circuit controlling one relay which is transmitting power supply from main meter to sub meter if somebody tempered meter m/c switch of current supply. M/c display all the consumption unit of both meters on LCD. This tampering information is transmitted to electricity board via transmitter and receiver module which with further advancement can ta
APA, Harvard, Vancouver, ISO, and other styles
2

Tan, Huijuan, Wenxin Guo, Shiming Li, Wenjie Zheng, and Qian Li. "Power system topological node tamper detection method based on fuzzy graph theory." Journal of Physics: Conference Series 2728, no. 1 (2024): 012077. http://dx.doi.org/10.1088/1742-6596/2728/1/012077.

Full text
Abstract:
Abstract Power system involves a large number of nodes and lines, and the topology is very complex. In such a complex network, node tamper detection needs to consider a variety of combinations and connection modes, which increases the complexity of the problem. Therefore, a new method of topological node tamper detection based on fuzzy graph theory is proposed. The feature difference values of topological nodes are extracted according to the node tampering feature vector. Detection of topological node similarity based on fuzzy graph-neural network. Based on this, the cost function of topologic
APA, Harvard, Vancouver, ISO, and other styles
3

Khan, Shagufta, and Manoj Saini. "A comprehensive study on energy meters and power tampering attempts." International Journal of Applied Power Engineering (IJAPE) 10, no. 4 (2021): 315. http://dx.doi.org/10.11591/ijape.v10.i4.pp315-325.

Full text
Abstract:
Electricity is the basic need of today’s scenario. In the 21st generation, growth and development is totally dependent on electricity. Thus, measurement of consumption of electricity becomes much more important. Energy meter used to measure consumed electricity by building or electrical equipment of various end users. This paper focuses on review of energy meters and power tampering attempts. It will highlight the development of meters from electromechanical meters to smart meters. The need of an era is to develop a more reliable and intelligent smart energy meters. This paper also discussed t
APA, Harvard, Vancouver, ISO, and other styles
4

Manoj, Saini, and Khan Shagufta. "A comprehensive study on energy meters and power tampering attempts." International Journal of Applied Power Engineering 10, no. 4 (2021): 315~325. https://doi.org/10.5281/zenodo.7344563.

Full text
Abstract:
Electricity is the basic need of today’s scenario. In the 21st generation, growth and development is totally dependent on electricity. Thus, measurement of consumption of electricity becomes much more important. Energy meter used to measure consumed electricity by building or electrical equipment of various end users. This paper focuses on review of energy meters and power tampering attempts. It will highlight the development of meters from electromechanical meters to smart meters. The need of an era is to develop a more reliable and intelligent smart energy meters. This paper also discu
APA, Harvard, Vancouver, ISO, and other styles
5

Vijayaraghavan, P., M. Joe Nelson, R. Prasanna, and M. K. Raghavendran. "Surveillance Footage Video Tampering Detection." Informatica : Journal of Applied Machines Electrical Electronics Computer Science and Communication Systems 01, no. 01 (2020): 10–16. http://dx.doi.org/10.47812/ijamecs2010102.

Full text
Abstract:
The quality of the captured images was enhanced by some of the first digital video and image processing applications, but as the power of computers expanded, so did the number of applications where video and image processing could make a difference. Video and image processing are used in many different applications nowadays. To provide authenticity to a video several video processing software’s are used. Video tampering detection is the one of the important Security applications. Video processing software is also used to eliminate specific moving foreground from a video. But algorithms which w
APA, Harvard, Vancouver, ISO, and other styles
6

Sinharay, Sandip, and Matthew S. Johnson. "Three New Methods for Analysis of Answer Changes." Educational and Psychological Measurement 77, no. 1 (2016): 54–81. http://dx.doi.org/10.1177/0013164416632287.

Full text
Abstract:
In a pioneering research article, Wollack and colleagues suggested the “erasure detection index” (EDI) to detect test tampering. The EDI can be used with or without a continuity correction and is assumed to follow the standard normal distribution under the null hypothesis of no test tampering. When used without a continuity correction, the EDI often has inflated Type I error rates. When used with a continuity correction, the EDI has satisfactory Type I error rates, but smaller power compared with the EDI without a continuity correction. This article suggests three methods for detecting test ta
APA, Harvard, Vancouver, ISO, and other styles
7

Shabat, Hafedh Ali, Khamael Raqim Raheem, and Wafaa Mohammed Ridha Shakir. "Blind Steganalysis Method Using Image Spectral Density and Differential Histogram Correlative Power Spectral Density." Journal of Image and Graphics 12, no. 1 (2024): 10–15. http://dx.doi.org/10.18178/joig.12.1.10-15.

Full text
Abstract:
Recent research has demonstrated the success of employing neural networks for the purpose of detecting image tampering. Nevertheless, the utilization of reference-free steganalysis has become increasingly popular as a result of the challenges associated with obtaining an annotated dataset. This dataset is crucial for the classification process using neural networks, which aims to detect and identify instances of tampering. This paper introduces a robust approach to blind steganalysis, utilizing image spectral density and differential histogram correlative power spectral density. The proposed m
APA, Harvard, Vancouver, ISO, and other styles
8

Singh, Uday Vikram, Suyash Rastogi, and Asim Ahmed. "Document Tampering Detection: A Comprehensive Review." International Journal for Research in Applied Science and Engineering Technology 12, no. 1 (2024): 475–78. http://dx.doi.org/10.22214/ijraset.2024.57867.

Full text
Abstract:
Abstract: Document forgery techniques have evolved to create counterfeit documents nearly identical to genuine ones, evading visual detection due to advancements in printing technologies. In response, this study proposes an innovative method to uncover intrinsic device-specific characteristics concealed within counterfeit documents, focusing on original and tampered images alongside their Error Level Analysis (ELA). By leveraging seventeen diverse image quality metrics, a discriminative analysis is established to differentiate between authentic and fraudulent documents. These metrics serve as
APA, Harvard, Vancouver, ISO, and other styles
9

Dekate, Sahil, Palkhi Wankhede, Megha Ghosh, Mansi Gotephode, and Bhoomi Gajimwar. "Iot Based Electric Meter Tampering Detector." International Journal for Research in Applied Science and Engineering Technology 12, no. 4 (2024): 3590–92. http://dx.doi.org/10.22214/ijraset.2024.60558.

Full text
Abstract:
Abstract: IoT based smart and multifunctional energy meter reading of automatic meter using ATmegha kit. It has the ability to connect to the public database maintained by the energy supplier through computing and energy meter tamper detection. It can prevent theft detection for unregistered users and save losses as a result. A unique feature of this meter is its Internet of Things based functionality. Metmegha. In this case, the system will use the wireless system communication protocol. Wireless is used because the application requires high data rate, low power consumption and low cost. This
APA, Harvard, Vancouver, ISO, and other styles
10

Ganji, Fatemeh, Domenic Forte, Navid Asadizanjani, Mark Tehranipoor, and Damon Woodward. "The Power of IC Reverse Engineering for Hardware Trust and Assurance." EDFA Technical Articles 21, no. 2 (2019): 30–36. http://dx.doi.org/10.31399/asm.edfa.2019-2.p030.

Full text
Abstract:
Abstract Integrated circuits embedded in everyday devices face an increased risk of tampering and intrusion. In this article, the authors explain how reverse engineering techniques, including automated image analysis, can be employed to provide trust and assurance when dealing with commercial off-the-shelf chips.
APA, Harvard, Vancouver, ISO, and other styles
11

CRYER, ROBERT. "Witness Tampering and International Criminal Tribunals." Leiden Journal of International Law 27, no. 1 (2014): 191–203. http://dx.doi.org/10.1017/s0922156513000691.

Full text
Abstract:
AbstractThis article investigates the difficult issues that have been raised in relation to witness tampering before international criminal courts. This is a significant problem for international criminal courts and tribunals, but has not yet been the subject of a great deal of comment. The article begins by setting out the difficulties that the courts and tribunals have encountered, through a discussion of their judgments on this point. It then turns to the black-letter law that the courts and tribunals have adopted to attempt to counter witness tampering. However, a description of the law al
APA, Harvard, Vancouver, ISO, and other styles
12

Luo, Bin, Guibin Xu, Jinglong Xie, and Yufei Wang. "A Blockchain-based Security Framework for Secure and Resilient Smart Grid." Journal of Physics: Conference Series 2218, no. 1 (2022): 012033. http://dx.doi.org/10.1088/1742-6596/2218/1/012033.

Full text
Abstract:
Abstract Smart grid integrates the information and communication technologies with the physical grid. It can not only improve security and efficiency of traditional power grids, but also has advantages in promoting environmental protection and sustainable development. However, the existing smart grid systems suffer some security concerns such as privacy leakage and data tampering. In order to address these security issues, we propose a security framework for smart grid using Blockchain. It protects data privacy through cryptographic tools, and it applies Blockchain technologies to prevent data
APA, Harvard, Vancouver, ISO, and other styles
13

Khachane, Siddharth, and Deepmalya Mondal. "Image Tampering Detection using Error Level Analysis and Concatenated Neural Networks." International Journal for Research in Applied Science and Engineering Technology 11, no. 7 (2023): 2011–18. http://dx.doi.org/10.22214/ijraset.2023.55067.

Full text
Abstract:
Abstract: Image tampering has become a leading issue in the digital age, which has given rise to serious implications in various fields such as journalism, forensics and photography. Detecting manipulated images with high accuracy is important to ensure the authenticity and credibility of visual content. In this research paper, we propose a robust and effective approach for image tampering detection utilizing a concatenated ResNet and XceptionNet model with Error Level Analysis which has achieved an accuracy of 98.58%.
APA, Harvard, Vancouver, ISO, and other styles
14

Zhu, Chaoqun, Jie Li, Jie Shen, et al. "Detection Scheme for Tampering Behavior on Distributed Controller of Electric-Thermal Integrated Energy System Based on Relation Network." Computational Intelligence and Neuroscience 2022 (August 27, 2022): 1–16. http://dx.doi.org/10.1155/2022/9594267.

Full text
Abstract:
In recent years, with the development of smart grid, the power systems and other energy systems are gradually forming integrated energy systems. The electric-thermal integrated energy system is a mature integrated energy system at present. The electric-thermal integrated energy system uses modern communication technology to realize the comprehensive regulation of electric energy and thermal energy, which greatly improves the efficiency of energy use. However, this also greatly increases the risk of malicious tampering with the energy dispatch system. In this paper, we study the regulation of e
APA, Harvard, Vancouver, ISO, and other styles
15

Onyishi, D. U., O. A. Osahenvemwen, and O. J. Awashare. "Design and simulation of a smart energy metering system." Tropical Journal of Science and Technology 5, no. 1 (2024): 14–28. http://dx.doi.org/10.47524/tjst.v5i1.15.

Full text
Abstract:
Power theft has been one of the main problems facing the power industry in Nigeria which had led to huge economic and infrastructural loss to the government and utility companies. Hence the need to proffer solution to this challenge, this research identified the various method of stealing energy which is meter by passing, connecting directly to the supply cable just before it gets to the meter terminal, resetting of meter reading, and deliberate non-payment of electricity bills, vandalism and unfaithful act of the utility employees. The causes and effect of energy theft where also identified t
APA, Harvard, Vancouver, ISO, and other styles
16

Ping, Guo. "Detection of Power Data Tampering Attack based on Gradient Boosting Decision Tree." Journal of Physics: Conference Series 1846, no. 1 (2021): 012057. http://dx.doi.org/10.1088/1742-6596/1846/1/012057.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Pradipkumar, V. Lokhande, S. Deshmukh Sakshi, K. Magdum Sakshi, and R. Shendge Dhanashri. "Combatting Electricity Theft through IoT Integration." Journal of Advancement in Communication System 7, no. 2 (2024): 44–55. https://doi.org/10.5281/zenodo.11159792.

Full text
Abstract:
<em>Energy theft is very common problem in the countries like India where the consumers of energy usage are increasing day by day with the consistent increase in population. Also, in India more than 20% of electricity generated is lost due to tampering and it is covered from the electricity board funds this causes the major loss to the electricity board. This paper represents the way to detect the power theft, due to tampering on the transmission lines, alert that particular area and authority to. When unlawful things are determined then dispatch is communicated through GSM module to the autho
APA, Harvard, Vancouver, ISO, and other styles
18

Chen, Jinqian, Yong Yan, Shaoyong Guo, Yinlin Ren, and Feng Qi. "A System for Trusted Recovery of Data Based on Blockchain and Coding Techniques." Wireless Communications and Mobile Computing 2022 (January 17, 2022): 1–12. http://dx.doi.org/10.1155/2022/8390241.

Full text
Abstract:
With the continuous development of information technology, the Internet of Things has also been widely used. At the same time, in the power Internet of Things environment, reliable data is essential for data use and accurate analysis. Data security has become a key factor in ensuring the stable operation of the power grid. However, the power Internet of Things devices is extremely vulnerable to network attacks, leading to data tampering and deletion. Resisting tampering, preventing data loss, and reliably restoring data have become difficult to ensure data security. In order to solve this prob
APA, Harvard, Vancouver, ISO, and other styles
19

Hsu, Hsiang-Ping, Zhong-Ren Jiang, Lo-Ya Li, et al. "Detection of Audio Tampering Based on Electric Network Frequency Signal." Sensors 23, no. 16 (2023): 7029. http://dx.doi.org/10.3390/s23167029.

Full text
Abstract:
The detection of audio tampering plays a crucial role in ensuring the authenticity and integrity of multimedia files. This paper presents a novel approach to identifying tampered audio files by leveraging the unique Electric Network Frequency (ENF) signal, which is inherent to the power grid and serves as a reliable indicator of authenticity. The study begins by establishing a comprehensive Chinese ENF database containing diverse ENF signals extracted from audio files. The proposed methodology involves extracting the ENF signal, applying wavelet decomposition, and utilizing the autoregressive
APA, Harvard, Vancouver, ISO, and other styles
20

He, Xudong, Jian Wang, Jiqiang Liu, Enze Yuan, Kailun Wang, and Zhen Han. "Smart Grid Nontechnical Loss Detection Based on Power Gateway Consortium Blockchain." Security and Communication Networks 2021 (October 14, 2021): 1–20. http://dx.doi.org/10.1155/2021/9501572.

Full text
Abstract:
The rapid development of the smart grid brings convenience to human beings. It enables users to know the real-time power supply capacity, the power quality, and the electricity price fluctuation of the grid. However, there are still some threats in the smart grid, which increase all kinds of expenses in the grid and cause great trouble to energy distribution. Among them, the man-made nontechnical loss (NTL) problem is particularly prominent. Recently, there are also some NTL detection programs. However, most of the schemes need huge amounts of supporting data and high labor costs. As a result,
APA, Harvard, Vancouver, ISO, and other styles
21

Alkatheiri, Mohammed Saeed, Sajid Saleem, Mohammed Ali Alqarni, Ahmad O. Aseeri, Sajjad Hussain Chauhdary, and Yu Zhuang. "A Lightweight Authentication Scheme for a Network of Unmanned Aerial Vehicles (UAVs) by Using Physical Unclonable Functions." Electronics 11, no. 18 (2022): 2921. http://dx.doi.org/10.3390/electronics11182921.

Full text
Abstract:
A network of agents constituted of multiple unmanned aerial vehicles (UAVs) is emerging as a promising technology with myriad applications in the military, public, and civil domains. UAVs’ power, memory, and size constraints, ultra-mobile nature, and non-trusted operational environments make them susceptible to various attacks, including physical capturing and cloning attacks. A robust and resilient security protocol should be lightweight and resource-efficient in addition to providing protection against physical and tampering threats. This paper proposes an authentication protocol for a UAV-b
APA, Harvard, Vancouver, ISO, and other styles
22

Haj Ahmad, Hanan, Ehab M. Almetwally, and Dina A. Ramadan. "Competing Risks in Accelerated Life Testing: A Study on Step-Stress Models with Tampered Random Variables." Axioms 14, no. 1 (2025): 32. https://doi.org/10.3390/axioms14010032.

Full text
Abstract:
This study introduces a novel approach to accelerated life test experiments by examining competing risk factors using the Tampered Random Variable (TRV) model. This approach remains extensively unexplored in current research. The methodology is implemented for a simple step-stress life test (SSLT) model and accounts for various causes of failure. The Power Chris–Jerry (PCJ) distribution is utilized to model the lifetimes of units under different stress levels, incorporating unique shape parameters while maintaining a fixed-scale parameter. This study employs the TRV model to integrate constant
APA, Harvard, Vancouver, ISO, and other styles
23

Pranau, N., T. Raghuraman, S. V. Vishnuguhan, and Dr B. Meenakshi. "Load Monitoring and Detection of Tampering in Power Lines Using Internet of Things (Iot)." IOSR Journal of Electrical and Electronics Engineering 12, no. 02 (2017): 42–45. http://dx.doi.org/10.9790/1676-1202024245.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Ye, Li, Wei Wei, Yingchun Wang, Yue Guo, He Yu, and Yalan Wang. "Research on Data Acquisition Technology of Intelligent Laboratory Based on Retinex-Net Image Recognition." Journal of Physics: Conference Series 2474, no. 1 (2023): 012059. http://dx.doi.org/10.1088/1742-6596/2474/1/012059.

Full text
Abstract:
Abstract The reliability of electric power metering verification data is related to the accuracy and fairness of electric power trade settlement. Most of the existing verification equipment uses traditional pointer-type electrical verification instruments. The verification process requires the manual recording of data and the issuance of verification reports. There are problems such as low data collection efficiency, high error rate, and human tampering, which lead to great uncertainty in the detection results. This paper presents a data acquisition technology of pointer-type electrical verifi
APA, Harvard, Vancouver, ISO, and other styles
25

Murugan, A. S. S., Rajib Kumar Kar, M. Rajitha, and N. Karuppiah. "IOT based Smart Unlawful Electricity Usage Surveillance and Warning System." E3S Web of Conferences 472 (2024): 03009. http://dx.doi.org/10.1051/e3sconf/202447203009.

Full text
Abstract:
The global issue of electricity theft has a negative impact on both the utilities and the people who use the energy. It impairs utility company economic growth, creates electrical risks, and has an effect on consumers' expenses for electricity. The emergence of smart grids is crucial for the detection of power theft as they provide vast amounts of data, including information on consumer consumption that can be used to identify theft using over voltage and over current detection methods. The solution presented in this article employs an Arduino uno micro controller board and IOT to monitor and
APA, Harvard, Vancouver, ISO, and other styles
26

Siddiqui, Maha. "Blockchain-Based Secure and Efficient Secret Image Sharing with Outsourcing Computation in Wireless Networks." International Journal for Research in Applied Science and Engineering Technology 12, no. 3 (2024): 1267–75. http://dx.doi.org/10.22214/ijraset.2024.59034.

Full text
Abstract:
Abstract: We present a novel solution, the Blockchain-based Secure and Efficient Secret Image Sharing (BC-SESIS) scheme, designed to enhance the security and efficiency of secret image sharing in wireless networks. Traditional Secret Image Sharing (SIS) methods generate multiple shadow images to distribute a secret image, allowing retrieval with a subset of these shadows. However, existing SIS schemes suffer from vulnerabilities, particularly during communication, where shadow images are susceptible to tampering and corruption, compromising security. Leveraging blockchain technology, BC-SESIS
APA, Harvard, Vancouver, ISO, and other styles
27

Ahmad, Hanan Haj, Dina A. Ramadan, and Ehab M. Almetwally. "Tampered Random Variable Analysis in Step-Stress Testing: Modeling, Inference, and Applications." Mathematics 12, no. 8 (2024): 1248. http://dx.doi.org/10.3390/math12081248.

Full text
Abstract:
This study explores a new dimension of accelerated life testing by analyzing competing risk data through Tampered Random Variable (TRV) modeling, a method that has not been extensively studied. This method is applied to simple step-stress life testing (SSLT), and it considers multiple causes of failure. The lifetime of test units under changeable stress levels is modeled using Power Rayleigh distribution with distinct scale parameters and a constant shape parameter. The research introduces unique tampering coefficients for different failure causes in step-stress data modeling through TRV. Usin
APA, Harvard, Vancouver, ISO, and other styles
28

Naidu, Nalluri Brahma, Thokala Kavyasree, Tadikonda Ravi Teja, Pulimela Sushma Sarayu, and Sivangula Sai. "Image Forgery Detection using ResNet50." International Journal for Research in Applied Science and Engineering Technology 12, no. 3 (2024): 2222–29. http://dx.doi.org/10.22214/ijraset.2024.59317.

Full text
Abstract:
Abstract: Image forgery detection is crucial in ensuring the integrity of digital media. In this study, we propose a method for detecting image tampering using Error Level Analysis (ELA) and Convolutional Neural Networks (CNNs) with a ResNet50 architecture. Leveraging the CASIA 2.0 Image Tampering Detection Dataset, which consists of authentic (Au) and tampered (Tp) images, along with metadata and annotations provided in the CASIA 2 Ground truth dataset, we develop and evaluate our model. The dataset comprises 7492 authentic images, 5125 tampered images, and 5123 files of ground truth informat
APA, Harvard, Vancouver, ISO, and other styles
29

Rathod, Ghrushnesh, Shubham More, Amit Patil, and Sheetal Ahir. "Logistics & Supply Chain Management Using the Power of Blockchain." ITM Web of Conferences 44 (2022): 03048. http://dx.doi.org/10.1051/itmconf/20224403048.

Full text
Abstract:
A large portion of supply chain networks have experienced hardships when attempting to incorporate all parts and partners, which make supply chain management network the board framework experiencing an absence of effectiveness and straightforwardness that make a consistent expansion in product misrepresentation and customer’s mistake. All data about product creation, stockpiling and transportation should stream obviously during all phases of the production network by following and validating to keep away from item’s tampering in the organization. Current software is based on top of brought tog
APA, Harvard, Vancouver, ISO, and other styles
30

Bhoite, Priyanka Ashok, Dr Yuvraj K. Kanse, and Dr Supriya P. Salave. "IoT-Based Electricity Theft Detection System." International Journal of Innovative Technology and Exploring Engineering 14, no. 7 (2025): 30–35. https://doi.org/10.35940/ijitee.e4661.14070625.

Full text
Abstract:
Globally, energy sectors face the problem of electricity theft, which causes substantial financial losses, inefficiencies, and unpredictability in the energy supply. It involves the unauthorized use of electrical power through various means such as tampering with meters, bypassing meters, tapping directly into power lines, or manipulating billing mechanisms. Analyze here the performance of the proposed IoT-based system for detecting electricity theft. Show the outcomes of the alert system performance. False Positive Rate (FPR): The proportion of legitimate transactions incorrectly identified a
APA, Harvard, Vancouver, ISO, and other styles
31

Diahovchenko, Illia, Robert G. Olsen, Viacheslav Zalotov, Anastasiia Chuprun, Bystrík Dolník, and Oleksandr Boiko. "Development of effective shielding against electricity meters tampering with strong magnetic fields." Electric Power Systems Research 213 (December 2022): 108722. http://dx.doi.org/10.1016/j.epsr.2022.108722.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Liu, Yubao, Bocheng Yan, Benrui Wang, Quanchao Sun, and Yinfei Dai. "Computation Offloading Strategy Based on Improved Polar Lights Optimization Algorithm and Blockchain in Internet of Vehicles." Applied Sciences 15, no. 13 (2025): 7341. https://doi.org/10.3390/app15137341.

Full text
Abstract:
The rapid growth of computationally intensive tasks in the Internet of Vehicles (IoV) poses a triple challenge to the efficiency, security, and stability of Mobile Edge Computing (MEC). Aiming at the problems that traditional optimization algorithms tend to fall into, where local optimum in task offloading and edge computing nodes are exposed to the risk of data tampering, this paper proposes a secure offloading strategy that integrates the Improved Polar Lights Optimization algorithm (IPLO) and blockchain. First, the truncation operation when a particle crosses the boundary is improved to dyn
APA, Harvard, Vancouver, ISO, and other styles
33

Soni, Mayank, Nikhil Mandoli, Kunal Gupta, and Ranjeeta Yadav. "Wireless IoT-Based Smart Monitoring System with Power Theft Detection." International Journal of Microsystems and IoT 3, no. 2 (2025): 1539–43. https://doi.org/10.5281/zenodo.15494818.

Full text
Abstract:
Electricity is a crucial part of modern life, but traditional billing methods rely on manual meter readings, leading to inefficiencies, errors, and delays. This project introduces an IoT-based smart energy metering system that automates data collection, billing, and theft detection. The system integrates a microcontroller with an energy meter to monitor power consumption in real time. A centralized database securely stores usage data, allowing both consumers and electricity providers to access it via a web interface or mobile application. This enables users to track their daily electricity con
APA, Harvard, Vancouver, ISO, and other styles
34

Guo, Qinglei, Xiukui Pan, Weiqing Zhou, Peng Li, and Qi Li. "Credible calculation method for regional corrected carbon emission factors taking into account the nearby consumption of renewable energy." Journal of Physics: Conference Series 2826, no. 1 (2024): 012004. http://dx.doi.org/10.1088/1742-6596/2826/1/012004.

Full text
Abstract:
Abstract The carbon emission factor of the power grid is a key data indicator for measuring the carbon emission level on the user side. Currently, the carbon emission factor of the power grid is not sufficient to accurately express the regional carbon emission level, and especially cannot accurately reflect the regional new energy consumption level, which affects user confidence in emission reduction and the accuracy of carbon emission quota issuance. Therefore, this article utilizes blockchain technology and carbon emission flow theory to realize the impact of user-side self-generated and sel
APA, Harvard, Vancouver, ISO, and other styles
35

Kook, Sangjin, Keunok Kim, Jihyeon Ryu, Youngsook Lee, and Dongho Won. "Lightweight Hash-Based Authentication Protocol for Smart Grids." Sensors 24, no. 10 (2024): 3085. http://dx.doi.org/10.3390/s24103085.

Full text
Abstract:
Smart grids integrate information and communications technology into the processes of electricity production, transportation, and consumption, thereby enabling interactions between power suppliers and consumers to increase the efficiency of the power grid. To achieve this, smart meters (SMs) are installed in households or buildings to measure electricity usage and allow power suppliers or consumers to monitor and manage it in real time. However, SMs require a secure service to address malicious attacks during memory protection and communication processes and a lightweight communication protoco
APA, Harvard, Vancouver, ISO, and other styles
36

Oh, Se-Chang, Min-Soo Kim, Yoon Park, Gyu-Tak Roh, and Chin-Woo Lee. "Implementation of blockchain-based energy trading system." Asia Pacific Journal of Innovation and Entrepreneurship 11, no. 3 (2017): 322–34. http://dx.doi.org/10.1108/apjie-12-2017-037.

Full text
Abstract:
Purpose The centralized processes of today’s power trading systems are complex and pose a risk of price tampering and hacking. The decentralized and unmodifiable nature of the blockchain technology that has recently been highlighted offers the potential to improve this power trading process. The purpose of this study is to implement a system to apply the blockchain technology to the problem of power trading. Design/methodology/approach The authors modeled the power trading problem as the interaction between admin, producer and consumer nodes. And a power trading scenario has been created for t
APA, Harvard, Vancouver, ISO, and other styles
37

Chen Chai Phing, Tiong Sieh Kiong, Siaw Paw Koh, et al. "A Brief Review on Ancillary Services from Advanced Metering Infrastructure (ASAMI) for Distributed Renewable Energy Network." Journal of Advanced Research in Applied Sciences and Engineering Technology 41, no. 2 (2024): 43–61. http://dx.doi.org/10.37934/araset.41.2.4361.

Full text
Abstract:
Advanced metering infrastructure (AMI) is an integrated system of smart meters, communications networks, and data management systems that enable the secure, effective, and dependable distribution of power while also delivering enhanced capabilities to energy consumers. The system also can measure power usage, connect, and disconnect service, detect tampering, identify and isolate outages, and monitor voltage automatically and remotely, which were previously unavailable or required user intervention. This article focuses on AMI and effectively integrating renewable energy sources (RES). However
APA, Harvard, Vancouver, ISO, and other styles
38

V, Varshad, and Vinay Prasad M. S. "A Web Application for Drug Traceability in Healthcare System using Blockchain." International Journal for Research in Applied Science and Engineering Technology 10, no. 8 (2022): 544–56. http://dx.doi.org/10.22214/ijraset.2022.46221.

Full text
Abstract:
Abstract: In current situation, we come across various problems in pharmaceutical supply chain in India which can be solved with different ideas. Since a drug’s ownership changes from manufacturer to distributor and then to the pharmacist before reaching the customer . The manufacturers don’t know how their drug is being used. At the same time, consumers don’t know whether the drug has come from the rightful source including inaccurate information, lack of transparency and limited data provenance. It is difficult to detect counterfeits because these drugs pass through different complex distrib
APA, Harvard, Vancouver, ISO, and other styles
39

Kannan, Raadhesh, and Ji-Jian Chin. "Backup Automation Using Power Automate for Malaysian Vaccination Centres." Journal of Informatics and Web Engineering 1, no. 1 (2022): 23–34. http://dx.doi.org/10.33093/jiwe.2022.1.1.3.

Full text
Abstract:
The Covid-19 pandemic has tested the world, especially the vaccine centres when it comes to logistics, maintenance of records, and issuing of vaccination certifications. The Malaysian vaccination centres (PPVs) known as Pusat Pemberian Vaksin in Malaysia have a secure, and reliable system to maintain records of who has been vaccinated and when. No system is fully secure and reliable, thus there needs to be a backup if anything happens to the records like data loss or tampering of records. Although the information flow is simplified using the MySejahtera app and scanning of QR codes, there is n
APA, Harvard, Vancouver, ISO, and other styles
40

Chen, Liudong, Li Ma, Nian Liu, Lingfeng Wang, and Zhaoxi Liu. "Parameter tampering cyberattack and event-trigger detection in game-based interactive demand response." International Journal of Electrical Power & Energy Systems 135 (February 2022): 107550. http://dx.doi.org/10.1016/j.ijepes.2021.107550.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Ebrahim A. M. Al-Rawashde, Ebrahim A. M. Al-Rawashde. "Guarantees to protect the worker's wage vis-à-vis the employer in the Arab Charter on Human Rights and Comparative Regulations - The Saudi regime is a model: ضمانات حماية أجر العامل في مواجهة صاحب العمل في الميثاق العربي لحقوق الإنسان والأنظمة المقارنة – النظام السعودي أنموذجاً". مجلة العلوم الإقتصادية و الإدارية و القانونية 5, № 14 (2021): 116–92. http://dx.doi.org/10.26389/ajsrp.r121020.

Full text
Abstract:
In this study, I tried to show the ability of Arab legislation to keep pace with the great and tremendous development of work contracts, as well as the extent to which Arab legislation adheres to the legal texts contained in international conventions and treaties, chiefly the Arab Charter on Human Rights. By studying and analyzing the texts of the articles in the targeted legislations, with the help of the opinion of jurisprudence and the decisions of the courts, and we concluded in the end that the Arab Charter for Human Rights is a basic pillar from which many Arab agreements have been launc
APA, Harvard, Vancouver, ISO, and other styles
42

Leal Piedrahita, Erwin Alexander. "Hierarchical Clustering for Anomalous Traffic Conditions Detection in Power Substations." Ciencia e Ingeniería Neogranadina 30, no. 1 (2019): 75–88. http://dx.doi.org/10.18359/rcin.4236.

Full text
Abstract:
The IEC 61850 standard has contributed significantly to the substation management and automation process by incorporating the advantages of communications networks into the operation of power substations. However, this modernization process also involves new challenges in other areas. For example, in the field of security, several academic works have shown that the same attacks used in computer networks (DoS, Sniffing, Tampering, Spoffing among others), can also compromise the operation of a substation. This article evaluates the applicability of hierarchical clustering algorithms and statisti
APA, Harvard, Vancouver, ISO, and other styles
43

Gunduz, Muhammed Zekeriya, and Resul Das. "Smart Grid Security: An Effective Hybrid CNN-Based Approach for Detecting Energy Theft Using Consumption Patterns." Sensors 24, no. 4 (2024): 1148. http://dx.doi.org/10.3390/s24041148.

Full text
Abstract:
In Internet of Things-based smart grids, smart meters record and report a massive number of power consumption data at certain intervals to the data center of the utility for load monitoring and energy management. Energy theft is a big problem for smart meters and causes non-technical losses. Energy theft attacks can be launched by malicious consumers by compromising the smart meters to report manipulated consumption data for less billing. It is a global issue causing technical and financial damage to governments and operators. Deep learning-based techniques can effectively identify consumers i
APA, Harvard, Vancouver, ISO, and other styles
44

Rouissat, Mehdi, Mohammed Belkheir, and Hichem Sid Ahmed Belkhira. "A potential flooding version number attack against RPL based IOT networks." Journal of Electrical Engineering 73, no. 4 (2022): 267–75. http://dx.doi.org/10.2478/jee-2022-0035.

Full text
Abstract:
Abstract Routing protocol for low power and lossy networks (RPL) has been proposed for power, memory, and processing constrained devices. Owing to their constrained, RPL-based networks are exposed to a wide range of security attacks that mainly include control message tampering. In this paper we propose and study a modified version number attack, based on flooding the network by falsified incremented version numbers. The obtained results show that the modified attack led to an immense increase in the overhead, 1426%, compared with the attack-free case, and an increase of 182 % in the total ene
APA, Harvard, Vancouver, ISO, and other styles
45

Singh, Suraj. "E-Voting System Using Blockchain." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (2023): 5515–20. http://dx.doi.org/10.22214/ijraset.2023.53021.

Full text
Abstract:
Abstract: The introduction of online voting has revolutionized the electoral process, providing a secure and convenient way for people to cast their votes without having to be physically present at polling stations. However, traditional online voting systems are still susceptible to security and integrity issues, such as hacking and tampering. Blockchain technology provides a solution to these problems by offering a decentralized and immutable ledger that can ensure the security and transparency of online voting. In this paper, we propose an online voting system using blockchain technology, wh
APA, Harvard, Vancouver, ISO, and other styles
46

Han, Qi, Yifei Qi, Hua Deng, and Han Liu. "Design and application of distributed photovoltaic transaction consensus mechanism based on blockchain." Journal of Physics: Conference Series 2247, no. 1 (2022): 012040. http://dx.doi.org/10.1088/1742-6596/2247/1/012040.

Full text
Abstract:
Abstract In recent years, distributed photovoltaic power generation has developed rapidly, but it has also brought many problems, such as poor equipment reliability, complex operation control, and many management subjects. Under the situation of the development of the electricity market, it is necessary to solve the problem of ensuring the data security of participating in the electricity market. Blockchain technology has the characteristics of traceability, non-tampering of information, openness and transparency, etc., which can satisfy massive transactions and reduce the burden of traditiona
APA, Harvard, Vancouver, ISO, and other styles
47

Abdelrahman, Mahmoud S., Ibtissam Kharchouf, Tung Lam Nguyen, and Osama A. Mohammed. "A Hybrid Physical Co-Simulation Smart Grid Testbed for Testing and Impact Analysis of Cyber-Attacks on Power Systems: Framework and Attack Scenarios." Energies 16, no. 23 (2023): 7771. http://dx.doi.org/10.3390/en16237771.

Full text
Abstract:
With the deployment of numerous innovative smart grid technologies in modern power systems, more real-time communication and control are required due to the complexity and proliferation of grid-connected systems, making a power system a typical cyber-physical system (CPS). However, these systems are also exposed to new cyber vulnerabilities. Therefore, understanding the intricate interplay between the cyber and physical domains and the potential effects on the power system of successful attacks is essential. For cybersecurity experimentation and impact analysis, developing a comprehensive test
APA, Harvard, Vancouver, ISO, and other styles
48

Lago, Federica, Quoc-Tin Phan, and Giulia Boato. "Visual and Textual Analysis for Image Trustworthiness Assessment within Online News." Security and Communication Networks 2019 (April 14, 2019): 1–14. http://dx.doi.org/10.1155/2019/9236910.

Full text
Abstract:
The majority of news published online presents one or more images or videos, which make the news more easily consumed and therefore more attractive to huge audiences. As a consequence, news with catchy multimedia content can be spread and get viral extremely quickly. Unfortunately, the availability and sophistication of photo editing software are erasing the line between pristine and manipulated content. Given that images have the power of bias and influence the opinion and behavior of readers, the need of automatic techniques to assess the authenticity of images is straightforward. This paper
APA, Harvard, Vancouver, ISO, and other styles
49

Ndam Nsangou, Azirilou. "Mirage démocratique et immobilisme politique en Afrique subsaharienne : le cas du Cameroun." Studia Universitatis Babeș-Bolyai Studia Europaea 66, no. 2 (2021): 23–54. http://dx.doi.org/10.24193/subbeuropaea.2021.2.02.

Full text
Abstract:
"The objective of this work is to understand the strategies that have been put in place by the Biya regime in order to lock the controls of the central power in Cameroon. To achieve this, we used a qualitative investigative method, combining techniques of documentary research, direct observation and interviews. It appears that to stay in power in perpetuity, Paul Biya relied on a form of ""belly politics"" based on clientelism and electoral donation on the one hand. On the other hand, he knew how to put in place an authoritarian democratization allowing him to manipulate the constitution to re
APA, Harvard, Vancouver, ISO, and other styles
50

Bai, Wei, Lan Xiong, Yubei Liao, Zhengyang Tan, Jingang Wang, and Zhanlong Zhang. "Detection Method for Three-Phase Electricity Theft Based on Multi-Dimensional Feature Extraction." Sensors 24, no. 18 (2024): 6057. http://dx.doi.org/10.3390/s24186057.

Full text
Abstract:
The advent of smart grids has facilitated data-driven methods for detecting electricity theft, with a preponderance of research efforts focused on user electricity consumption data. The multi-dimensional power state data captured by Advanced Metering Infrastructure (AMI) encompasses rich information, the exploration of which, in relation to electricity usage behaviors, holds immense potential for enhancing the efficiency of theft detection. In light of this, we propose the Catch22-Conv-Transformer method, a multi-dimensional feature extraction-based approach tailored for the detection of anoma
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!