International Transactions on Electrical Engineering and Computer Science <p align="justify">International Transactions on Electrical Engineering and Computer Science (ITEECS) is not a for profit organization. ITEECS is a quarterly published, open source journal and operates an online submission with the peer review system allowing authors to submit articles online and track their progress via its web interface. ITEECS accepts the DOAJ's definition of open access. In addition, ITEECS publication ethics and publication malpractice statement is mainly based on the Code of Conduct and Best-Practice Guidelines for Journal Editors (Committee on Publication Ethics (COPE), 2011). The ITEECS journal aims for a publication speed of 90 days from submission until final publication. It uses the LOCKSS archival system and cited in Google Scholar and under evaluation by WEB of Science (Clarivate Analytics).</p> <p>The coverage of ITEECS includes the following areas, but not limited to the following</p> <p>Green Energy Sources , Hybrid Electric Vehicles, Power Converter Applications, Smart Grids, Power Systems, Control Systems, Signal Processing, Image Processing, Integrated Circuits and VLSI, Electro Magnetics, Embedded Systems, Robotics, Bioinformatics, Electrical Machines, Cloud Computing and Cyber Security, Databases and Data Mining, Data Science and Security, Soft Computing and Machine Learning, Wireless Networking and Security.</p> Dr. Ch. Rami Reddy en-US International Transactions on Electrical Engineering and Computer Science 2583-6471 RFMFA Technique for Islanding Detection Scheme in Integrated DG System <p>EEE 1547 specifies time limits for the completion of DG interconnection tasks, and one of these tasks is the detection of islanding, which must be completed within two seconds of the task's start. This thesis provides new and effective islanding detection algorithms for a hybrid distributed generating system connected to the grid. The suggested technique is a hybrid of two different optimization algorithms: Random Forest (RF) and Moth Flame Optimization (MFO). At the objective stage, this technique employs the ROCOF. The suggested methods are distinguished by their ease of use due to the lack of a mandatory minimum. Furthermore, they are unaffected by the capacity or kind of Distributed Generation linked to the utility grid and not affected by system factors. In addition, the NDZ is not present after applying these processes. When compared to the standard approaches, these methods show a marked improvement in their ability to classify events into islanding and non-islanding categories. Several elements, including varying load situations, switching operations, and network conditions, must be considered before determining the proposed solutions' viability. The MATLAB/Simulink platform provides a setting where the suggested procedures may be implemented.</p> Katta Venkata Reddy Tharun Kommaddi Copyright (c) 2023 Katta Venkata Reddy, Tharun Kommaddi 2023-09-30 2023-09-30 2 3 88 101 Research Opportunities and Challenges in Image Processing <p>The processing of image data for storage, transmission, and representation for autonomous machine perception are the two primary application fields that have contributed to the growing interest in digital image processing technologies. The development of improved pictorial information for human interpretation is the other primary application field that has contributed to this growing interest. The purpose of this paper is to describe the scope of image processing, examine the numerous phases and techniques involved in a typical image processing, and provide examples of applications of image processing tools and procedures in cutting-edge fields of study.</p> Hemanth Kumar Gutlapalli Copyright (c) 2023 Hemanth Kumar Gutlapalli 2023-09-30 2023-09-30 2 3 102 111 Providing Authenticity and Integrity for Disseminated Data Items in Wireless Sensor Networks <p>A Wireless sensor Network (WSN) may also be a wireless network comprising a number of sensor nodes and is used to monitor both the environmental and physical status of a given area. WSN constitute one of the most important technologies in each of the most important applications. Unit of measurement for WSN that are susceptible to security risks. Multiple Protocols are being developed to make them secure. The protection of sensitive information is the primary focus of many of the protocols that make up the major. The term given to these protocols is the knowledge discovery and dissemination protocols. Distributing management instructions and changing configuration settings on sensor nodes is accomplished with the help of the data detection and distribution protocol for WSN. Each and every one of the currently used protocols for the discovery and distribution of information has two major shortcomings. To a large extent, they encourage a centralized method (only extremely inexpensive stations are able to disseminate data item), and this is the case. This strategy is not suitable for situations in which there are numerous owners and various users. Second, security was not a consideration throughout the development of the protocols. This article proposes the first distributed information detection and distribution protocol, known as DiDrip, that is more secure than existing ones. The protocol allows numerous homeowners to authorize several network users with entirely different priorities simultaneously and immediately flow into information items to sensor nodes. This may be done by multiple homeowners simultaneously using the same protocol.</p> Bhargavi Peta Copyright (c) 2023 Bhargavi Peta 2023-09-30 2023-09-30 2 3 112 117 Implementation of the Optimized Dual Fingerprint Algorithm for Protecting Privacy Information <p>The electromagnetic spectrum (EM) is made up of a variety of wavelengths, but the only wavelength that can be seen by the human visual system (HVS) is the visible wavelength, which is also referred to as the digital image processing (DIP) wavelength. The visible wavelength is also known as the visible light spectrum (VLS). The DIP is a component of the signal processing, but the HVS is unable to see the other elements of the signal if the DIP is not there. This is because the HVS requires a digital screen in order to see them, which is an application of the DIP. Through the implementation of digitalization applications in a variety of study domains, the DIP transforms the current world into a center for technological innovation. In today's society, security is of the highest importance, and biometrics-based systems have gained appeal over conventional ones because to their simplicity of use, resilience, and accuracy. Biometrics-based systems are becoming more popular. In this research, a unique combinational manner-based security solution is provided by combining the two fingerprints and taking into account their distinct orientations and minute details. This approach is made possible by taking into mind the minutiae involved. The creation of a fingerprint template that is identical to the original fingerprint included taking elements from two separate fingerprints and combining them. The information is protected against theft using the suggested template, which also demonstrates a low error rate (FRR = 0.4% at FAR = 0.1%) when compared to conventional methods (FAR = 0.1%). In conclusion, as compared to traditional approaches, the suggested method possesses a superior virtual identity, which demonstrates positive outcomes when defending against incidental and inadvertent attacks.</p> D Ashritha Reddy Copyright (c) 2023 D Ashritha Reddy 2023-09-30 2023-09-30 2 3 118 127 Optimal Location Settings for UPFC Using Ant Colony Optimization for Improving Power System Security Under Single Contingencies <p>Devices referred to as FACTS are utilized extensively in the process of making power system more secure. The UPFC, which contains both shunt and series correction, is one of the FACTS devices that is considered to be among the most successful. The placement of the FACTS device and the values that are selected for its parameters both have a role in determining how successful the device is in reducing security risks. In this study, the ACO approach is presented as a means of optimally positioning UPFC in order to improve the consistency of the power system in the occurrence of single contingencies, also known as an N-1 contingency. In order to guarantee the integrity of the system, the simulation is run on test systems based on the IEEE 6 bus and the IEEE 14 bus, taking into account line overloads and voltage destructions on the bus. This strategy has a two-pronged approach. In the beginning, a N-1 contingency test is carried out based on the severity ranking, and after that, an ACO algorithm is used to install UPFC in the ideal location in order to reduce the severity. In order to further verify the suggested method, the results are matched with the traditional NLP-IP method. This comparison reveals that the new strategy is better in terms of assuring the safety of power systems.</p> Jaya Prakash Narayana Raavi Meghana Medala Copyright (c) 2023 Jaya Prakash Narayana Raavi, Meghana Medala 2023-09-30 2023-09-30 2 3 128 138