﻿<?xml version="1.0" encoding="utf-8"?><doi_batch xmlns="http://www.crossref.org/schema/4.3.7" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.crossref.org/schema/4.3.7 http://www.crossref.org/schema/deposit/crossref4.3.7.xsd"><head><doi_batch_id>ijece-2026051922</doi_batch_id><timestamp>20260519223109</timestamp><depositor><depositor_name>CMV Verlag</depositor_name><email_address>khoffmann@cmv-verlag.com</email_address></depositor><registrant>CMV Verlag</registrant></head><body><journal><journal_metadata language="fa"><full_title>Nashriyyah -i Muhandisi -i Barq va Muhandisi -i Kampyutar -i Iran</full_title><abbrev_title>ijece</abbrev_title><issn media_type="electronic">16823745</issn></journal_metadata><journal_issue><publication_date media_type="online"><month>1</month><day>8</day><year>2025</year></publication_date><journal_volume><volume>22</volume></journal_volume><issue>3</issue></journal_issue><journal_article publication_type="full_text"><titles><title>A Mathematical Model Based on Electrical and Magnetic susceptibilities for an Ideal Reflective Metasurface - Without Unwanted Waves -</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Elham</given_name><surname>Moradi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Masoud</given_name><surname>Movahhedi</surname></person_name></contributors><publication_date media_type="online"><month>1</month><day>8</day><year>2025</year></publication_date><pages><first_page>197</first_page><last_page>207</last_page></pages><doi_data><doi>10.66224/ijece.45429.22.3.197</doi><resource>http://ijece.org/en/Article/45429</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/45429</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/45429</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/45429</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/45429</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/45429</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/45429</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/45429</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	A. Araghi, "Reconfigurable intelligent surface (RIS) in the sub-6 GHz band: design, implementation, and real-world demonstration," IEEE Access, vol. 10, pp. 2646-2655, 2022.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	E. Basar, M. Di Renzo, J. De Rosny, M. Debbah, M. Alouini, and R. Zhang, "Wireless communications through reconfigurable intelligent surfaces," IEEE Access, vol. 7, pp. 116753-116773, 2019.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	Q. Wu, S. Zhang, B. Zheng, C. You, and R. Zhang, "Intelligent reflecting surface aided wireless communications: atutorial," IEEE Trans. Commun., vol. 69, no. 5, pp. 3313-3351, May 2021.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	S. B. Glybovski, S. A. Tretyakov, P. A. Belov, Y. S. Kivshar, and C. R. Simovski, "Metasurfaces: from microwaves to visible," Phys. Rep., vol. 634, pp. 1-72, May 2016.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	M. Di Renzo, "Smart radio environments empowered by reconfigurable intelligent surfaces: how it works, state of research, and the road ahead," IEEE J. Sel. Areas Commun., vol. 38, no. 11, pp. 2450-2525, Nov. 2020.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	M. Di Renzo, F. H. Danufane, and S. Tretyakov, Communication Models for Reconfigurable Intelligent Surfaces: From Surface Electromagnetics to Wireless Networks Optimization, https://arxiv.org/abs/2110.00833, 2021.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	C. Huang, A. Zappone, G. C. Alexandropoulos, M. Debbah, and C. Yuen, "Reconfigurable intelligent surfaces for energy efficiency in wireless communication," IEEE Trans. Wireless Commun., vol. 18, no. 8, pp. 4157-4170, Aug. 2019.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	Q. Wu and R. Zhang, "Intelligent reflecting surface enhanced wireless network via joint active and passive beamforming," IEEE Trans. Wireless Commun., vol. 18, no. 11, pp. 5394-5409, Nov. 2019.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	N. Yu, "Light propagation with phase discontinuities: generalized laws of reflection and refraction," Science, vol. 334, no. 6054, pp. 333-337, 1 Sept. 2011.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	N. K. Grady, J. E. Heyes, D. R. Chowdhury, Y. Zeng, M. T. Reiten, A. K. Azad, A. J. Taylor, D. A. R. Dalvit, and H. T. Chen, "Terahertz metamaterials for linear polarization conversion and anomalous refraction," Science, vol. 340, no. 6138, pp. 1304-1307, 16 May 2013.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	M. I. Shalaev, et al., "High-efficiency all-dielectric metasurfaces for ultracompact beam manipulation in transmission mode," Nano Lett., vol. 15, no. 9, pp. 6261-6266, 2015.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	S. E. Hosseininejad, et al., "Digital metasurface based on graphene: an application to beam steering in terahertz plasmonic antennas," IEEE Trans. Nanotechnol., vol. 18, pp. 734-746, 2019.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	R. Kargar, K. Rouhi, and A. Abdolali, "Reprogrammable multifocal THz metalens based on metal-insulator transition of VO2-assisted digital metasurface," Opt. Commun., vol. 462, Article ID: 125331, May 2020.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	V. S. Asadchy, et al., "Perfect control of reflection and refraction using spatially dispersive metasurfaces," Phys. Rev. B., vol. 94, Article ID: 075142, Aug. 2016.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	J. Huang and J. A. Encinar, Reflectarray Antennas, Wiley, 2008.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	F. Liu, D. H. Kwon, and S. A. Tretyakov, "Reflectarrays and metasurface reflectors as diffraction gratings," IEEE Antennas and Propagation Magazine, vol. 65, no. 3, pp. 21-32, Jun. 2023.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	M. Di Renzo, F. H. Danufane, and S. Tretyakov, "Communication models for reconfigurable intelligent surfaces: from surface electromagnetics to wireless networks optimization," Proc. of the IEEE, vol. 110, no. 9, pp. 1164-1209, Sept. 2021.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	A. Diaz-Rubio and S. Tretyakov, "Macroscopic modeling of anomalously reflecting metasurfaces: angular response and far-field scattering," IEEE Trans. Antennas Propag., vol. 69, no. 10, pp. 6560-6571, Oct. 2021.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	V. Degli-Esposti, E. M. Vitucci, M. Di Renzo, and S. A. Tretyakov, "Reradiation and scattering from a reconfigurable intelligent surface: a general macroscopic model," IEEE Trans. Antennas Propag., vol. 70, no. 10, pp. 8691-8701, Oct. 2022.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	A. Diaz-Rubio, V. Asadchy, A. Elsakka, and S. Tretyakov, "From the generalized reflection law to the realization of perfect anomalous reflectors," Science Advances, vol. 3, no. 8, Article ID: 1602714, 11 Aug. 2017.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	N. Estakhri and A. Alu, "Wave-front transformation with gradient metasurfaces," Physical Review X, vol. 6, no. 4, Article ID: 041008, 2016.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	D. H. Kwon, "Lossless scalar metasurfaces for anomalous reflection based on efficient surface field optimization," IEEE Antennas Wireless Propag. Lett., vol. 17, no. 7, pp. 1149-1152, Jul. 2018.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	J. Budhu and A. Grbic, "Perfectly reflecting metasurface reflectarrays: mutual coupling modeling between unique elements through homogenization," IEEE Trans. Antennas Propag., vol. 69, no. 1, pp. 122-134, Jan. 2021.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	X. Wang, A. Diaz-Rubio, and S. A. Tretyakov, "Independent control of multiple channels in metasurface devices," Phys. Rev. Applied, vol. 14, Article ID: 024089, Aug. 2020.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	D. H. Kwon, "Planar metasurface design for wide-angle refraction using interface field optimization," IEEE Antennas Wireless Propag. Lett., vol. 20, no. 4, pp. 428-432, Apr. 2021.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	O. Rabinovich and A. Epstein, "Analytical design of printed circuit board (PCB) metagratings for perfect anomalous reflection," IEEE Trans. Antennas Propag., vol. 66, no. 8, pp. 4086-4095, Aug. 2018.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	O. Rabinovich, I. Kaplon, J. Reis, and A. Epstein, "Experimental demonstration and in-depth investigation of analytically designed anomalous reflection metagratings," Phys. Rev. B, vol. 99, Article ID: 125101, Mar. 2019.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	O. Rabinovich and A. Epstein, "Arbitrary diffraction engineering with multilayered multielement metagratings," IEEE Trans. Antennas Propag., vol. 68, no. 3, pp. 1553-1568, Mar. 2020.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	C. Pfeiffer and A. Grbic, "Bianisotropic metasurfaces for optimal polarization control: analysis and synthesis," Phys. Rev. Applied, vol. 2, Article ID: 044011, Oct. 2014.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	M. Selvanayagam and G. Eleftheriades, "Polarization control using tensor huygens surfaces," IEEE Trans. Antennas Propag., vol. 62, no. 12, pp. 6155-6168, Dec. 2014.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	T. Niemi, A. Karilainen, and S. Tretyakov, "Synthesis of polarization transformers," IEEE Trans. Antennas Propag., vol. 61, no. 6, pp. 3102-3111, Jun. 2013.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32]	M. A. Salem and C. Caloz, "Manipulating light at distance by a metasurface using momentum transformation," Opt. Express, vol. 22, no. 12, pp. 14530-14534, Jun. 2014.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33]	K. Achouri, M. A. Salem, and C. Caloz, "General metasurface synthesis based on susceptibility tensors," IEEE Trans. Antennas Propag., vol. 63, no. 7, pp. 2977-2991, Jul. 2015.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34]	X. Jia, X. Dang, X. Pan, and M. Wang, "Metasurfaces design using primary elements and characteristic models: connection between SSM/SPM and circuit quantities," IEEE Trans. Antennas Propag., vol. 71, no. 3, pp. 2837-2842, Mar. 2023.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[35]	G. Cai, X. Liu, T. Shen, et al., "A full-vectorial spectral element method with generalized sheet transition conditions for high-efficiency metasurface/metafilm simulation," IEEE Trans Antenn Propag, vol. 71, no. 3, pp. 2652-2660, Mar. 2023.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[36]	G. Lavigne, K. Achouri, V. S. Asadchy, S. A. Tretyakov, and C. Caloz, "Susceptibility derivation and experimental demonstration of refracting metasurfaces without spurious diffraction," IEEE Trans. Antennas Propag., vol. 66, no. 3, pp. 1321-1330, Mar. 2018.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[37]	S. Sun, et al., "High-efficiency broadband anomalous reflection by gradient meta-surfaces," Nano Lett., vol. 12, no. 12, pp. 6043-6506, Dec. 2012.</unstructured_citation></citation><citation key="ref38"><unstructured_citation>
[38]	A. Pors, M. G. Nielsen, R. L. Eriksen, and S. I. Bozhevolnyi, "Broadband focusing flat mirrors based on plasmonic gradient metasurfaces," Nano Lett., vol. 13, no. 2, pp. 829-834, Feb. 2013.</unstructured_citation></citation><citation key="ref39"><unstructured_citation>
[39]	M. Kim, A. M. H. Wong, and G. V. Eleftheriades, "Optical huygens metasurfaces with independent control M. Veysi, C. Guclu, O. Boyraz, and F. Capolino, "Thin anisotropic metasurfaces for simultaneous light focusing 2015.</unstructured_citation></citation><citation key="ref40"><unstructured_citation>
[40]	K. Achouri and O. J. F. Martin, "Fundamental properties and classification of polarization converting bianisotropic metasurfaces," IEEE Trans. Antennas Propag., vol. 69, no. 9, pp. 5653-5663, Sept. 2021.</unstructured_citation></citation><citation key="ref41"><unstructured_citation>
[41]	K. Achouri and C. Caloz, Electromagnetic Metasurfaces: Theory and Applications, Wiley-IEEE Press, 2021.</unstructured_citation></citation><citation key="ref42"><unstructured_citation>
[42]	K. Achouri, et al., "Synthesis of electromagnetic metasurfaces: principles and illustrations," EPJ Appl. Metamater., vol. 2, no. 12, Article ID: 2015016, Jan. 2015.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Pilot Contamination Reduction Using Weighted Graph Coloring and Soft Pilot Reuse</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Amir</given_name><surname>Rostaei</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Hossein</given_name><surname>Khaleghi</surname></person_name></contributors><publication_date media_type="online"><month>1</month><day>8</day><year>2025</year></publication_date><pages><first_page>185</first_page><last_page>196</last_page></pages><doi_data><doi>10.66224/ijece.45982.22.3.185</doi><resource>http://ijece.org/en/Article/45982</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/45982</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/45982</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/45982</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/45982</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/45982</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/45982</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/45982</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	Y. Han, S. Jin, M. Matthaiou, T. Q. S. Quek, and C. K. Wen, "Toward extra large-scale MIMO: new channel properties and low-cost designs," IEEE Internet of Things J., vol. 10, no. 16, pp. 14569-14594, Aug. 2023.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	O. Elijah, et al., "Intelligent massive MIMO systems for beyond 5G networks: an overview and future trends," IEEE Access, vol. 10, pp. 102532-102563, 2022.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	H. Taleb, K. Khawam, S. Lahoud, M. E. Helou, and S. Martin, "Pilot contamination mitigation in massive MIMO cloud radio access networks," IEEE Access, vol. 10, pp. 58212-58224, 2022.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	T. L. Marzetta, "Noncooperative cellular wireless with unlimited numbers of base station antennas," IEEE Trans. on Wireless Communications, vol. 9, no. 11, pp. 3590-3600, Nov. 2010.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	A. Ashikhmin and T. L. Marzetta, "Pilot contamination precoding in multi-cell large scale antenna systems," in Proc. IEEE Int. Sym. Inf. Theory, pp. 1137-1141, Cambridge, MA, USA, 1-6 Jul. 2012.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	J. Zuo, J. Zhang, C. Yuen, W. Jiang, and W. Luo, "Multicell multiuser massive MIMO transmission with downlink training and pilot contamination precoding," IEEE Trans. on Vehicular Technology, vol. 65, no. 8, pp. 6301-6314, Aug. 2016.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	F. Fernandes, A. Ashikhmin, and T. L. Marzetta, "Inter-cell interference in noncooperative TDD large scale antenna systems," IEEE J. on Selected Areas in Communications, vol. 31, no. 2, pp. 192-201, Feb. 2013.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	B. Sun, Y. Zhou, J. Yuan, and J. Shi, "Interference cancellation based channel estimation for massive MIMO systems with time shifted pilots," IEEE Trans. on Wireless Communications, vol. 19, no. 10, pp. 6826-6843, Oct. 2020.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	H. Yin, D. Gesbert, M. Filippou, and Y. Liu, "A coordinated approach to channel estimation in large-scale multiple-antenna systems," IEEE J. on Selected Areas in Communications, vol. 31, no. 2, pp. 264-273, Feb. 2013.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	Y. Omid, S. M. Hosseini, S. M. Shahabi, M. Shikh-Bahaei, and 
A. Nallanathan, "AoA-based pilot assignment in massive MIMO systems using deep reinforcement learning," IEEE Communications Letters, vol. 25, no. 9, pp. 2948-2952, Sep. 2021.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	A. Mishra, Y. Mao, C. K. Thomas, L. Sanguinetti, and B. Clerckx, "Mitigating intra-cell pilot contamination in M-MIMO: a rate splitting approach," IEEE Trans. on Wireless Communications, vol. 22, no. 5, pp. 3472-3487, May 2023.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	A. Mishra, Y. Mao, L. Sanguinetti, and B. Clerckx, "Rate-splitting assisted massive machine-type communications in cell-free M-MIMO," IEEE Communications Letters, vol. 26, no. 6, pp. 1358-1362, Jun. 2022.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	B. Lim, W. J. Yun, J. Kim, and Y. C. Ko, "Joint pilot design and channel estimation using deep residual learning for multi-cell massive MIMO under hardware impairments," IEEE Trans. on Vehicular Technology, vol. 71, no. 7, pp. 7599-7612, Jul. 2022.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	J. Xu, P. Zhu, J. Li, and X. You, "Deep learning-based pilot design for multi-user distributed M-MIMO systems," IEEE Wireless Communications Letters, vol. 8, no. 4, pp. 1016-1019, Aug. 2019.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	X. Zhu, et al., "Soft pilot reuse and multicell block diagonalization precoding for massive MIMO systems," IEEE Trans. on Vehicular Technology, vol. 65, no. 5, pp. 3285-3298, May 2016.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	X. Zhu, L. Dai, Z. Wang, and X. Wang, "Weighted-graph-coloring-based pilot decontamination for multicell massive MIMO systems," IEEE Trans. on Vehicular Technology, vol. 66, no. 3, pp. 2829-2834, Mar. 2017.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	M. Manini, C. Gueguen, R. Legouable, and X. Lagrange, "Efficient system capacity user selection algorithm in MU-MIMO," in Proc. IEEE 93rd Int. Vehicular Technology Conf., 6 pp., Helsinki, Finland, 25-28 Apr. 2021.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	ح. خالقی بیزکی، سیستم های مخابرات بی سیم، دانشگاه صنعتی مالک اشتر، 1399.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	S. M. Sanaie and H. Khaleghi Bizaki, "Performance analysis of multicell massive MIMO THP with pilot contamination," Wiley Trans. on Emerging Telecommunications Technologies, vol. 30, no. 5, Article ID:. e3574, May 2019.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	A. S. Al-hubaishi, N. K. Noordin, A. Sali, S. Subramaniam, and A. Mohammed Mansoor, "An efficient pilot assignment scheme for addressing pilot contamination in multicell massive MIMO systems," Electronics, vol. 8, no. 4, Article ID: 372, Mar. 2019.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	V. Doshi, D. Shah, M. Médard, and M. Effros, "Functional compression through graph coloring," IEEE Trans. on Information Theory, vol. 56, no. 8, pp. 3901-3917, Aug. 2010.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Message Extraction for 9th Pulse Standard of eLoran Navigation System</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Mehri</given_name><surname>Lotfalizade</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Morteza</given_name><surname>Shafiee Neyestanak</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Mohammad Bagher</given_name><surname>Nezafati</surname></person_name></contributors><publication_date media_type="online"><month>1</month><day>8</day><year>2025</year></publication_date><pages><first_page>174</first_page><last_page>184</last_page></pages><doi_data><doi>10.66224/ijece.46154.22.3.174</doi><resource>http://ijece.org/en/Article/46154</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/46154</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/46154</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/46154</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/46154</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/46154</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/46154</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/46154</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	Z. Zuo, X. Qiao, and Y. Wu, "Concepts of comprehensive PNT and related key technologies," in Proc. of the Int. Conf. on Modeling, Analysis, Simulation Technologies and Applications, pp. 365-370, Hangzhou, China, 26-29 2019.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	W. Pelgrum and C. Schue, Navigation with Low‐Frequency Radio Signals, Position, Navigation, and Timing Technologies in the 21st Century, 1st Ed, pp. 1281-1333, 2021.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	Y. Yang, X. Ren, X. Jia, and B. Sun, "Development trends of the national secure PNT system based on BDS," Sci. China Earth Sci., vol. 66, no. 5, pp. 929-938, May 2023.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	C. Yang, S. Li, and Z. Hu, "Analysis of the development status of eLoran time service system in China," Applied Sciences, vol. 13, 
no. 23, Article ID: 12703, Nov. 2023.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	J. Li and H. Wu, "The Loran-C pseudorange positioning and timing algorithm based on the vincenty formula," Remote Sensing, vol. 16, no. 17, Article ID: 3227, Aug. 2024.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	Available online: https://rntfnd.org/wp-content/uploads/eLoran-Definition-Document-0-1-Released.pdf International Loran Association, Enhanced Loran (eLoran) Definition Document, Version 1.0, Jan. 2007.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	A. P. Grunin, S. V. Sai, and B. P. Zakirov, "All-in-view time difference solution for eLoran," in Proc. Wave Electronics and its Application in Information and Telecommunication Systems, 4 pp., St. Petersburg, Russia, 13 May-4 Jun. 2021.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	P. W. Son, S. G. Park, Y. Han, and K. Seo, "ELoran: resilient positioning, navigation, and timing infrastructure in maritime areas," IEEE Access, vol. 8, pp. 193708-193716, 2020.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	S. Lo, B. Peterson, P. Enge, and P. Swaszek, "Loran data modulation: extensions and examples," IEEE Trans. Aerosp. Electron. Syst., vol. 43, no. 2, pp. 628-644, Apr. 2007.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	B. B. Peterson, C. A. Schue, J. M. Boyer, and J. R. Betz, "Enhanced Loran-C data channel project," in Proc. of the Int. Symp. on Integration of Loran-C/Eurofix and EGNOS/Galileo, pp. 186-197, Bonn, Germany, 20-21 Feb. 2001.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	S. C. Lo and P. Enge, "Analysis of the enhanced loran data channel," in Proc. of the Int. Symp. on Integration of Loran-C/Eurofix and EGNOS/Galileo, pp. 159-168, Bonn, Germany, 20-21 Feb. 2001.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	D. Van Willigen, G. W. A. Offermans, and A. W. S. Helwig, "Eurofix: definition and current status," in Proc. of the IEEE 1998 Position Location and Navigation Symp., pp. 101-108, Palm Springs, CA, USA, 20-23 Apr. 1996.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	T. H. Jorgensen, "Loran-C/eurofix in europe-status and future plans," in Proc. of the 13th Int. Technical Meeting of the Satellite Division of the Institute of Navigation, pp. 2464-2467, Salt Lake City, UT, USA, 19-22 Sept. 2000.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	E. E. Elsayed, "Performance enhancement in FSO relay systems with MISO via multi-hop M-ary PPM integrating and spatial modulation over gamma-gamma channels," J. Opt., vol. 2024, 16 pp., 2024.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	L. Hartshorn, P. Swaszek, G. Johnson, M. Wiggins, and R. Hartnett, "Performance of Loran-C 9th pulse modulation techniques," in Proc. of the National Technical Meeting of the Institute of Navigation, pp. 384-395, Monterey, CA, USA, 18-20 Jan. 2006.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	P. W. Son and T. Hyun Fang, "Enhancing coastal air navigation: eloran 3-D positioning and cycle slip mitigation," IEEE Access, vol. 12, pp. 100230-100239, 2024.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	C. Yang, X. Guo, S. Li, and Z. Hu, "Design and performance evaluation of eloran monitoring system," Applied Sciences, vol. 14, no. 16, Article ID: 7350, Aug. 2024.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	W. Ma, J. Gao, Y. Yuan, Z. Shi, and X. Xi, "Suppression of continuous wave interference in Loran-C signal based on sparse optimization using tunable Q-factor wavelet transform and discrete cosine transform," Sensors, vol. 21, no. 21, Article ID: 7153, Oct. 2021.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	ا. عفیفی، ا. خرمی و س. عزیزی، "بهبود الگوريتم گيرنده داده لورن برای کانال های نويزی،" صنایع الکترونیک، سال 11، شماره 2، صص. 41-33، تابستان 1399.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	S. C. Lo and P. Enge, "Data transmission using Loran-C," in Proc. of the Int. Loran Association 29th Annual Meeting, 11 pp., Washington, DC, USA, Nov. 2000.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	S. C. Lo, B. B. Peterson, and P. K. Enge, "Loran data modulation: a primer," IEEE Aerospace and Electronic Systems Magazine, vol. 22, no. 9, pp. 31-51, Sept. 2007.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	S. F. Li, Y. L. Wang, Y. Hua, and Y. L. Xu, "Research of Lloran-C data demodulation and decoding technology," Chin. J. Sci. Instrum, vol. 33, no. 6, pp. 1407-1413, Jun. 2012.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	J. Yuan, W. Yan, S. Li, and Y. Hua, "Demodulation method for Loran-C at low SNR based on envelope correlation-phase detection," Sensors, vol. 20, no. 16, Article ID: 4535, Aug. 2020.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	B. Lyu, Y. Hua, W. Yan, J. Yuan, and S. Li, "Data demodulation algorithm of enhanced Loran system," in Proc. Int. Conf. on Electronic Information Technology, Article ID:  1225434, Chengdu, China, 19-21 May 2022.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	K. Zhang, F. Yang, W. Wang, and X. Ye, "Eloran signal message prediction algorithm based on Alexnet‐ECA," IET Radar, Sonar &amp; Navigation, vol. 18, no. 3, pp. 500-513, Mar. 2024.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	Z. Zhao, et al., "Measurement and analysis of Loran-C sky waves throughout the day," Electronics, vol. 13, no. 7, Article ID: 1240, Mar. 2024.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	SAE International, SAE 9990: Transmitted Enhanced Loran (eLoran) Signal Standard, 2018.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	Q. Liang, W. Xiong, and Y. Li, "Research on modulation technique of high-speed Loran-C data channel," in Proc. 8th In. Conf. on Wireless Communications, Networking and Mobile Computing, 3 pp., Shanghai, China, 21-23 Sept. 2012.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	C. Yang, Y. Wang, S. Li, and W. Yan, "Experimental study of a signal modulation method to improve eLoran data channel communications," Sensors, vol. 20, no. 22, Article ID: 6504, Nov.- 2 2020.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	D. P. F. Swaszek, et al., "Improved signal processing methodologies for the loran data channel," in Proc. of the National Technical Meeting of the Institute of Navigation, pp. 948-959, San Diego, CA, USA, 28-30 Jan. 2008.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	K. Dykstra and B. Peterson, "The Loran data channel: progress to date and future plans," in Proc. of 35th Annual Technical Symp., Int. Loran Association, Groton, 8 pp., San Diego, CA, USA, 22-25 Oct. 2006.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32]	P. W. Son, S. Lee, T. H. Fang, and K. Seo, "Analysis of LDC message reception performance of korean eLoran pilot service according to modulation methods," J. of Navigation and Port Research, vol. 46, no. 6, pp. 525-529, Dec. 2022.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33]	B. Peterson, K. Dykstra, D. Lown, and K. Shmihluk, Loran Data Channel Communications Using 9th Pulse Modulation, Peterson Integrated Geopositioning, LLC, and USCG Loran Support Unit, White Paper, Version 1.3, 20 Oct. 2006.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34]	S. Mamidi, D. Iancu, A. Iancu, M. J. Schulte, and J. Glossner, "Instruction set extensions for Reed-Solomon encoding and decoding," in Proc. IEEE Int. Conf. on Application-Specific Systems, Architecture Processors, pp. 364-369, Samos, Greece, 23-25 Jul. 2005.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[35]	W. Liu, Z. Jiang, Z. Huang, L. Song, and H. Hou, Reed-Solomon Codes over Cyclic Polynomial Ring with Lower Encoding/Decoding Complexity, arXiv preprint arXiv: 2405.01043, May 2024.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[36]	P. Mursanto, "Performance evaluation of Galois field arithmetic operators for optimizing Reed Solomon codec," in Proc. Int. Conf. on Instrumentation, Communication, Information Technology, and Biomedical Engineering, 6 pp., Bandung, Indonesia, 23-25 Nov. 2009.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[37]	S. Nabipour, "Arithmetic Operators over Finite Field GF(2m) for Error Correction Codes Application," arXiv e-prints arXiv-2310, Oct. 2023.</unstructured_citation></citation><citation key="ref38"><unstructured_citation>
[38]	K. Carroll, et al., "Differential Loran-C," in Proc. of GNSS, the European Navigation Conf., 15 pp., Rotterdam, Netherland, May 2004.</unstructured_citation></citation><citation key="ref39"><unstructured_citation>
[39]	W. Yan, K. Zhao, S. Li, X. Wang, and Y. Hua, "Precise Loran-C signal acquisition based on envelope delay correlation method," Sensors, vol. 20, no. 8, Article ID: 2329, Apr.-2 2020.</unstructured_citation></citation><citation key="ref40"><unstructured_citation>
[40]	J. Safar, P. Williams, A. Grant, and F. Vejrazka, "Analysis, modeling, and mitigation of cross-rate interference in eLoran: analysis of cross-rate interference in eloran," J. Inst. Navig., vol. 63, no. 3, pp. 295-319, Sep. 2016.</unstructured_citation></citation><citation key="ref41"><unstructured_citation>
[41]	C. Lubeigt, F. Vincent, L. Ortega, J. Vilà-Valls, and E. Chaumette, "Approximate maximum likelihood time-delay estimation for two closely spaced sources," Signal Processing, vol. 210, no. C, Article ID: 109056, Sept. 2023.</unstructured_citation></citation><citation key="ref42"><unstructured_citation>
[42]	Y. Zhang, Y. Jin, Y. Wu, C. Hao, and D. Orlando, "Sparsity-based time delay estimation through the matched filter outputs," IEEE Signal Processing Letters, vol. 29, pp. 1769-1773, 2022.</unstructured_citation></citation><citation key="ref43"><unstructured_citation>
[43]	C. L. Boyce, J. D. Sherman Lo, and P. E. Powell, Analysis of Noise and Cycle Selection in a Loran Receiver, Stanford University, 2001.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Bidirectional Bus Transfer Method for Induction Motors Between Inverter and Grid By Correcting Control References Using Discrete Fourier Transformation</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Alireza</given_name><surname>Lahooti Eshkevari</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Ali</given_name><surname>Keshavarzian</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Iman</given_name><surname>Abdoli</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Mohammad</given_name><surname>Farzi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Seyed Mohammadreza</given_name><surname>Zeinalhosseini</surname></person_name></contributors><publication_date media_type="online"><month>1</month><day>8</day><year>2025</year></publication_date><pages><first_page>208</first_page><last_page>215</last_page></pages><doi_data><doi>10.66224/ijece.46497.22.3.208</doi><resource>http://ijece.org/en/Article/46497</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/46497</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/46497</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/46497</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/46497</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/46497</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/46497</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/46497</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	T. R. Beckwith and W. G. Hartmann, "Motor bus transfer: considerations and methods," IEEE Trans. Ind. Appl., vol. 42, no. 2, pp. 602-611, 2006.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	P. K. Muralimanohar, D. Haas, J. R. McClanahan, R. T. Jagaduri, and S. Singletary, "Implementation of a Microprocessor-Based Motor Bus Transfer Scheme," IEEE Trans. Ind. Appl., vol. 54, no. 4, pp. 4001-4008, 2018.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	M. V. V. S. Yalla, A. Vakili, and T. R. Beckwith, "Calculation of Transient Torques on Motors During a Residual Voltage Motor Bus Transfer," IEEE Trans. Ind. Appl., vol. 56, no. 6, pp. 6104-6116, 2020.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	X. Guo, W. Wu, and Z. Chen, "Multiple-complex coefficient-filter-based phase-locked loop and synchronization technique for three-phase grid-interfaced converters in distributed utility networks," IEEE Trans. Ind. Electron., vol. 58, no. 4, pp. 1194-1204, 2010.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	S. Golestan, M. Monfared, and F. D. Freijedo, "Design-oriented study of advanced synchronous reference frame phase-locked loops," IEEE Trans. Power Electron., vol. 28, no. 2, pp. 765-778, 2012.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	A. A. Ahmad, M. Pichan, and A. Abrishamifar, "A new simple structure PLL for both single and three phase applications," International Journal of Electrical Power &amp; Energy Systems, vol. 74, pp. 118-125, 2016.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	B. Misra and B. Nayak, "Second order generalized integrator based synchronization technique for polluted grid conditions," in 2nd International Conference for Convergence in Technology (I2CT), 2017: IEEE, pp. 1080-1084. </unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	Q. Yan, R. Zhao, X. Yuan, W. Ma, and J. He, "A DSOGI-FLL-Based Dead-Time Elimination PWM for Three-Phase Power Converters," IEEE Trans. Power Electron., vol. 34, no. 3, pp. 2805-2818, 2019.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	S. Golestan, J. M. Guerrero, and J. C. Vasquez, "Hybrid Adaptive/Nonadaptive Delayed Signal Cancellation-Based Phase-Locked Loop," IEEE Trans. Ind. Electron., vol. 64, no. 1, pp. 470-479, 2017.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	S. Golestan, J. M. Guerrero, and J. C. Vasquez, "Steady-state linear Kalman filter-based PLLs for power applications: A second look," IEEE Trans. Ind. Electron., vol. 65, no. 12, pp. 9795-9800, 2018.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	T. Binkowski, "Fuzzy Logic Grid Synchronization Technique for Single-Phase Systems," in 2018 Progress in Applied Electrical Engineering (PAEE), 2018: IEEE, pp. 1-5. </unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	S. Golestan, J. M. Guerrero, J. C. Vasquez, A. M. Abusorrah, and Y. Al-Turki, "All-Pass-Filter-Based PLL Systems: Linear Modeling, Analysis, and Comparative Evaluation," IEEE Trans. Power Electron., vol. 35, no. 4, pp. 3558-3572, 2020.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	A. Ranjan, S. Kewat, and B. Singh, "DSOGI-PLL With In-Loop Filter Based Solar Grid Interfaced System for Alleviating Power Quality Problems," IEEE Trans. Ind. Appl., vol. 57, no. 1, pp. 730-740, 2021.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	Z. Zhang et al., "An Adaptive Enhanced Complex-Coefficient Filter-Based PLL in Variable Frequency Grid," IEEE Trans. Power Electron., vol. 39, no. 4, pp. 3950-3955, 2024.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	F. Sevilmiş, H. Karaca, and H. Ahmed, "High-Order Delayed Signal Cancellation-Based PLL Under Harmonically Distorted Grid Voltages," IEEE Transactions on Instrumentation and Measurement, vol. 72, pp. 1-9, 2023.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	X. M. Jia and S. S. Choi, "Design of Volts per Hertz limiter with consideration of the under-excitation limiter control actions," IEEE Trans. Energy Convers., vol. 16, no. 2, pp. 140-147, 2001.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	L. Xiong et al., "Virtual Field-Orientated Control for Doubly Salient Electromagnetic Machine with Torque Ripple Reduction," IEEE Trans. Power Electron., vol. 39, no. 1, pp. 1378-1393, 2024.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	N. Beniwal, I. Hussain, and B. Singh, "Vector-Based Synchronization Method for Grid Integration of Solar PV-Battery System," IEEE Trans. Ind. Inf., vol. 15, no. 9, pp. 4923-4933, 2019.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Proposing an Islanding Detection Index for Distribution Networks with Conventional and Inverter-Based Distributed Generators</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name> Amir Hosein </given_name><surname> Alizadeh</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Seyed Fariborz</given_name><surname>Zarei</surname></person_name></contributors><publication_date media_type="online"><month>1</month><day>8</day><year>2025</year></publication_date><pages><first_page>216</first_page><last_page>223</last_page></pages><doi_data><doi>10.66224/ijece.46748.22.3.216</doi><resource>http://ijece.org/en/Article/46748</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/46748</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/46748</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/46748</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/46748</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/46748</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/46748</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/46748</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	D. Gielen, et al., "The role of renewable energy in the global energy transformation," Energy Strategy Reviews, vol. 24, pp. 38-50, Apr. 2019.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	S. F. Zarei, H. Mokhtari, and M. A. Ghasemi, "Enhanced control of grid forming VSCs in a micro-grid system under unbalanced conditions," in Proc. 9th Annual Power Electronics, Drives Systems and Technologies Conf., pp. 380-385, Tehran, Iran, 13-15 Feb. 2018.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	J. L. Holechek, H. M. Geli, M. N. Sawalhah, and R. Valdez, "A global assessment: can renewable energy replace fossil fuels by 2050?" Sustainability, vol. 14, no. 8, Article ID: 4792, Apr-2. 2022.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	M. Mishra, S. Chandak, and P. K. Rout, "Taxonomy of islanding detection techniques for distributed generation in microgrid," Renewable Energy Focus, vol. 31, pp. 9-30, Dec. 2019.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	S. F. Zarei, H. Mokhtari, and F. Blaabjerg, "Fault detection and protection strategy for islanded inverter-based microgrids," IEEE J. of Emerging and Selected Topics in Power Electronics, vol. 9, no. 1, pp. 472-484, Feb. 2019.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	P. Fernández‐Porras, M. Panteli, and J. Quirós‐Tortós, "Intentional controlled islanding: when to island for power system blackout prevention," IET Generation, Transmission &amp; Distribution, vol. 12, no. 14, pp. 3542-3549, Aug. 2018.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	M. S. Kim, et al., "Comprehensive review of islanding detection methods for distributed generation systems," Energies, vol. 12, no. 5, Article ID: 0837, Mar. 2019.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	M. Alobaid and A. G. Abo-Khalil, "A comprehensive review and assessment of islanding detection techniques for PV systems," International J. of Thermofluids, vol. 18, Article ID: 100353, May 2023.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	S. F. Zarei and M. Parniani, "A comprehensive digital protection scheme for low-voltage microgrids with inverter-based and conventional distributed generations," IEEE Trans. on Power Delivery, vol. 32, no. 1, pp. 441-452, Feb. 2016.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	R. A. Mastromauro, "Grid synchronization and islanding detection methods for single-stage photovoltaic systems," Energies, vol. 13, no. 13, Article ID: 3382, Jul.-12020.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	B. K. Chaitanya, A. Yadav, and M. Pazoki, "An advanced signal decomposition technique for islanding detection in DG system," IEEE Systems J., vol. 15, no. 3, pp. 3220-3229, Sept. 2021.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	A. A. Abdelsalam, A. A. Salem, E. S. Oda, and A. A. Eldesouky, "Islanding detection of microgrid incorporating inverter based DGs using long short-term memory network," IEEE Access, vol. 8, pp. 106471-106486, 2020.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	N. B. Hartmann, R. C. dos Santos, A. P. Grilo, and J. C. M. Vieira, "Hardware implementation and real-time evaluation of an ANN-based algorithm for anti-islanding protection of distributed generators," IEEE Trans. on Industrial Electronics, vol. 65, no. 6, pp. 5051-5059, Jun. 2018.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	S. R. Samantaray, B. C. Babu, and P. K. Dash, "Probabilistic neural network based islanding detection in distributed generation," Electric Power Components and Systems, vol. 39, no. 3, pp. 191-203, Jan. 2011.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	S. Adari and B. R. Bhalja, "Islanding detection of distributed generation using random forest technique," in Proc. IEEE 6th Int. Conf. on Power Systems, 6 pp., New Delhi, India, 4-6 Mar. 2016.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	A. H. Alizadeh, S. F. Zarei, and M. H. Shateri, "A sequence component-based feature for passive and artificial-intelligence-based islanding detection," in Proc. The Power Electronics and Drives: Systems and Technologies Conf., 7 pp., Tehran, Iran, 30 Jan.-1 Feb. 2024. [Online]. Available: https://sid.ir/paper/1132488/en</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	Y. Yang, Elements of Information Theory, Ed: Taylor &amp; Francis, 2008.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	T. Saito and M. Rehmsmeier, "The precision-recall plot is more informative than the ROC plot when evaluating binary classifiers on imbalanced datasets," PLOS One, vol. 10, no. 3, Article ID: e0118432, 2015.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	M. Pourmirasghariyan, S. F. Zarei, M. Hamzeh, and F. Blaabjerg, "A power routing-based fault detection strategy for multi-terminal VSC-HVDC grids," IEEE Trans. on Power Delivery, vol. 38, no. 1, pp. 528-540, Feb. 2022.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	Y. LeCun and Y. Bengio, "Convolutional networks for images, speech, and time series," In M. C. Arbib (Ed.), The Handbook of Brain Theory and Neural Networks, Cambridge: MIT Press, 1998.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	D. E. Rumelhart, G. E. Hinton, and R. J. Williams, "Learning representations by back-propagating errors," Nature, vol. 323, pp. 533-536, 1986.
[22]	K. P. Murphy, Probabilistic Machine Learning: An Introduction, MIT Press, 2022.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[23]	Y. Xia, F. Yu, X. Xiong, Q. Huang, and Q. Zhou, "A novel microgrid islanding detection algorithm based on a multi-feature improved LSTM," Energies, vol. 15, no. 8, Article ID: 2810, Apr.-2 2022.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[24]	N. A. Larik, M. F. Tahir, Z. S. Elbarbary, M. Z. Yousaf, and M. A. Khan, "A comprehensive literature review of conventional and modern islanding detection methods," Energy Strategy Reviews, vol. 44, Article ID: pp. 101007, Nov. 2022.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Strengthening of Power Grid Protection Systems Against Cyber-Attacks: A Comprehensive Review</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Zahra</given_name><surname>Pourahmad</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>R.</given_name><surname>Hooshmand</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>S. Mohammad</given_name><surname>Madani</surname></person_name></contributors><publication_date media_type="online"><month>1</month><day>8</day><year>2025</year></publication_date><pages><first_page>159</first_page><last_page>173</last_page></pages><doi_data><doi>10.66224/ijece.47772.22.3.159</doi><resource>http://ijece.org/en/Article/47772</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/47772</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/47772</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/47772</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/47772</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/47772</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/47772</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/47772</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	Y. Xiang, Z. Ding, Y. Zhang, and L. Wang, "Power system reliability evaluation considering load redistribution attacks," IEEE Trans. on Smart Grid, vol. 8, no. 2, pp. 889-901, Mar. 2017.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	Y. Xiang and L. Wang, "A game-theoretic study of load redistribution attack and defense in power systems," Electric Power Systems Research, vol. 151, pp. 12-25, Oct. 2017.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	N. Rajeswaran, et al., "A study on cyber-physical system architecture for smart grids and its cyber vulnerability," In: H. Haes Alhelou, N., Hatziargyriou, and Z. Y. Dong (eds) Power Systems Cybersecurity. Power Systems Power Systems Cybersecurity, pp. 413-427, Springer, 2023.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	J. Sakhnini, H. Karimipour, A. Dehghantanha, R. M. Parizim, and G. Srivastava, "Security aspects of Internet of Things aided smart grids: a bibliometric survey," Internet of Things, vol. 14, Article ID: 100111, Jun. 2021.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	S. Riahinia, A. Ameli, M. Ghafouri, and A. Yassine, "Cyber-security of protection system in power grids-part 1: vulnerabilities and counter-measures," In: H. Haes Alhelou, N., Hatziargyriou, and Z. Y. Dong (eds) Power Systems Cybersecurity. Power Systems Power Systems Cybersecurity, pp. 203-237, Springer, 2023.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	A. Hassan, et al., "A survey and bibliometric analysis of different communication technologies available for smart meters," Cleaner Engineering and Technology, vol. 7, Article ID: 100424, Apr. 2022.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	J. Jarmakiewicz, K. Parobczak, and K. Maślanka, "Cybersecurity protection for power grid control infrastructures," International J. of Critical Infrastructure Protection, vol. 18, pp. 20-33, Sept. 2017.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	GE Power Management, Relay Selection Guide, 40 pp., https://www.gegridsol utions.com/multilin/notes/get-8048a.pdf </unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	K. Islam, D. Kim, and A. Abu-Siada, "A review on adaptive power system protection schemes for future smart and micro grids, challenges and opportunities," Electric Power Systems Research, vol. 230, Article ID: 110241, May 2024.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	Y. M. Khaw, et al., "Preventing false tripping cyberattacks against distance relays: a deep learning approach," in Proc. IEEE Int. Conf. on Communications, Control, and Computing Technologies for Smart Grids, 6 pp., Beijing, China, 21-23 Oct. 2019.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	T. A. Abd Almuhsen and A. J. Sultan, "Coordination of directional overcurrent, distance, and breaker failure relays using genetic algorithm including pilot protection," in Proc. IOP Conf. Series: Materials Science and Engineering, vol. 1105, 14 pp., Baghdad, Iraq, 21-22 Dec. 2021.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	M. Zare Jahromi, A. Abiri Jahromi, S. Sanner, D. Kundur, and M. Kassouf, "Cybersecurity enhancement of transformer differential protection using machine learning," IEEE Power &amp; Energy Society General Meeting, 5 pp., Montreal, Canada, 2-6 Aug. 2020.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	J. Olijnyk, B. Bond, and J. Rrushi, "Design and emulation of physics-centric cyberattacks on an electrical power transformer," IEEE Access, vol. 10, pp. 15227-15246, 2022.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	EN IEC 60255-187-1: 2021.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	A. Ayad, E. F. El-Saadany, M. M. A. Salama, and A. Youssef, "A learning-based framework for detecting cyber-attacks against line current differential relays," IEEE Trans. on Power Delivery, vol. 36, no. 4, pp. 2274-2286, Aug. 2020.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	A. M. Saber, A. Youssef, D. Svetinovic, H. H. Zeineldin, E. F. El-Saadany, "Anomaly-based detection of cyberattacks on line current differential relays," IEEE Trans. on Smart Grid, vol. 13, no. 6, pp. 4787-4800, Nov. 2022.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	] A.A. Bouramdane. "Cyberattacks in smart grids: challenges and solving the multi-criteria decision-making for cybersecurity options, including ones that incorporate artificial intelligence, using an analytical hierarchy process," Journal of Cybersecurity and Privacy, vol. 3, no. 4, pp. 662–705, 2023.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	R. Nuqui, J. Hong, A. Kondabathini, D. Ishchenko, and D. Coats, "A collaborative defense for securing protective relay settings in electrical cyber physical systems," in Proc. 2018 Resilience Week, pp. 49-54, Denver, CO, USA, 20-23 Aug. 2018.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	M. Zare Jahromi, A. Abiri Jahromi, S. Sanner, D. Kundur, and M. Kassouf, "Cybersecurity enhancement of transformer differential protection using machine learning," IEEE Power &amp; Energy Society General Meeting, 5 pp., Montreal, Canada, 2-6 Aug. 2020.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	A. Ameli, A. Hooshyar, E. F. El-Saadany, and A. M. Youssef, "An intrusion detection method for line current differential relays," IEEE Trans. on Information Forensics and Security, vol. 15, pp. 329-344, 2019.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	M. Ganjkhani, M. M. Hosseini, and M. Parvania, "Optimal defensive strategy for power distribution systems against relay setting attacks," IEEE Trans. on Power Delivery, vol. 38, no. 3, pp. 1499-1509, Jun. 2023.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	V. S. Rajkumar, et al., "Cyber attacks on power system automation and protection and impact analysis," in Proc. IEEE PES Innovative Smart Grid Technologies Europe, pp. 247-254, Hague, The Netherlands, 26-28 Oct. 2020.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	J. Wurm, K. Hoang, O. Arias, A. R. Sadeghi, and Y. Jin, "Security analysis on consumer and industrial IoT devices," in Proc. IEEE 21st Asia South Pacific Des. Automat. Conf., pp. 519-524, Macao, China, 25-28 Jan. 2016.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	C. W. Johnson, M. H. Saleem, M. Evangelopoulou, M. Cook, R. Harkness, and T. Barker, "Defending against firmware cyber attacks on safety-critical systems," J. Syst. Saf., vol. 54, no. 1, pp. 16-21, Spring 2018.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	D. Formby, S. S. Jung, S. Walters, and R. Beyah, "A physical overlay framework for insider threat mitigation of power system devices," in Proc. IEEE Int. Conf. on Smart Grid Communications, pp. 970-975, Venice, Italy, 3-6 Nov. 2014.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	A. Chattopadhyay, A. Ukil, D. Jap, and S. Bhasin, "Toward threat of implementation attacks on substation security: case study on fault detection and isolation," IEEE Trans. Ind. Inform., vol. 14, no. 6, pp. 2442-2451, Jun. 2018.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	T. E. McDermott, J. D. Doty, J. G. O’Brien, C. R. Eppinger, and T. Becejac, Cybersecurity for Distance Relay Protection, No. PNNL-29663. Pacific Northwest National Lab., Richland, WA, USA, 2020.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	A. K. Maurya, P. Singhaal, and H. K. Pathak, "Analysis of cyber security attacks on power system networks and its protection schemes," in Proc. 4th Int. Conf. on Advances in Electrical, Computing, Communication and Sustainable Technologies, 6 pp., Bhilai, India, 11-12 Jan. 2024.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	F. Peng, et al., "Power differential protection for transformer based on fault component network," IEEE Trans. on Power Delivery, vol. 38, no. 4, pp. 2464-2477, Aug. 2023.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	D. Yang, Y. Zhang, X. An, and Y. Hou, "Analysis of relay protection fault propagation mechanism and attack detection method under cyber attack," in Proc. 3rd Int. Conf. on Electronic Information Engineering and Computer Communication, 5 pp., Wuhan, China, 22-24 2023.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	Z. Q. Bo, X. N. Lin, Q. P. Wang, Y. H. Yi, and F. Q. Zhou, "Developments of power system protection and control," Protection and Control of Modern Power Systems, vol. 1, Article ID: 7, 2016.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32]	Y. M. Khaw, et al., "A deep learning-based cyberattack detection system for transmission protective relays," IEEE Trans. on Smart Grid, vol. 12, no. 3, pp. 2554-2565, May 2020.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33]	L. Yu, X. M. Sun, and T. Sui, "False-data injection attack in electricity generation system subject to actuator saturation: analysis and design," IEEE Trans. on Systems, Man, and Cybernetics: Systems, vol. 49, no. 8, pp. 1712-1719, Aug. 2019.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34]	L. Zeng, et al., "Resilience assessment for power systems under sequential attacks using double DQN with improved prioritized experience replay," IEEE Systems J., vol. 17, no. 2, pp. 1865-1876, Jun. 2022.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[35]	S. D. Roy and S. Debbarma, "Detection and mitigation of cyber-attacks on AGC systems of low inertia power grid," IEEE Systems J., vol. 14, no. 2, pp. 2023-2031, Jun. 2019.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[36]	A. Ameli, A. Hooshyar, E. F. El-Saadany, and A. M. Youssef, "Attack detection and identification for automatic generation control systems," IEEE Trans. on Power Systems, vol. 33, no. 5, pp. 4760-4774, Sept. 2018.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[37]	A. S. L. V. Tummala and R. K. Inapakurthi, "A two-stage Kalman filter for cyber-attack detection in automatic generation control system," J. of Modern Power Systems and Clean Energy, vol. 10, no. 1, pp. 50-59, Jan. 2021.</unstructured_citation></citation><citation key="ref38"><unstructured_citation>
[38]	Z. Qu, et al., "Detection of false data injection attack in AGC system based on random forest," Machines, vol. 11, no. 1, Article ID: 83, Jan. 2023.</unstructured_citation></citation><citation key="ref39"><unstructured_citation>
[39]	S. Alhalali, N. Christopher, and R. El-Shatshat, "Mitigation of cyber-physical attacks in multi-area automatic generation control," International J. of Electrical Power &amp; Energy Systems, vol. 112, pp. 362-369, Nov. 2019.</unstructured_citation></citation><citation key="ref40"><unstructured_citation>
[40]	S. Sarangan, V. K. Singh, and M. Govindarasu, "Cyber attack-defense analysis for automatic generation control with renewable energy sources," in Proc. North American Power, 6 pp., Fargo, ND, USA, 9-11 Sept. 2018.</unstructured_citation></citation><citation key="ref41"><unstructured_citation>
[41]	T. Huang, B. Satchidanandan, P. R. Kumar, and L. Xie, "An online detection framework for cyber attacks on automatic generation control," IEEE Trans. on Power Systems, vol. 33, no. 6, pp. 6816-6827, Nov. 2018.</unstructured_citation></citation><citation key="ref42"><unstructured_citation>
[42]	Z. Amiri, et al., "Adventures in data analysis: a systematic review of deep learning techniques for pattern recognition in cyber-physical-social systems," Multimedia Tools and Applications, vol. 83, pp. 22909-22973, 2024.</unstructured_citation></citation><citation key="ref43"><unstructured_citation>
[43]	T. Behdadnia and G. Deconinck, Anomaly Detection in Automatic Generation Control Systems Based on Traffic Pattern Analysis and Deep Transfer Learning, arXiv preprint arXiv: 2209.08099, 2022.</unstructured_citation></citation><citation key="ref44"><unstructured_citation>
[44]	A. Ameli, A. Hooshyar, and E. F. El-Saadany, "Development of a cyber-resilient line current differential relay," IEEE Trans. on Industrial Informatics, vol. 15, no. 1, pp. 305-318, Jan. 2018.</unstructured_citation></citation><citation key="ref45"><unstructured_citation>
[45]	V. S. Rajkumar, A. Stefanov, A. Presekal, P. Palensky, and J. L. R. Torres, "Cyber attacks on power grids: causes and propagation of cascading failures," IEEE Access, vol. 11, pp. 103154-103176, 2023.</unstructured_citation></citation><citation key="ref46"><unstructured_citation>
[46]	A. Khaleghi, M. S. Ghazizadeh, and M. R. Aghamohammadi, "A deep learning-based attack detection mechanism against potential cascading failure induced by load redistribution attacks," IEEE Trans. on Smart Grid, vol. 14, no. 6, pp. 4772-4783, Nov. 2023.</unstructured_citation></citation><citation key="ref47"><unstructured_citation>
[47]	A. Ameli, et al., "Vulnerabilities of line current differential relays to cyber-attacks," in Proc. IEEE Power &amp; Energy Society Innovative Smart Grid Technologies Conf., 5 pp., Washington, DC, USA, 18-21 Feb. 2019.</unstructured_citation></citation><citation key="ref48"><unstructured_citation>
[48]	A. Ameli, A. Hooshyar, and E. F. El-Saadany, "Development of a cyber-resilient line current differential relay," IEEE Trans. on Industrial Informatics, vol. 15, no. 1, pp. 305-318, Jan. 2019.</unstructured_citation></citation><citation key="ref49"><unstructured_citation>
[49]	L. Chen, et al., "Remedial pilot main protection scheme for transmission line independent of data synchronism," IEEE Trans. on Smart Grid, vol. 10, no. 1, pp. 681-690, Jan. 2019.</unstructured_citation></citation><citation key="ref50"><unstructured_citation>
[50]	L. I. U. Raanaa, Condition Monitoring of Power Transformers in Digital Substations, MS Thesis, NTNU, 2020.</unstructured_citation></citation><citation key="ref51"><unstructured_citation>
[51]	H. Rahimpour, et al., Cybersecurity Challenges of Power Transformers, arXiv preprint arXiv: 2302.13161, 2023.</unstructured_citation></citation><citation key="ref52"><unstructured_citation>
[52]	D. B. Unsal, T. S. Ustun, S. M. S. Hussain, and A. Onen, "Enhancing cybersecurity in smart grids: false data injection and its mitigation," Energies, vol. 14, no. 9, Article ID: 2657, May-1 2021.</unstructured_citation></citation><citation key="ref53"><unstructured_citation>
[53]	Y. Wang and J. P. Hespanha, "Distributed estimation of power system oscillation modes under attacks on GPS clocks," IEEE Trans. on Instrumentation and Measurement, vol. 67, no. 7, pp. 1626-1637, Jul. 2018.</unstructured_citation></citation><citation key="ref54"><unstructured_citation>
[54]	E. Shereen, et al., "Feasibility of time-synchronization attacks against PMU-based state estimation," IEEE Trans. on Instrumentation and Measurement, vol. 69, no. 6, pp. 3412-3427, Jun. 2019.</unstructured_citation></citation><citation key="ref55"><unstructured_citation>
[55]	K. D. Lu and Z. G. Wu, "Genetic algorithm-based cumulative sum method for jamming attack detection of cyber-physical power systems," IEEE Trans. on Instrumentation and Measurement, vol. 71, Article ID: 9004810, 10 pp., 2022.</unstructured_citation></citation><citation key="ref56"><unstructured_citation>
[56]	P. Top, et al., "Simulation of a RTU cyber attack on a transformer bank," in Proc. IEEE Power &amp; Energy Society General Meeting, 5 pp., Chicago, IL, USA, 16-20 Jul. 2017.</unstructured_citation></citation><citation key="ref57"><unstructured_citation>
[57]	C. Avci, B. Tekinerdogan, and C. Catal. "Design tactics for tailoring transformer architectures to cybersecurity challenges," Cluster Computing, vol. 27, pp. 9587-9613, 2024.</unstructured_citation></citation><citation key="ref58"><unstructured_citation>
[58]	United States Senate Republican Policy Committee, Infrastructure Cybersecurity: The US Electric Grid, 2021.</unstructured_citation></citation><citation key="ref59"><unstructured_citation>
[59]	J. Olijnyk, B. Bond, and J. Rrushi, "Design and emulation of physics-centric cyberattacks on an electrical power transformer," IEEE Access, vol. 10, pp. 15227-15246, 2022.</unstructured_citation></citation><citation key="ref60"><unstructured_citation>
[60]	S. Hasheminejad. "A new protection method for the power transformers using Teager energy operator and a fluctuation identifier index," Electric Power Systems Research, vol. 213, Article ID: 108776, Dec. 2022‏.</unstructured_citation></citation><citation key="ref61"><unstructured_citation>
[61]	A. Klien, Y. Gosteli, and S. Mattmann, "Design and commissioning of a secure substation network architecture," in Proc. 15th Int. Conf. on Developments in Power System Protection, 5 pp., Liverpool, UK, 9-12 Mar. 2020.</unstructured_citation></citation><citation key="ref62"><unstructured_citation>
[62]	B. Ahn, et al., "Security threat modeling for power transformers in cyber-physical environments," in Proc. IEEE Power &amp; Energy Society Innovative Smart Grid Technologies Conf., 5 pp., Washington, DC, USA, 16-18 Feb. 2021.</unstructured_citation></citation><citation key="ref63"><unstructured_citation>
[63]	S. Chakrabarty and B. Sikdar, "Detection of hidden transformer tap change command attacks in transmission networks," IEEE Trans. on Smart Grid, vol. 11, no. 6, pp. 5161-5173, Nov. 2020.</unstructured_citation></citation><citation key="ref64"><unstructured_citation>
[64]	A. S. Musleh, G. Chen, and Z. Y. Dong, "A survey on the detection algorithms for false data injection attacks in smart grids," IEEE Trans. on Smart Grid, vol. 11, no. 3, pp. 2218-2234, May 2020.</unstructured_citation></citation><citation key="ref65"><unstructured_citation>
[65]	L. Xu, L. Xiaoyi, and Y. Sun, "Detection of false data injection attacks in smart grid based on machine learning," In Advances in Artificial Intelligence and Security: 7th Int. Conf., ICAIS 2021, Dublin, Ireland, Jul. 2021, Proc. Part III 7, Springer, 2021.</unstructured_citation></citation><citation key="ref66"><unstructured_citation>
[66]	J. Q. Ruan, et al., "AC sparse modeling for false data injection attack on smart gird," in Proc. Asian Conf. on Energy, Power and Transportation Electrification, 5 pp., Singapore, 24-26 Oct. 2017.</unstructured_citation></citation><citation key="ref67"><unstructured_citation>
[67]	C. Liu, H. Liang, T. Chen, J. Wu and C. Long, "Joint admittance perturbation and meter protection for mitigating stealthy FDI attacks against power system state estimation," IEEE Trans. on Power Systems, vol. 35, no. 2, pp. 1468-1478, Mar. 2020.</unstructured_citation></citation><citation key="ref68"><unstructured_citation>
[68]	M. Z. Jahromi, et al., "Data analytics for cybersecurity enhancement of transformer protection," ACM SIGEnergy Energy Informatics Review, vol. 1, no. 1, pp. 12-19, Nov. 2021.</unstructured_citation></citation><citation key="ref69"><unstructured_citation>
[69]	S. Chakrabarty and B. Sikdar, "Detection of malicious command injection attacks on phase shifter control in smart grids," IEEE Trans. on Power Systems, vol. 36, no. 1, pp. 271-280, Jan. 2021.</unstructured_citation></citation><citation key="ref70"><unstructured_citation>
[70]	H. Karimipour, et al., "A deep and scalable unsupervised machine learning system for cyber-attack detection in large-scale smart grids," IEEE Access, vol. 7, pp. 80778-80788, 2019.</unstructured_citation></citation><citation key="ref71"><unstructured_citation>
[71]	W. Sattinger, Critical Infrastructure Cyber Security: Applications of Machine Learning and Artificial Intelligence in Detecting, Responding, to and Containing Threats, CIGRETech. Rep., Ref D2-210_2020, 2020.</unstructured_citation></citation><citation key="ref72"><unstructured_citation>
[72]	N. Tatipatri and S. L. Arun, "A comprehensive review on cyber-attacks in power systems: impact analysis, detection and cyber security," IEEE Access, vol. 12, pp. 18147-18167, 2024.</unstructured_citation></citation><citation key="ref73"><unstructured_citation>
[73]	V. Dave and A. Sharma, "Operation of differential relay for power transformer using support vector machine," in Proc. IEEE/PES Transmission and Distribution Conf. and Exposition. 6 pp., Chicago, IL, USA, 21-24 Apr. 2008.</unstructured_citation></citation><citation key="ref74"><unstructured_citation>
[74]	A. Clark and S. Zonouz, "Cyber-physical resilience: definition and assessment metric," IEEE Trans. Smart Grid, vol. 10, no. 2, pp. 1671-1684, Mar. 2019.</unstructured_citation></citation><citation key="ref75"><unstructured_citation>
[75]	M. Rajaee and K. Mazlumi, "Multi-agent distributed deep learning algorithm to detect cyber-attacks in distance relays," IEEE Access, vol. 11, pp. 10842-10849, 2023.</unstructured_citation></citation><citation key="ref76"><unstructured_citation>
[76]	Z. Pourahmad, R. A. Hooshmand, and M. Ataei. "Optimal placement of PMU and PDC in power systems by considering the vulnerabilities against cyber-attacks," Electrical Engineering, vol. 106, no. 1, pp. 93-109, 2024.</unstructured_citation></citation><citation key="ref77"><unstructured_citation>
[77]	Z. Pourahmad and R. A. Hooshmand, "Smart grid protection against cyber-attacks using PMUs and DC system model," in Proc. 13th Smart Grid Conf., 8 pp., Tehran, Iran, 5-6 Dec. 2023.</unstructured_citation></citation><citation key="ref78"><unstructured_citation>
[78]	A. Moradi and S. M. Madani, "Technique for inrush current modelling of power transformers based on core saturation analysis," IET Generation, Transmission &amp; Distribution, vol. 12, no. 10, pp. 2317-2324, May 2018.</unstructured_citation></citation><citation key="ref79"><unstructured_citation>
[79]	S. W. Kim, "Detection and mitigation of false data injection in cooperative communications," in Proc. IEEE 16th Int. Workshop on Signal Processing Advances in Wireless Communications, pp. 321-325, Stockholm, Sweden, 28 Jun.-1 Jul. 2015.</unstructured_citation></citation><citation key="ref80"><unstructured_citation>
[80]	J. K. Narang and B. Bag, "Replay attack detection in overcurrent relays using mathematical morphology and LSTM autoencoder," 
in Proc. IEEE Int. Conf. on Advanced Networks and Telecommunications Systems, 6 pp., Gandhinagar, India, 18-21 Dec. 2022.</unstructured_citation></citation><citation key="ref81"><unstructured_citation>
[81]	L. Wang, et al., "Power electronic attack targeting relay protection and corresponding detection method," in Proc. IEEE 3rd Int. Conf. on Circuits and Systems, pp. 203-206, Chengdu, China, 29-31 Oct. 2021.</unstructured_citation></citation><citation key="ref82"><unstructured_citation>
[82]	A. Aflaki, H. Karimipour, and A. N. Jahromi, "A GAN-based false data injection and civil attack detection framework for digital relays with feature selection," in Proc. IEEE Int. Conf. on Systems, Man, and Cybernetics, pp. 5027-5033, Honolulu, Oahu, HI, USA, 1-4 Oct. 2023.</unstructured_citation></citation><citation key="ref83"><unstructured_citation>
[83]	J. Mo and H. Yang, "Sampled value attack detection for busbar differential protection based on a negative selection immune system," J. of Modern Power Systems and Clean Energy, vol. 11, no. 2, pp. 421-433, Mar. 2022.</unstructured_citation></citation><citation key="ref84"><unstructured_citation>
[84]	M. Hamzeh, B. Vahidi, and A. Foroughi Nematollahi, "Optimizing configuration of cyber network considering graph theory structure and teaching-learning-based optimization (GT-TLBO)," IEEE Trans. on Industrial Informatics, vol. 15, no. 4, pp. 2083-2090, Apr. 2018.</unstructured_citation></citation><citation key="ref85"><unstructured_citation>
[85]	M. Ismail, M. F. Shaaban, M. Naidu and E. Serpedin, "Deep learning detection of electricity theft cyber-attacks in renewable distributed generation," IEEE Trans. on Smart Grid, vol. 11, no. 4, pp. 3428-3437, Jul. 2020.</unstructured_citation></citation><citation key="ref86"><unstructured_citation>
[86]	R. Nuqui, J. Hong, A. Kondabathini, D. Ishchenko, and D. Coats, "A collaborative defense for securing protective relay settings in electrical cyber physical systems," in Proc. Resilience Week, pp. 49-54, Denver, CO, USA, 20-23 Aug. 2018.</unstructured_citation></citation><citation key="ref87"><unstructured_citation>
[87]	M. Chougule, G. Gajjar, and S. A. Soman, "PMU supervised secure backup protection of distance relays," in Proc. IEEE PES Innovative Smart Grid Technologies Europe, 5 pp., Bucharest, Romania, 29 Sept.-2 Oct. 2019.</unstructured_citation></citation><citation key="ref88"><unstructured_citation>
[88]	A. M. Saber, A. Youssef, D. Svetinovic, H. H. Zeineldin, and E. F. El-Saadany, "Cyber-immune line current differential relays," IEEE Trans. on Industrial Informatics, vol. 20, no. 3, pp. 3597-3608, Mar. 2024.</unstructured_citation></citation><citation key="ref89"><unstructured_citation>
[89]	E. Ali, et al., "Power transformer differential protection using current and voltage ratios," Electric Power Systems Research, vol. 154, pp. 140-150, Jan. 2018.</unstructured_citation></citation><citation key="ref90"><unstructured_citation>
[90]	P. Zhao, et al. "Cyber-resilience enhancement and protection for uneconomic power dispatch under cyber-attacks," IEEE Trans. on Power Delivery, vol. 36, no. 4, pp. 2253-2263, Aug. 2020.</unstructured_citation></citation><citation key="ref91"><unstructured_citation>
[91]	D. P. Chinta, et al. "Cyber resilient differential protection scheme for transmission lines," in Proc. 2023 IEEE 3rd. Int. Conf. on Smart Technologies for Power, Energy and Control, 4 pp., Bhubaneswar, India, 10-13 Dec. 2023‏.</unstructured_citation></citation><citation key="ref92"><unstructured_citation>
[92]	S. Shafiulla and M. K. Jena, "Dynamic state estimation based cyber attack detection scheme to supervise distance relay operation 
in transmission line," in Proc. IEEE Int. Conf. on Power Electronics, Smart Grid, and Renewable Energy, 6 pp., Trivandrum, India, 17-20 Dec. 2023.</unstructured_citation></citation><citation key="ref93"><unstructured_citation>
[93]	H. Margossian, R. Kfouri, and R. Saliba, "Measurement protection to prevent cyber-physical attacks against power system state estimation," International J. of Critical Infrastructure Protection, vol. 43, Article ID: 100643, Dec. 2023.</unstructured_citation></citation><citation key="ref94"><unstructured_citation>
[94]	A. Kemmeugne, A. A. Jahromi, and D. Kundur, "Resilience enhancement of pilot protection in power systems," IEEE Trans. on Power Delivery, vol. 37, no. 6, pp. 5255-5266, Dec. 2022.</unstructured_citation></citation><citation key="ref95"><unstructured_citation>
[95]	S. Pola, M. Jovanovic, M. A. Azzouz, and M. Mirhassani, "Cyber resiliency enhancement of overcurrent relays in distribution systems," IEEE Trans. on Smart Grid, vol. 15, no. 4, pp. 4063-4076, Jul. 2023.</unstructured_citation></citation><citation key="ref96"><unstructured_citation>
[96]	Y. Joo, Z. Qu, and T. Namerikawa, "Resilient control of cyber-physical system using nonlinear encoding signal against system integrity attacks," IEEE Trans. on Automatic Control, vol. 66, no. 9, pp. 4334-4341, Sept. 2020.</unstructured_citation></citation><citation key="ref97"><unstructured_citation>
[97]	G. Chen, Y. Zhang, S. Gu and W. Hu, "Resilient state estimation and control of cyber-physical systems against false data injection attacks on both actuator and sensors," IEEE Trans. on Control of Network Systems, vol. 9, no. 1, pp. 500-510, Mar. 2021.</unstructured_citation></citation><citation key="ref98"><unstructured_citation>
[98]	S. Liu, et al., "Adaptive resilient output feedback control against unknown deception attacks for nonlinear cyber-physical systems," IEEE Trans. on Circuits and Systems II: Express Briefs, vol. 71, no. 8, pp. 3855-3859, Aug. 2024.</unstructured_citation></citation><citation key="ref99"><unstructured_citation>
[99]	W. Zhang, S. Mao, J. Huang, L. Kocarev, and Y. Tang, "Data-driven resilient control for linear discrete-time multi-agent networks under unconfined cyber-attacks," IEEE Trans. on Circuits and Systems I: Regular Papers, vol. 68, no. 2, pp. 776-785, Feb. 2020.</unstructured_citation></citation><citation key="ref100"><unstructured_citation>
[100]	S. Hu, X. Chen, J. Li and X. Xie, "Observer-based resilient controller design for networked stochastic systems under coordinated DoS and FDI attacks," IEEE Trans. on Control of Network Systems, vol. 11, no. 2, pp. 890-901, Jun. 2024.</unstructured_citation></citation><citation key="ref101"><unstructured_citation>
[101]	Z. Liu and L. Wang, "A distributionally robust defender-attacker-defender model for resilience enhancement of power systems against malicious cyberattacks," IEEE Trans. on Power Systems, vol. 38, no. 6, pp. 4986-4997, Nov. 2022.</unstructured_citation></citation></citation_list></journal_article></journal></body></doi_batch>