- Electricity Theft Detection Techniques
- Hydraulic Fracturing and Reservoir Analysis
- Imbalanced Data Classification Techniques
- Drilling and Well Engineering
- Advanced Malware Detection Techniques
- Water Systems and Optimization
- Microgrid Control and Optimization
- Oil and Gas Production Techniques
- Reservoir Engineering and Simulation Methods
- Smart Grid Energy Management
- Network Security and Intrusion Detection
- Electrical Fault Detection and Protection
- Fractional Differential Equations Solutions
- Currency Recognition and Detection
- Vehicle License Plate Recognition
- Non-Destructive Testing Techniques
- Intellectual Property and Patents
- IoT-based Smart Home Systems
- Energy Load and Power Forecasting
- Vehicular Ad Hoc Networks (VANETs)
- Iterative Methods for Nonlinear Equations
- Advanced Control Systems Design
- IoT and GPS-based Vehicle Safety Systems
- Smart Grid Security and Resilience
- Enhanced Oil Recovery Techniques
Sprint (United States)
2023-2024
Jouf University
2024
ITMO University
2024
SPRINT
2023
University of the Punjab
2023
Moscow Institute of Physics and Technology
2021-2022
Islamia University of Bahawalpur
2021
University of Technology Malaysia
2018-2020
Pakistan Atomic Energy Commission
2020
The Federal Polytechnic, Ado-Ekiti
2019
Considering the higher flexibility in tuning process and finer control action of fractional-order proportional integral derivative (FOPID) controller over conventional (PID) controller, this paper explores its application automatic voltage regulator system. FOPID contains five parameters as compared to three PID controller. The additional knobs provide increased precise action, however, their inclusion makes more complex tedious. Thus, intelligence an artificial (AI) technique called jaya...
Due to the lack of inertia and uncertainty in selection optimal Proportional Integral (PI) controller gains, voltage frequency variations are higher islanded mode operation a Microgrid (MG) compared grid-connected mode. This study, as such, develops an control strategy for regulation Photovoltaic (PV) based MG systems operating islanding using Grasshopper Optimization Algorithm (GOA). The intelligence GOA is utilized optimize PI parameters. ensures enhanced dynamic response power quality...
Non-technical losses (NTLs) have been a major concern for power distribution companies (PDCs). Billions of dollars are lost each year due to fraud in billing, metering, and illegal consumer activities. Various studies explored different methodologies efficiently identifying fraudster consumers. This study proposes new approach NTL detection PDCs by using the ensemble bagged tree (EBT) algorithm. The is an many decision trees which considerably improves classification performance individual...
Electricity theft and fraud in energy consumption are two of the major issues for power distribution companies (PDCs) many years. PDCs around world trying different methodologies detecting electricity theft. The traditional methods non-technical losses (NTLs) detection such as onsite inspection reward penalty policy have lost their place modern era because ineffective time-consuming mechanism. With advancement field Artificial Intelligence (AI), newer efficient NTL been proposed by...
Electricity fraud in billing are the primary concerns for Distribution System Operators (DSO). It is estimated that billions of dollars wasted annually due to these illegal activities. DSOs around world, especially underdeveloped countries, still utilize conventional time consuming and inefficient methods Non-Technical Loss (NTL) detection. This research work attempts solve mentioned problem by developing an efficient energy theft detection model order identify fraudster customers a power...
The unpredictable nature of renewable energy sources, such as wind and solar, makes them unreliable sources for the power system. Nevertheless, with advancement in field artificial intelligence (AI), one can predict availability solar short, medium, long term fairly high accuracy. As such, this research work aims to develop a machine-learning-based framework forecasting global horizontal irradiance (GHI) Muscat, Oman. proposed includes data preprocessing stage, where missing entries acquired...
This work introduces a novel approach to modeling the photothermal behavior of semiconducting materials by developing Moore-Gibson-Thompson (MGT) fractional model that incorporates generalized Caputo derivative with tempering parameter. advanced is specifically designed analyze elastic plasmonic wave systems in environments, offering deeper insights into interactions between thermal, mechanical, and electromagnetic fields semiconductors. By including two-parameter tempered-Caputo derivative,...
Smart city adoption and deployment has taken the centre stage worldwide with its realisation clearly hinged on energy efficiency, but planning is threatened by vulnerability of smart grids (SGs). Adversaries launch attacks various motives, rampaging electricity theft menace causing major concerns to SGs deployments consequently, efficiency. meters via advanced metering infrastructure present promising solutions even greater potential as it provides adequate data for analytical inferences...
<span lang="EN-GB">Electricity theft has caused huge losses over the globe and trend of its perpetuation constantly evolve even as smart technologies such meters are being deployed. Although have come under some attacks, they provide sufficient data which can be analysed by an intelligent strategy for effective monitoring detection compromised situations. So many techniques been employed but satisfactory result is yet to obtained a real-time this electrical fraud. This work suggests...
This paper presents a novel data-oriented unsupervised machine learning-based theft detection approach for efficiently identifying the fraudster consumers. It accomplishes above-mentioned objective by exploiting intelligence of robust principal component analysis (ROBPCA) algorithm in conjunction with outlier removal clustering (ORC) algorithm. To avoid irregularities acquired consumers' data from power utility, statistical features are extracted each consumer's consumption patterns using an...
Non-technical Losses mainly Electricity theft has been a main concern for power utilities from last many years. Power are estimated to lose billion dollars annually because of illegal usage electricity by fraudulent consumers. Researchers trying different methods proficiently recognizing fraudster costumers. This research suggests new approach based on C5 algorithm efficiently identifying consumers involved in theft. The C5.0 is modified form the C4.5 algorithm. It also one decision tree...
To lessen the burden on mainstream, simplest means is to use an extreme mix of renewable resources. A grid-interactive electric-driven vehicle fast-charging area boosted by solar power network and a couple lithium chargeable batteries as dynamic stationary energy storage powerhouse valued understudied. The scheme management backed pretending fast station under variant irradiance scenarios taking consideration price traveling waves battery state health. feasibility deploying local with...
Abstract Matrix stimulation is widely used for removing near wellbore damage and optimizing production from a wellbore. Understanding of the reservoir characteristics properties plays key role in success matrix treatment. Embracing challenges posed by heterogeneity formation critical to devising strategy treatments are performed limestone sandstone formations, while hydraulic fracturing employed shale reservoirs. The selection treatment becomes challenge formations containing streaks...
Theft of electricity and fraud in energy consumption billing are the primary concerns for Distribution System Operators . Because those illegal activities, it is believed that billions dollars wasted each year. DSOs around world continue to use conventional time consuming inefficient methods non-technical loss detection, particularly underdeveloped countries This research work attempts solve problems as mentioned above by designing an effective model detecting theft classify fraudster...
Abstract A well "X" was drilled in a carbonate formation from no loss to total situation. Caliper log showed huge thief/vuggy zone the middle part of formation. Based on interpretation, found be very promising. Formation tested and thick crude oil initially offloading surges eventually liquid flow almost ceased. In order conclude true potential formation, acid stimulation become inevitable. But this vastly heterogeneous reservoir challenging critical activity therefore it require proper...
Attacks and intrusions on computer networks often have different characteristics behaviors that require professional help. The number of attacks is growing in line with the development networks. In fact, expert knowledge declining over time should be reviewed made available system, making it necessary to hire an experienced person. Cloud computing advancement IT technologies provide users most up-to-date, highly sought-after virtual services high flexibility, low infrastructure costs,...
Intellectual Property Rights (IPR) results from years of research and wisdom by property owners, it plays an increasingly important role in promoting economic development, technological progress, cultural prosperity. Thus, we need to strengthen the degree protection IPR. However, as internet technology continues open up market for IPR, ease network operation has led infringement IPR some cases. occurred Also, Internet development's concealed rapid nature fact that infringers cannot be easily...
Abstract Loss circulation has been a serious concern for drilling and workover operations, especially in depleting brownfields, leading to huge financial time losses. In addition the loss of expensive drilling/completion fluid, it also causes several other problems including wellbore stability stuck drill strings which themselves require additional resources continuation operations safely. Extensive research performed by engineers since advent modern techniques, however, LCM (loss materials)...
Abstract Liquid blockage is a damage mechanism which occurs due to accumulation of immovable liquid phase near the wellbore area causing impairment relative permeability valuable hydrocarbons leading significant reduction in production. The block may be caused by condensates, water or emulsions formed interaction incompatible fluids. These fluids introduced during drilling operations commingled production through single completion string. This cause complete seizure low pressure gas wells...
The progress and advancement of any country rely significantly on the optimal functioning its financial sector. Much literature is devoted to analysis developing countries regarding impact development economic growth. However, in wake global crisis, issues implications needed be rethought. This study explores growth with respect mortgage crisis using 5 BRICS over period 1990–2019. follows Interactive regression find economy crisis. paper employs both random effects fixed draw conclusions....
Abstract The production revival process through wellbore cleanout is majorly carried out using conventional jetting and rotating tools. tools effective distance few times the diameter of nozzle impact pressure jet stream in fluid reduces significantly beyond several inches. Effectiveness these tool further reduced as they enter larger sized tubing, casing/open hole or due to standoff are hence not for hard scales like barium sulphate. operations become more challenging depleted fields...