1081. |
1082. |
1083. |
1084. |
1085. SWOT-AHP Analysis of the Importance and Adoption of Pumped-Storage HydropowerMladen Bošnjaković, Veljić Nataša, Jelena Topić, Simon Muhič, 2025, original scientific article Abstract: Abstract
Energy storage technologies are becoming increasingly important when it comes to maintaining the balance between electricity generation and consumption, especially with the increasing share of variable renewable energy sources (VRES). Pumped storage hydropower plants (PSHs) are currently the largest form of energy storage at the grid level. The aim of this study is to investigate the importance and prospects of using PSHs as part of the energy transition to decarbonize energy sources. A comparison was made between PSHs and battery energy storage systems (BESSs) in terms of technical, economic, and ecological aspects. To identify the key factors influencing the wider adoption of PSHs, a combined approach using SWOT analysis (which assesses strengths, weaknesses, opportunities, and threats) and the Analytical Hierarchy Process (AHP) as a decision support tool was applied. Regulatory and market uncertainties (13.54%) and financial inequality (12.77%) rank first and belong to the “Threats” group, with energy storage capacity (10.11%) as the most important factor from the “Strengths” group and increased demand for energy storage (9.01%) as the most important factor from the “Opportunities” group. Forecasts up to 2050 show that the capacity of PSHs must be doubled to enable the integration of 80% of VRES into the grids. The study concludes that PSHs play a key role in the energy transition, especially for long-term energy storage and grid stabilization, while BESSs offer complementary benefits for short-term storage and fast frequency regulation. Recommendations to policymakers include the development of clear, accelerated project approval procedures, financial incentives, and support for hybrid PSH systems to accelerate the energy transition and meet decarbonization targets. Keywords: pumped storage hydropower, renewable energy sources, grid-scale integration Published in DiRROS: 09.09.2025; Views: 311; Downloads: 147
Full text (2,28 MB) This document has many files! More... |
1086. A multi layered encryption framework using intuitionistic fuzzy graphs and graph theoretic domination for secure communication networksAnnamalai Meenakshi, S. Dhanushiya, Leo Mršić, Antonios Kalampakas, Sovan Samanta, 2025, original scientific article Abstract: Secure communication is essential in today’s rapidly evolving digital environment, and strong encryption methods are required to protect private data from unwanted access. The aim of this study is to strengthen the security and complexity of encrypted communications by adopting a new form of cryptographic encryption technique based on the principles of an intuitionistic fuzzy graph. Key graphtheoretic measures, such as domination number, vertex categorization (alpha-strong, beta-strong, and gamma-strong), vertex order coloring, and chromatic number, play important roles in this process. Domination number finds the key vertices of the network, while vertex strength categorization and fuzzy graph coloring provide multiple encryption layers, hence the encoded message is highly resistant to decryption unless a proper key is used. The chromatic number offers further security through various patterns of vertex coloring. The comparative analysis shows the proposed approach to be superior compared to RSA, AES, ECC, and Blowfish due to its increased security, computational efficiency, and resilience to attacks. This framework can be applied to the protection of banking PINs, military access codes, government identification numbers, cryptographic keys, and medical records, so it is an extremely versatile solution for protecting sensitive data. This multi-step approach to encryption through the proposed technique ensures safe transfer and efficient encoding as it establishes a complicated framework. Keywords: Graph network, Vertex order coloring, α−strong vertex, β−strong vertex, γ–strong vertex, Domination number Published in DiRROS: 09.09.2025; Views: 299; Downloads: 144
Full text (9,87 MB) This document has many files! More... |
1087. Enhancing the reliability and accuracy of wireless sensor networks using a deep learning and blockchain approach with DV‑HOP algorithm for DDoS mitigation and node localizationBhupinder Kaur, Deepak Prashar, Leo Mršić, Ahmad Almogren, Ateeq Ur Rehman, Ayman Altameem, Seada Hussen, 2025, original scientific article Abstract: Wireless sensor networks (WSNs) are subject to distributed denial-of-service (DDoS) attacks that impact data dependability, mobility of nodes, and energy drain. The remedy to these challenges in this work is a solution based on deep learning integrated with a blockchain-aided distance-vector hop (DV-HOP) localization algorithm for reliable and secure node localization. Incorporating a blockchain ledger makes the network more trustworthy as it verifies usual and unusual system activities, whereas the DV-HOP algorithm mitigates localization inaccuracies and enhances node placement. The system is evaluated according to different performance measures like localization error, accuracy ratio, average localization error (ALE), probability of location, false positive rate (FPR), false negative rate (FNR), energy utilization, network stability, node failure rate, node recovery rate, and malicious node detection rate. Experimental results reveal improved security, accuracy, and efficiency with 17% FPR and 15% FNR, outperforming the conventional methods. This model enhances WSN performance in different environments via precise data transmission from the source to the destination. The results confirm that integrating deep learning with blockchain and DV-HOP increases network robustness, thus making WSNs more secure against security attacks while reducing energy consumption and localization accuracy. The proposed model presents a strong solution for real-world applications in wireless network environments. Keywords: wireless network devices, DV-HOP algorithm, blockchain ledger, reliable network devices, deep learning Published in DiRROS: 09.09.2025; Views: 309; Downloads: 154
Full text (3,73 MB) This document has many files! More... |
1088. |
1089. A fuzzy hypergraph-based framework for secure encryption and decryption of sensitive messages : application in selecting center location to set up a private hospitalAnnamalai Meenakshi, Obel Mythreyi, Leo Mršić, Antonios Kalampakas, Sovan Samanta, 2025, original scientific article Keywords: encryption, decryption, fuzzy hypergraph, dual fuzzy hypergraph, secure network Published in DiRROS: 09.09.2025; Views: 300; Downloads: 134
Full text (2,55 MB) This document has many files! More... |
1090. |