The impetus for this paper is the development of Fuzzy Basis Function “FBF” that assigns in an optimal fashion, a function approximation for a nonlinear dynamic system. A fuzzy basis function is applied to find the best location of the characteristic points by specifying the set of fuzzy rules. The advantage of this technique is that, it may produce a simple and well-performing system because it selects the most significant fuzzy basis functions to minimize an objective function in the output error for the fuzzy rules. The fuzzy basis function is a linguistic fuzzy IF_THEN rule. It provides a combination of the numerical information and the linguistic information in the form input-output pairs and in the form of fuzzy rules. The proposed control scheme is applied to a magnetic ball suspension system.
Although fuzzy systems demonstrate their ability to
solve different kinds of problems in various applications, there is an increasing interest on developing solid mathematical implementations suitable for control applications such as that used in fuzzy logic controllers (FLC). It is well known that, wide range of parameters is needed to be specified before the construction of a fuzzy system. To simplify in a systematic way the design and construction of a general fuzzy system, and without loss for generality a full parameterization process for a singleton type FLC is proposed in this paper. The resented methodology is very helpful in developing a universal computing algorithm for a standard fuzzy like PID controllers. An illustrative example shows the simplicity of applying the new paradigm.
Research Inventy : International Journal of Engineering and Scienceinventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
Improvement in Traditional Set Partitioning in Hierarchical Trees (SPIHT) Alg...AM Publications
In this paper, an improved SPIHT algorithm based on Huffman coding and discrete wavelet transform for
image compression has been developed. The traditional SPIHT algorithm application is limited in terms of PSNR and
Compression Ratio. The improved SPIHT algorithm gives better performance as compared with traditional SPIHT
algorithm; here we used additional Huffman encoder along with SPIHT encoder. Huffman coding is an entropy
encoding algorithm uses a specific method for choosing the representation for each symbol, resulting in a prefix code.
The input gray scale image is decomposed by 'bior4.4' wavelet and wavelet coefficients are indexed and scanned by
DWT, then applied to encode the coefficient by SPIHT encoder followed by Huffman encoder which gives the
compressed image. At receiver side the decoding process is applied by Huffman decoder followed by SPIHT decoder.
The Reconstructed gray scale image looks similar to the applied gray scale image.
Although fuzzy systems demonstrate their ability to
solve different kinds of problems in various applications, there is an increasing interest on developing solid mathematical implementations suitable for control applications such as that used in fuzzy logic controllers (FLC). It is well known that, wide range of parameters is needed to be specified before the construction of a fuzzy system. To simplify in a systematic way the design and construction of a general fuzzy system, and without loss for generality a full parameterization process for a singleton type FLC is proposed in this paper. The resented methodology is very helpful in developing a universal computing algorithm for a standard fuzzy like PID controllers. An illustrative example shows the simplicity of applying the new paradigm.
Research Inventy : International Journal of Engineering and Scienceinventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
Improvement in Traditional Set Partitioning in Hierarchical Trees (SPIHT) Alg...AM Publications
In this paper, an improved SPIHT algorithm based on Huffman coding and discrete wavelet transform for
image compression has been developed. The traditional SPIHT algorithm application is limited in terms of PSNR and
Compression Ratio. The improved SPIHT algorithm gives better performance as compared with traditional SPIHT
algorithm; here we used additional Huffman encoder along with SPIHT encoder. Huffman coding is an entropy
encoding algorithm uses a specific method for choosing the representation for each symbol, resulting in a prefix code.
The input gray scale image is decomposed by 'bior4.4' wavelet and wavelet coefficients are indexed and scanned by
DWT, then applied to encode the coefficient by SPIHT encoder followed by Huffman encoder which gives the
compressed image. At receiver side the decoding process is applied by Huffman decoder followed by SPIHT decoder.
The Reconstructed gray scale image looks similar to the applied gray scale image.
In the VLSI physical design, Floorplanning is the very crucial step as it optimizes the chip. The goal of
floorplanning is to find a floorplan such that no module overlaps with other, optimize the interconnection between
the modules, optimize the area of the floorplan and minimize the dead space. In this Paper, Simulated Annealing (SA)
algorithm has been employed to shrink dead space to optimize area and interconnect of VLSI floorplanning problem.
Sequence pair representation is employed to perturb the solution. The outcomes received after the application of SA
on different benchmark files are compared with the outcomes of different algorithms on same benchmark files and
the comparison suggests that the SA gives the better result. SA is effective and promising in VLSI floorplan design.
Matlab simulation results show that our approach can give better results and satisfy the fixed-outline and nonoverlapping
constraints while optimizing circuit performance.
Improving Performance of Back propagation Learning Algorithmijsrd.com
The standard back-propagation algorithm is one of the most widely used algorithm for training feed-forward neural networks. One major drawback of this algorithm is it might fall into local minima and slow convergence rate. Natural gradient descent is principal method for solving nonlinear function is presented and is combined with the modified back-propagation algorithm yielding a new fast training multilayer algorithm. This paper describes new approach to natural gradient learning in which the number of parameters necessary is much smaller than the natural gradient algorithm. This new method exploits the algebraic structure of the parameter space to reduce the space and time complexity of algorithm and improve its performance.
Resourceful fast dht algorithm for vlsi implementation by split radix algorithmeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
The Positive Effects of Fuzzy C-Means Clustering on Supervised Learning Class...Waqas Tariq
Selection of inputs is one of the most substantial components of classification algorithms for data mining and pattern recognition problems since even the best classifier will perform badly if the inputs are not selected very well. Big data and computational complexity are main cause of bad performance and low accuracy for classical classifiers. In other words, the complexity of classifier method is inversely proportional with its classification efficiency. For this purpose, two hybrid classifiers have been developed by using both type-1 and type-2 fuzzy c-means clustering with cascaded a classifier. In this proposed classifier, a large number of data points are reduced by using fuzzy c-means clustering before applied to a classifier algorithm as inputs. The aim of this study is to investigate the effect of fuzzy clustering on well-known and useful classifiers such as artificial neural networks (ANN) and support vector machines (SVM). Then the role of positive effects of these proposed algorithms were investigated on applied different data sets.
Bidirectional Bubble Sort Approach to Improving the Performance of Introsort ...Waqas Tariq
Quicksort has been described as the best practical choice for sorting. It is faster than many algorithms for sorting on most inputs and remarkably efficient on the average. However, it is not efficient in the worst case scenarios as it takes O(n2). Research efforts have been made to enhance this algorithm for the worst case scenarios by improving the way the algorithm chooses its pivot element for partitioning, but these approaches have the disadvantage of increasing the algorithm’s average computing time. Introsort was, however, developed to overcome this limitation. This paper presents an approach that uses Bidirectional Bubble Sort to improve the performance of Introsort. Instead of using Insertion Sort as the last step of the sorting algorithm for small lists, the approach uses Bidirectional Bubble Sort. The results of the implementation and experimentation of this algorithm compared with Introsort shows its better performance in the worst case scenario as the size of the list increases.
Application of normalized cross correlation to image registrationeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Infrastructure of services for a smart cityIJCNCJournal
Sustainability, appropriate use of natural resources and providing a better quality of life for citizens has become a prerequisite to change the traditional concept of a smart city. A smart city needs to use latest generation Information Technologies, IT, and hardware to improve services and data, to offer to create a balanced environment between the ecosystem and inhabitants. This paper analyses the advantages of using a private cloud architecture to share hardware and software resources when it is required. Our case study is Guadalajara, which has nine municipalities and each one monitor’s air quality. Each municipality has a set of servers to process information independently and consists of information systems for the transmission and storage of data with other municipalities. We analysed the behaviour of the carbon footprint during the years1999-2013 and we observed a pattern in each season. Thus our proposal requires municipalities to use a cloud-based solution that allows managing and consolidating infrastructure to minimize maintenance costs and electricity consumption to reduce carbon footprint generated by the city.
A Mobile Ad-Hoc Network (MANET) is a self configuring, infrastructure less network of mobile devices
connected by wireless links. Loopholes like wireless medium, lack of a fixed infrastructure, dynamic
topology, rapid deployment practices, and the hostile environments in which they may be deployed, make
MANET vulnerable to a wide range of security attacks and Wormhole attack is one of them. During this
attack a malicious node captures packets from one location in the network, and tunnels them to another
colluding malicious node at a distant point, which replays them locally. This paper presents a cluster based
Wormhole attack avoidance technique. The concept of hierarchical clustering with a novel hierarchical 32-
bit node addressing scheme is used for avoiding the attacking path during the route discovery phase of the
DSR protocol, which is considered as the under lying routing protocol. Pinpointing the location of the
wormhole nodes in the case of exposed attack is also given by using this method.
Packet delivery ratio, delay, throughput, routing overhead etc are the strict quality of service requirements
for applications in Ad hoc networks. So, the routing protocol not only finds a suitable path but also the path
should satisfy the QoS constraints also. Quality of services (QoS) aware routing is performed on the basis
of resource availability in the network and the flow of QoS requirement. In this paper we developed a
source routing protocol which satisfying the link bandwidth and end –to- end delay factor. Our protocol
will find multiple paths between the source and the destination, out of those one will be selected for data
transfer and others are reserve at the source node those can be used for route maintenance purpose. The
path selection is strictly based on the bandwidth and end-to-end delay in case two or more then two paths
are having the same values for QoS constraints then we will use hop as a parameter for path selection.
Managing, searching, and accessing iot devicesIJCNCJournal
In this paper a new method is proposed for management of REST-based services acting as proxies for Internet-of-Things devices. The method is based on a novel way of monitoring REST resources by hierarchical set of directories, with the possibility of smart searching for “the best” device according to atthe- place devices’ availability and functionality, overall context (including geo-location), and personal preferences. The system is resistant to changes of network addresses of the devices and their services, as well as core system points such as directories. Thus, we successfully deal with the problem of
(dis)connectivity and mobility of network nodes, and the problem of a “newcomer” device trying to connect
to the network at an incidental place/time.
Main novelty of the approach is a summary of three basic achievements. Firstly, the system introduces
unifying tools for efficient monitoring. On one hand, we may control an availability and load (statistics) of
devices/services. On the other hand, we are able to search for “the best” device/service with different criteria, also formulated ad-hoc and personalized. Secondly, the system is resistant to sudden changes of network topology and connections (basically IP addressing), and frequent disconnections of any system element, including core nodes such as central directories. As a result, we may have a common view to the whole system at any time/place and with respect to its current state, even if the elements of the system are distributed across a wider area. Thirdly, any element of the system, from simple devices to global directories, is able to self-adjust to evolving parameters of the environment (including other devices as a part of this environment). In particular, it is possible for a mobile “newcomer” device to interact with the system at any place and time without a need for prior installation, re-programming, determination of
actual parameters, etc. The presented approach is a coherent all-in-one solution to basic problems related
with efficient usage of IoT devices and services, well suited to the hardware- and software-restricted world
of Internet of Things and Services. Fully implemented, the system is now being applied for an “intelligent”
home and workplace with user-centric e-comfort management.
In the VLSI physical design, Floorplanning is the very crucial step as it optimizes the chip. The goal of
floorplanning is to find a floorplan such that no module overlaps with other, optimize the interconnection between
the modules, optimize the area of the floorplan and minimize the dead space. In this Paper, Simulated Annealing (SA)
algorithm has been employed to shrink dead space to optimize area and interconnect of VLSI floorplanning problem.
Sequence pair representation is employed to perturb the solution. The outcomes received after the application of SA
on different benchmark files are compared with the outcomes of different algorithms on same benchmark files and
the comparison suggests that the SA gives the better result. SA is effective and promising in VLSI floorplan design.
Matlab simulation results show that our approach can give better results and satisfy the fixed-outline and nonoverlapping
constraints while optimizing circuit performance.
Improving Performance of Back propagation Learning Algorithmijsrd.com
The standard back-propagation algorithm is one of the most widely used algorithm for training feed-forward neural networks. One major drawback of this algorithm is it might fall into local minima and slow convergence rate. Natural gradient descent is principal method for solving nonlinear function is presented and is combined with the modified back-propagation algorithm yielding a new fast training multilayer algorithm. This paper describes new approach to natural gradient learning in which the number of parameters necessary is much smaller than the natural gradient algorithm. This new method exploits the algebraic structure of the parameter space to reduce the space and time complexity of algorithm and improve its performance.
Resourceful fast dht algorithm for vlsi implementation by split radix algorithmeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
The Positive Effects of Fuzzy C-Means Clustering on Supervised Learning Class...Waqas Tariq
Selection of inputs is one of the most substantial components of classification algorithms for data mining and pattern recognition problems since even the best classifier will perform badly if the inputs are not selected very well. Big data and computational complexity are main cause of bad performance and low accuracy for classical classifiers. In other words, the complexity of classifier method is inversely proportional with its classification efficiency. For this purpose, two hybrid classifiers have been developed by using both type-1 and type-2 fuzzy c-means clustering with cascaded a classifier. In this proposed classifier, a large number of data points are reduced by using fuzzy c-means clustering before applied to a classifier algorithm as inputs. The aim of this study is to investigate the effect of fuzzy clustering on well-known and useful classifiers such as artificial neural networks (ANN) and support vector machines (SVM). Then the role of positive effects of these proposed algorithms were investigated on applied different data sets.
Bidirectional Bubble Sort Approach to Improving the Performance of Introsort ...Waqas Tariq
Quicksort has been described as the best practical choice for sorting. It is faster than many algorithms for sorting on most inputs and remarkably efficient on the average. However, it is not efficient in the worst case scenarios as it takes O(n2). Research efforts have been made to enhance this algorithm for the worst case scenarios by improving the way the algorithm chooses its pivot element for partitioning, but these approaches have the disadvantage of increasing the algorithm’s average computing time. Introsort was, however, developed to overcome this limitation. This paper presents an approach that uses Bidirectional Bubble Sort to improve the performance of Introsort. Instead of using Insertion Sort as the last step of the sorting algorithm for small lists, the approach uses Bidirectional Bubble Sort. The results of the implementation and experimentation of this algorithm compared with Introsort shows its better performance in the worst case scenario as the size of the list increases.
Application of normalized cross correlation to image registrationeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Infrastructure of services for a smart cityIJCNCJournal
Sustainability, appropriate use of natural resources and providing a better quality of life for citizens has become a prerequisite to change the traditional concept of a smart city. A smart city needs to use latest generation Information Technologies, IT, and hardware to improve services and data, to offer to create a balanced environment between the ecosystem and inhabitants. This paper analyses the advantages of using a private cloud architecture to share hardware and software resources when it is required. Our case study is Guadalajara, which has nine municipalities and each one monitor’s air quality. Each municipality has a set of servers to process information independently and consists of information systems for the transmission and storage of data with other municipalities. We analysed the behaviour of the carbon footprint during the years1999-2013 and we observed a pattern in each season. Thus our proposal requires municipalities to use a cloud-based solution that allows managing and consolidating infrastructure to minimize maintenance costs and electricity consumption to reduce carbon footprint generated by the city.
A Mobile Ad-Hoc Network (MANET) is a self configuring, infrastructure less network of mobile devices
connected by wireless links. Loopholes like wireless medium, lack of a fixed infrastructure, dynamic
topology, rapid deployment practices, and the hostile environments in which they may be deployed, make
MANET vulnerable to a wide range of security attacks and Wormhole attack is one of them. During this
attack a malicious node captures packets from one location in the network, and tunnels them to another
colluding malicious node at a distant point, which replays them locally. This paper presents a cluster based
Wormhole attack avoidance technique. The concept of hierarchical clustering with a novel hierarchical 32-
bit node addressing scheme is used for avoiding the attacking path during the route discovery phase of the
DSR protocol, which is considered as the under lying routing protocol. Pinpointing the location of the
wormhole nodes in the case of exposed attack is also given by using this method.
Packet delivery ratio, delay, throughput, routing overhead etc are the strict quality of service requirements
for applications in Ad hoc networks. So, the routing protocol not only finds a suitable path but also the path
should satisfy the QoS constraints also. Quality of services (QoS) aware routing is performed on the basis
of resource availability in the network and the flow of QoS requirement. In this paper we developed a
source routing protocol which satisfying the link bandwidth and end –to- end delay factor. Our protocol
will find multiple paths between the source and the destination, out of those one will be selected for data
transfer and others are reserve at the source node those can be used for route maintenance purpose. The
path selection is strictly based on the bandwidth and end-to-end delay in case two or more then two paths
are having the same values for QoS constraints then we will use hop as a parameter for path selection.
Managing, searching, and accessing iot devicesIJCNCJournal
In this paper a new method is proposed for management of REST-based services acting as proxies for Internet-of-Things devices. The method is based on a novel way of monitoring REST resources by hierarchical set of directories, with the possibility of smart searching for “the best” device according to atthe- place devices’ availability and functionality, overall context (including geo-location), and personal preferences. The system is resistant to changes of network addresses of the devices and their services, as well as core system points such as directories. Thus, we successfully deal with the problem of
(dis)connectivity and mobility of network nodes, and the problem of a “newcomer” device trying to connect
to the network at an incidental place/time.
Main novelty of the approach is a summary of three basic achievements. Firstly, the system introduces
unifying tools for efficient monitoring. On one hand, we may control an availability and load (statistics) of
devices/services. On the other hand, we are able to search for “the best” device/service with different criteria, also formulated ad-hoc and personalized. Secondly, the system is resistant to sudden changes of network topology and connections (basically IP addressing), and frequent disconnections of any system element, including core nodes such as central directories. As a result, we may have a common view to the whole system at any time/place and with respect to its current state, even if the elements of the system are distributed across a wider area. Thirdly, any element of the system, from simple devices to global directories, is able to self-adjust to evolving parameters of the environment (including other devices as a part of this environment). In particular, it is possible for a mobile “newcomer” device to interact with the system at any place and time without a need for prior installation, re-programming, determination of
actual parameters, etc. The presented approach is a coherent all-in-one solution to basic problems related
with efficient usage of IoT devices and services, well suited to the hardware- and software-restricted world
of Internet of Things and Services. Fully implemented, the system is now being applied for an “intelligent”
home and workplace with user-centric e-comfort management.
COST-EFFICIENT RESIDENTIAL ENERGY MANAGEMENT SCHEME FOR INFORMATION-CENTRIC N...IJCNCJournal
Home network (HOMENET) performs multiple important functions such as energy management,
multimedia sharing, lighting and climate control in smart grid (SG). In HOMENET there are numerous
challenges among which mobility and security are the basic requirements that need to be addressed with
priority. The information-centric networking (ICN) is regarded as the future Internet that subscribes data
in a content-centric manner irrespective of its location. Furthermore, it has pecial merit in mobility and
security since ICN supports in-network caching and self-contained security, these make ICN a potential
solution for home communication fabric. This paper aims to apply the ICN approach on HOMENET
system, which we called ICN-HOMENET. Then, a proof-of-concept evaluation is employed to evaluate the
effectiveness of the proposed ICN-HOMENET approach in data security, device mobility and efficient
content distribution for developing HOMENET system in SG. In addition, we proposed a cost-efficient
residential energy management (REM) scheme called ICN-REM scheme for ICN-HOMENET system which
encourages consumers to shift the start time of appliances from peak hours to off-peak hours to reduce the
energy bills. To the best of our knowledge, this is the first attempt to propose an ICN-based REM scheme
for HOMENET system. In this proposal, we not only consider the conflicting requests from appliances and
domestic power generation, but also think the energy management unit (EMU) should cooperate with
measurement sensors to control some specific appliances in some specific conditions. Moreover, the
corresponding performance evaluation validates its correctness and effectiveness.
Adhoc mobile wireless network enhancement based on cisco devicesIJCNCJournal
Adhoc wireless networks become one of the most researchable areas in the studying of routing protocols depending on the Open System Interconnection (OSI Model). This paper use Cisco devices as a reference to enhance the performance of the network. This enhancement will be due to high processing, reliability, average cost, power consumption and accessibility. The aim of this research not only to get the cost down, it also to choose a time to time device to process the data as rapid as it can. Using NAT, Access List and DHCP protocols defined in Cisco (Graphical Unit Interface) GUI of the (Command Line Interface) CLI, the task can be made.
Distributed firewalls and ids interoperability checking based on a formal app...IJCNCJournal
To supervise and guarantee a network security, the administrator uses different security components, such
as firewalls, IDS and IPS. For a perfect interoperability between these components, they must be
configured properly to avoid misconfiguration between them. Nevertheless, the existence of a set of
anomalies between filtering rules and alerting rules, particularly in distributed multi-component
architectures is very likely to degrade the network security. The main objective of this paper is to check if a
set of security components are interoperable. A case study using a firewall and an IDS as examples will
illustrate the usefulness of our approach.
A novel secure e contents system for multi-media interchange workflows in e-l...IJCNCJournal
The goal of e-learning is to benefit from the capabilities offered by new information technology (such as
remote digital communications, multimedia, internet, cell phones, teleconferences, etc.) and to enhance the
security of several government organizations so as to take into considerations almost all the contents of elearning
such as: information content, covering most of citizens or state firms or corporations queries.
Content provides a service to provide most if not all basic and business services; content of communicative
link provides the citizen and the state agencies together all the time and provides content security for all
workers on this network to work in securely environment. Access to information as well is safeguarded. The
main objective of this research is to build a novel multi-media security system (encrypting / decrypting
system) that will enable E-learning to exchange more secured multi-media data/information.
Performance comparison of coded and uncoded ieee 802.16 d systems under stanf...IJCNCJournal
Worldwide Interoperability for Microwave Access (WiMax), standardized asIEEE 802.16d is a popular
technology for broadband wireless communication system. Orthogonal Frequency Division Multiplexing
(OFDM) is the core of this technology.OFDMreduces Inter-symbol Interference (ISI) and hence improves
system performance (i.e., Bit Error Rate (BER)). To improve system performance further error correction
coding schemes have been included in WiMax. It is widely accepted thata coded system outperforms an
uncodedsystem. But, the performance improvement of a coded system depends on the channel conditions. In
this paper, we investigated and compared the performances of a coded and an uncoded WiMaxsystem
under a practical channel model called Stanford University Interim (SUI). Different modulation schemes
namely BPSK, QPSK, 16-QAM, and 64-QAM have been considered in this work. It is shown that the
selection of codedoruncoded WiMaxsystem should depend on the channel condition as well as on the
modulation used. It is also shown that anuncoded system outperforms a coded system under some channel
conditions.
Regressive admission control enabled by real time qos measurementsIJCNCJournal
We propose a novel regressive principle to Admission Control (AC) assisted by real-time passive QoS
monitoring. This measurement-based AC scheme acceptsflows by default, but based on the changes in the
network QoS, it makes regressive decisions on the possible flow rejection, thus bringing cognition to the
network path. TheREgressive Admission Control (REAC) system consists of three modules performing the
necessary tasks:QoS measurements, traffic identification, and the actual AC decision making and flow
control. There are two major advantages with this new scheme; (i) significant optimization of the
connection start-up phase, and (ii) continuous QoS knowledge of the accepted streams. In fact, the latter
combined with the REAC decisions can enable guaranteed QoS without requiring any QoS support from
the network. REAC was tested on a video streaming test bed and proved to have a timely and realistic
match between the network's QoS and the video quality.
Energy efficient clustering in heterogeneousIJCNCJournal
Cluster head election is a key technique used to reduce energy consumption and enhancing the throughput
of wireless sensor networks. In this paper, a new energy efficient clustering (E2C) protocol for
heterogeneous wireless sensor networks is proposed. Cluster head is elected based on the predicted
residual energy of sensors, optimal probability of a sensor to become a cluster head, and its degree of
connectivity as the parameters. The probability threshold to compete for the role of cluster head is derived.
The probability threshold has been extended for multi-levels energy heterogeneity in the network. The
proposed E2C protocol is simulated in MATLAB. Results obtained in the simulationshowthat performance
of the proposed E2Cprotocol is betterthan stable election protocol (SEP), and distributed energy efficient
clustering (DEEC) protocol in terms of energy consumption, throughput, and network lifetime.
Concepts and evolution of research in the field of wireless sensor networksIJCNCJournal
The field of Wireless Sensor Networks (WSNs) is experiencing a resurgence of interest and a continuous evolution in the scientific and industrial community. The use of this particular type of ad hoc network is becoming increasingly important in many contexts, regardless of geographical position and so, according to a set of possible application. WSNs offer interesting low cost and easily deployable solutions to perform a remote real time monitoring, target tracking and recognition of physical phenomenon. The uses of these sensors organized into a network continue to reveal a set of research questions according to particularities target applications. Despite difficulties introduced by sensor resources constraints, research contributions in this field are growing day by day. In this paper, we present a comprehensive review of most recent literature of WSNs and outline open research issues in this field.
To accommodate real-time multimedia applications that achieve Quality of Service (QOS) requirements in
a wireless ad-hoc network, a QOS control mechanisms is needed. Correspondence over such networks
must consider other aspects in regard to network properties; that the time it takes to send a message and
reach its destination faces different variables from one message to the other in a short time. Therefore, the
equation of calculating the time required to resend the message must be able to contain the worst case and
acknowledges different features for the network. The objective of this paper is to improve retransmission
time calculation adaptability when occurring using Transmission Control Protocol (TCP) over wireless Ad
hoc networks. Hence, it aims to obtain more accurate time to ensure retransmission time occurring in
accordance to the network environment variables efficiently.
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANETIJCNCJournal
MANET is a cooperative wireless network in which mobile nodes are responsible for routing and
forwarding packets from and to other nodes. Noncooperation is a challenge that definitely degrades the
performance of MANET. A misbehaving or selfish node may make use of other nodes in the network, but
decline to share its own resources with them. These selfish nodes may severely affect the performance of
routing protocols in MANET.
In this paper, we compare the performance of four routing protocols under security attack of node
misbehavior in MANET. We investigate AODV and DSR reactive routing protocols and OLSR and GRP
proactive routing protocols using Riverbed Modeler simulator. The performance comparison is carried out
using two types of misbehaving nodes. The metrics used are End-to-End delay, Packet Delivery Ratio, Data
dropped and the Load. The experimental results show that AODV routing protocol performs better than the
other routing protocols with higher packet delivery ratio. Further, OLSR routing protocol outperforms the
other routing protocols with minimum End-to-End delay.
Evaluation of scalability and bandwidthIJCNCJournal
Multi-Point to Multi-Point Traffic Engineering (MP2MP-TE) leads to an important scalability in Multi
Protocol Label Switching-Traffic Engineering (MPLS-TE) networks. This paper emphasizes on the support
of Fast-reroute (FRR) in MPLS-TE networks by using MP2MP bypass TE-tunnels. Hence, one MP2MP
bypass TE-tunnel can be used to protect several primary TE-tunnels. During failure, the primary TE-tunnel
is encapsulated into the MP2MP bypass TE-tunnel which calls for defining a new type of MPLS hierarchy,
i.e. the multipoint to multipoint hierarchy. In this paper we present a simulation study that evaluates
several fast rerouting scenarios depending on the number of leaves of a MP2MP bypass TE-tunnel and on
the number of primary TE-tunnels that can be encapsulated into one MP2MP bypass TE-tunnel. In
particular, the scalability/bandwidth efficiency tradeoff between these schemes is analyzed and valuable
comparisons with the existing approaches are presented.
A method of evaluating effect of qo s degradation on multidimensional qoe of ...IJCNCJournal
This paper studies a method of investigating effect of IP performance (QoS) degradation on quality of experience (QoE) for a Web service; it considers the usability based on the ISO 9241-11 as multidimensional QoE of a Web service (QoE-Web) and the QoS parameters standardized by the IETF. Moreover, the paper tackles clarification of the relationship between ISO-based QoE-Web and IETF-based QoS by the multiple regression analysis. The experiment is intended for the two actual Japanese online shopping services and utilizes 35 subjects. From the results, the paper quantitatively discusses how the QoE-Web deteriorates owing to the QoS degradation and shows that it is appropriate to evaluate the proposed method
In the last decade Peer to Peer technology has been thoroughly explored, becauseit overcomes many limitations compared to the traditional client server paradigm. Despite its advantages over a traditional approach, the ubiquitous availability of high speed, high bandwidth and low latency networks has supported the traditional client-server paradigm. Recently, however, the surge of streaming services has spawned renewed interest in Peer to Peer technologies. In addition, services like geolocation databases and browser technologies like Web-RTC make a hybrid approach attractive.
In this paper we present algorithms for the construction and the maintenance of a hybrid P2P overlay multicast tree based on topological distances. The essential idea of these algorithms is to build a multicast tree by choosing neighbours close to each other. The topological distances can be easily obtained by the browser using the geolocation API. Thus the implementation of algorithms can be done web-based in a distributed manner.
We present proofs of our algorithms as well as experimental results and evaluations.
Priority scheduling for multipath video transmission in wmsnsIJCNCJournal
In video data transmission over Wireless Multimedia Sensor Networks (WMSNs), in which network
congestion and link failures are main characteristics, providing Quality-of-Service (QoS) is challenging. In
such situation, using multipath routing protocols along with efficient packet scheduling can improve the
performance of video delivery over sensor networks. In this paper we propose a new packet scheduling
mechanism for multipath video transmission over WMSN. Since, different video frame types in a
compressed video stream have different impact on the perceived video at the receiver; our proposed
scheme for video packet scheduling is content aware that schedules transmission of different video packets
over different paths. For this purpose, condition of each routing path is periodically evaluated and the high
priority video packets are transmitted through high quality paths. Simulation results show that our
proposed scheduling improves the quality of the perceived video at the receiver, considerably.
A Mixed Binary-Real NSGA II Algorithm Ensuring Both Accuracy and Interpretabi...IJECEIAES
In this work, a Neuro-Fuzzy Controller network, called NFC that implements a Mamdani fuzzy inference system is proposed. This network includes neurons able to perform fundamental fuzzy operations. Connections between neurons are weighted through binary and real weights. Then a mixed binaryreal Non dominated Sorting Genetic Algorithm II (NSGA II) is used to perform both accuracy and interpretability of the NFC by minimizing two objective functions; one objective relates to the number of rules, for compactness, while the second is the mean square error, for accuracy. In order to preserve interpretability of fuzzy rules during the optimization process, some constraints are imposed. The approach is tested on two control examples: a single input single output (SISO) system and a multivariable (MIMO) system.
An optimal general type-2 fuzzy controller for Urban Traffic NetworkISA Interchange
Urban traffic network model is illustrated by state-charts and object-diagram. However, they have limitations to show the behavioral perspective of the traffic information flow. Consequently, a state space model is used to calculate the half-value waiting time of vehicles. In this study, a combination of the general type-2 fuzzy logic sets and the modified backtracking search algorithm (MBSA) techniques are used in order to control the traffic signal scheduling and phase succession so as to guarantee a smooth flow of traffic with the least wait times and average queue length. The parameters of input and output membership functions are optimized simultaneously by the novel heuristic algorithm MBSA. A comparison is made between the achieved results with those of optimal and conventional type-1 fuzzy logic controllers.
Intercept probability analysis in DF time switching full-duplex relaying netw...TELKOMNIKA JOURNAL
In this research, we propose and investigate intercept probability analysis in DF time switching relaying full-duplex with impact of Co-channel interference at the eavesdropper. In the beginning stage, we present the DF time switching relaying full-duplex with the Impact of Co-channel interference at the eavesdropper. Furthermore, the closed-form expression of the intercept probability (IP) is analyzed and derived in connection with the primary system parameters. Finally, the Monte Carlo simulation is performed for verifying the correctness of the analytical section. From the research results, a novel solution and some recommendations can be proposed for the communication network in the near future.
A hybrid bacterial foraging and modified particle swarm optimization for mode...IJECEIAES
This paper study the model reduction procedures used for the reduction of large-scale dynamic models into a smaller one through some sort of differential and algebraic equations. A confirmed relevance between these two models exists, and it shows same characteristics under study. These reduction procedures are generally utilized for mitigating computational complexity, facilitating system analysis, and thence reducing time and costs. This paper comes out with a study showing the impact of the consolidation between the Bacterial-Foraging (BF) and Modified particle swarm optimization (MPSO) for the reduced order model (ROM). The proposed hybrid algorithm (BF-MPSO) is comprehensively compared with the BF and MPSO algorithms; a comparison is also made with selected existing techniques.
Design of optimized Interval Arithmetic MultiplierVLSICS Design
Many DSP and Control applications that require the user to know how various numerical errors(uncertainty) affect the result. This uncertainty is eliminated by replacing non-interval values with intervals. Since most DSPs operate in real time environments, fast processors are required to implement interval arithmetic. The goal is to develop a platform in which Interval Arithmetic operations are performed at the same computational speed as present day signal processors. So we have proposed the design and implementation of Interval Arithmetic multiplier, which operates with IEEE 754 numbers. The proposed unit consists of a floating point CSD multiplier, Interval operation selector. This architecture implements an algorithm which is faster than conventional algorithm of Interval multiplier . The cost overhead of the proposed unit is 30% with respect to a conventional floating point multiplier. The
performance of proposed architecture is better than that of a conventional CSD floating-point multiplier, as it can perform both interval multiplication and floating-point multiplication as well as Interval comparisons
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Investigations on Hybrid Learning in ANFISIJERA Editor
Neural networks have attractiveness to several researchers due to their great closeness to the structure of the brain, their characteristics not shared by many traditional systems. An Artificial Neural Network (ANN) is a network of interconnected artificial processing elements (called neurons) that co-operate with one another in order to solve specific issues. ANNs are inspired by the structure and functional aspects of biological nervous systems. Neural networks, which recognize patterns and adopt themselves to cope with changing environments. Fuzzy inference system incorporates human knowledge and performs inferencing and decision making. The integration of these two complementary approaches together with certain derivative free optimization techniques, results in a novel discipline called Neuro Fuzzy. In Neuro fuzzy development a specific approach is called Adaptive Neuro Fuzzy Inference System (ANFIS), which has shown significant results in modeling nonlinear functions. The basic idea behind the paper is to design a system that uses a fuzzy system to represent knowledge in an interpretable manner and have the learning ability derived from a Runge-Kutta learning method (RKLM) to adjust its membership functions and parameters in order to enhance the system performance. The problem of finding appropriate membership functions and fuzzy rules is often a tiring process of trial and error. It requires users to understand the data before training, which is usually difficult to achieve when the database is relatively large. To overcome these problems, a hybrid of Back Propagation Neural network (BPN) and RKLM can combine the advantages of two systems and avoid their disadvantages.
Design of Processing Element (PE3) for Implementing Pipeline FFT Processor ijcisjournal
Multiplexing is a method by which multiple analog message signals or digital data streams are combined
into one signal over a shared medium. In communication, different multiplexing schemes are used. To
achieve higher data rates, Orthogonal Frequency Division Multiplexing (OFDM) is used due to its high
spectral efficiency. OFDM became a serious alternative for modern digital signal processing methods
based on the Fast Fourier Transform (FFT).The problems with Orthogonal subcarriers can be addressed
with FFT in communication applications. An 8-bit processing element (PE3), used in the execution of a
pipeline FFT processoris designed and presented in this paper. Simulations are carried out using Mentor
Graphics tools in 130nm technology.
Geoid height determination is one of the major problems of geodesy because usage of satellite
techniques in geodesy isgetting increasing. Geoid heights can be determined using different methods according
to the available data. Soft computing methods such as Fuzzy logic and neural networks became so popular that
they are used to solve many engineering problems. Fuzzy logic theory and later developments in uncertainty
assessment have enabled us to develop more precise models for our requirements. In this study, How to
construct the best fuzzy model is examined. For this purpose, three different data sets were taken and two
different kinds (two inpust one output and three inputs one output) fuzzy model were formed for the calculation
of geoid heights in Istanbul (Turkey). The Fuzzy models results of these were compared with geoid heights
obtained by GPS/levelling methods. The fuzzy approximation models were tested on the test points.
IMPROVEMENT OF LTE DOWNLINK SYSTEM PERFORMANCES USING THE LAGRANGE POLYNOMIAL...IJCNCJournal
To achieve a high speed data rate, higher spectral efficiency, improved services and low latency the 3rd
generation partnership project designed LTE standard (Long Term Evolution).the LTE system employs
specific technical as well the technical HARQ, MIMO transmission, OFDM Access or estimation technical.
In this paper we focus our study on downlink LTE channel estimation and specially the interpolation which
is the basis of the estimation of the channel coefficients. Thus, we propose an adaptive method for polynomial interpolation based on Lagrange polynomial. We perform the Downlink LTE system MIMO transmission then compare the obtained results with linear, Sinus Cardinal and polynomial Newton Interpolations. The simulation results show that the Lagrange method outperforms system performance in term of Block Error Rate (BLER) , throughput and EVN(%)vs. Signal to Noise Ratio (SNR).
A new design of fuzzy logic controller optimized by PSO-SCSO applied to SFO-D...IJECEIAES
In this article, a new strategy for the design of fuzzy logic controllers (FLC) is proposed. This strategy is based on the optimization of the FLC, by the hybridization between the particle swarm optimization algorithm (PSO) and the sine-cosine swarm optimization algorithm (SCSO), This new strategy is called FLC-PSCSO. The input-output gains and the geometric shapes of the triangular membership functions of the FLC are the objective functions to be optimized. The optimization of the latter is obtained by minimizing a cost function based on the combination of two criteria, the integral time absolute error (ITAE) and the integral absolute error (IAE). A comparison between the conventional FLC and the proposed FLC-PSCSO is made. The FLC optimized by PSCSO shows a remarkable improvement in the performance of the controlled induction motor.
Performance evaluations of grioryan fft and cooley tukey fft onto xilinx virt...csandit
A large family of signal processing techniques consist of Fourier-transforming a signal,
manipulating the Fourier-transformed data in a simple way, and reversing the transformation.
We widely use Fourier frequency analysis in equalization of audio recordings, X-ray
crystallography, artefact removal in Neurological signal and image processing, Voice Activity
Detection in Brain stem speech evoked potentials, speech processing spectrograms are used to
identify phonetic sounds and so on. Discrete Fourier Transform (DFT) is a principal
mathematical method for the frequency analysis. The way of splitting the DFT gives out various
fast algorithms. In this paper, we present the implementation of two fast algorithms for the DFT
for evaluating their performance. One of them is the popular radix-2 Cooley-Tukey fast Fourier
transform algorithm (FFT) [1] and the other one is the Grigoryan FFT based on the splitting by
the paired transform [2]. We evaluate the performance of these algorithms by implementing
them on the Xilinx Virtex-II pro [3] and Virtex-5 [4] FPGAs, by developing our own FFT
processor architectures. Finally we show that the Grigoryan FFT is working fatser than
Cooley-Tukey FFT, consequently it is useful for higher sampling rates. Operating at higher
sampling rates is a challenge in DSP applications.
PERFORMANCE EVALUATIONS OF GRIORYAN FFT AND COOLEY-TUKEY FFT ONTO XILINX VIRT...cscpconf
A large family of signal processing techniques consist of Fourier-transforming a signal,manipulating the Fourier-transformed data in a simple way, and reversing the transformation.We widely use Fourier frequency analysis in equalization of audio recordings, X-ray crystallography, artefact removal in Neurological signal and image processing, Voice Activity Detection in Brain stem speech evoked potentials, speech processing spectrograms are used to identify phonetic sounds and so on. Discrete Fourier Transform (DFT) is a principal mathematical method for the frequency analysis. The way of splitting the DFT gives out various fast algorithms. In this paper, we present the implementation of two fast algorithms for the DFT for evaluating their performance. One of them is the popular radix-2 Cooley-Tukey fast Fourier transform algorithm (FFT) [1] and the other one is the Grigoryan FFT based on the splitting by the paired transform [2]. We evaluate the performance of these algorithms by implementing
them on the Xilinx Virtex-II pro [3] and Virtex-5 [4] FPGAs, by developing our own FFT processor architectures. Finally we show that the Grigoryan FFT is working fatser than
Cooley-Tukey FFT, consequently it is useful for higher sampling rates. Operating at higher
sampling rates is a challenge in DSP applications
Similar to AN OPTIMAL FUZZY LOGIC SYSTEM FOR A NONLINEAR DYNAMIC SYSTEM USING A FUZZY BASIS FUNCTION (20)
Vehicle Ad Hoc Networks (VANETs) have become a viable technology to improve traffic flow and safety on the roads. Due to its effectiveness and scalability, the Wingsuit Search-based Optimised Link State Routing Protocol (WS-OLSR) is frequently used for data distribution in VANETs. However, the selection of MultiPoint Relays (MPRs) plays a pivotal role in WS-OLSR's performance. This paper presents an improved MPR selection algorithm tailored to WS-OLSR, designed to enhance the overall routing efficiency and reduce overhead. The analysis found that the current OLSR protocol has problems such as redundancy of HELLO and TC message packets or failure to update routing information in time, so a WS-OLSR routing protocol based on improved-MPR selection algorithm was proposed. Firstly, factors such as node mobility and link changes are comprehensively considered to reflect network topology changes, and the broadcast cycle of node HELLO messages is controlled through topology changes. Secondly, a new MPR selection algorithm is proposed, considering link stability issues and nodes. Finally, evaluate its effectiveness in terms of packet delivery ratio, end-to-end delay, and control message overhead. Simulation results demonstrate the superior performance of our improved MR selection algorithm when compared to traditional approaches.
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of one or more types of sensors that can be embedded in clothing, attached directly to the body, or even implanted beneath an individual's skin. These sensors typically serve asingle application. However, the traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual approach: tailored treatment based on the specific needs of each traffic typeand the fulfillment of application requirements, such asreliability and timeliness. Never the less, the presence of energy constraints and the unreliable nature of wireless communications make QoS provisioning under such networks a non-trivial task. In this context, the current paper introduces a novel Medium AccessControl (MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular focus on improving reliability, timeliness, and energy efficiency.
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdfIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
The efficient use of energy in wireless sensor networks is critical for extending node lifetime. The network topology is one of the factors that have a significant impact on the energy usage at the nodes and the quality of transmission (QoT) in the network. We propose a topology control algorithm for software-defined wireless sensor networks (SDWSNs) in this paper. Our method is to formulate topology control algorithm as a nonlinear programming (NP) problem with the objective to optimizing two metrics, maximum communication range, and desired degree. This NP problem is solved at the SDWSN controller by employing the genetic algorithm (GA) to determine the best topology. The simulation results show that the proposed algorithm outperforms the MaxPower algorithm in terms of average node degree and energy expansion ratio.
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
The integration of artificial intelligence technology with a scalable Internet of Things (IoT) platform facilitates diverse smart communication services, allowing remote users to access services from anywhere at any time. The multi-server environment within IoT introduces a flexible security service model, enabling users to interact with any server through a single registration. To ensure secure and privacy preservation services for resources, an authentication scheme is essential. Zhao et al. recently introduced a user authentication scheme for the multi-server environment, utilizing passwords and smart cards, claiming resilience against well-known attacks. This paper conducts cryptanalysis on Zhao et al.'s scheme, focusing on denial of service and privacy attacks, revealing a lack of user-friendliness. Subsequently, we propose a new multi-server user authentication scheme for privacy preservation with fuzzy commitment over the IoT environment, addressing the shortcomings of Zhao et al.'s scheme. Formal security verification of the proposed scheme is conducted using the ProVerif simulation tool. Through both formal and informal security analyses, we demonstrate that the proposed scheme is resilient against various known attacks and those identified in Zhao et al.'s scheme.
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
In -Vehicle Ad-Hoc Network (VANET), vehicles continuously transmit and receive spatiotemporal data with neighboring vehicles, thereby establishing a comprehensive 360-degree traffic awareness system. Vehicular Network safety applications facilitate the transmission of messages between vehicles that are near each other, at regular intervals, enhancing drivers' contextual understanding of the driving environment and significantly improving traffic safety. Privacy schemes in VANETs are vital to safeguard vehicles’ identities and their associated owners or drivers. Privacy schemes prevent unauthorized parties from linking the vehicle's communications to a specific real-world identity by employing techniques such as pseudonyms, randomization, or cryptographic protocols. Nevertheless, these communications frequently contain important vehicle information that malevolent groups could use to Monitor the vehicle over a long period. The acquisition of this shared data has the potential to facilitate the reconstruction of vehicle trajectories, thereby posing a potential risk to the privacy of the driver. Addressing the critical challenge of developing effective and scalable privacy-preserving protocols for communication in vehicle networks is of the highest priority. These protocols aim to reduce the transmission of confidential data while ensuring the required level of communication. This paper aims to propose an Advanced Privacy Vehicle Scheme (APV) that periodically changes pseudonyms to protect vehicle identities and improve privacy. The APV scheme utilizes a concept called the silent period, which involves changing the pseudonym of a vehicle periodically based on the tracking of neighboring vehicles. The pseudonym is a temporary identifier that vehicles use to communicate with each other in a VANET. By changing the pseudonym regularly, the APV scheme makes it difficult for unauthorized entities to link a vehicle's communications to its real-world identity. The proposed APV is compared to the SLOW, RSP, CAPS, and CPN techniques. The data indicates that the efficiency of APV is a better improvement in privacy metrics. It is evident that the AVP offers enhanced safety for vehicles during transportation in the smart city.
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
Malware is one of the threats to security of computer networks and information systems. Since malware instances are available sufficiently, there is increased interest among researchers on usage of Artificial Intelligence (AI). Of late AI-enabled methods such as machine learning (ML) and deep learning paved way for solving many real-world problems. As it is a learning-based approach, accumulated training samples help in improving thequality of training and thus leveraging malware detection accuracy. Existing deep learning methods are focusing on learning-based malware detection systems. However, there is need for improving the state of the art through ensemble approach. Towards this end, in this paper we proposed a framework known as Deep Ensemble Framework (DEF) for automatic malware detection. The framework obtains features from training samples. From given malware instance a grayscale image is generated. There is another process to extract the opcode sequences. Convolutional Neural Network (CNN) and Long Short Term Memory (LSTM) techniques are used to obtain grayscale image and opcode sequence respectively. Afterwards, a stacking ensemble is employed in order to achieve efficient malware detection and classification. Malware samples collected fromthe Internet sources and Microsoft are used for theempirical study. An algorithm known as Ensemble Learning for Automatic Malware Detection (EL-AML) is proposed to realize our framework. Another algorithm named Pre-Process is proposed to assist the EL-AML algorithm for obtaining intermediate features required by CNN and LSTM.Empirical study reveals that our framework outperforms many existing methods in terms of speed-up and accuracy.
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficIJCNCJournal
With the emergence of smart devices and the Internet of Things (IoT), millions of users connected to the network produce massive network traffic datasets. These vast datasets of network traffic, Big Data are challenging to store, deal with and analyse using a single computer. In this paper we developed parallel implementation using a High Performance Computer (HPC) for the Non-Negative Matrix Factorization technique as an engine for an Intrusion Detection System (HPC-NMF-IDS). The large IoT traffic datasets of order of millions samples are distributed evenly on all the computing cores for both storage and speedup purpose. The distribution of computing tasks involved in the Matrix Factorization takes into account the reduction of the communication cost between the computing cores. The experiments we conducted on the proposed HPC-IDS-NMF give better results than the traditional ML-based intrusion detection systems. We could train the HPC model with datasets of one million samples in only 31 seconds instead of the 40 minutes using one processor), that is a speed up of 87 times. Moreover, we have got an excellent detection accuracy rate of 98% for KDD dataset.
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of one or more types of sensors that can be embedded in clothing, attached directly to the body, or even implanted beneath an individual's skin. These sensors typically serve asingle application. However, the traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual approach: tailored treatment based on the specific needs of each traffic typeand the fulfillment of application requirements, such asreliability and timeliness. Never the less, the presence of energy constraints and the unreliable nature of wireless communications make QoS provisioning under such networks a non-trivial task. In this context, the current paper introduces a novel Medium AccessControl (MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular focus on improving reliability, timeliness, and energy efficiency.
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
The efficient use of energy in wireless sensor networks is critical for extending node lifetime. The network topology is one of the factors that have a significant impact on the energy usage at the nodes and the quality of transmission (QoT) in the network. We propose a topology control algorithm for software-defined wireless sensor networks (SDWSNs) in this paper. Our method is to formulate topology control algorithm as a nonlinear programming (NP) problem with the objective to optimizing two metrics, maximum communication range, and desired degree. This NP problem is solved at the SDWSN controller by employing the genetic algorithm (GA) to determine the best topology. The simulation results show that the proposed algorithm outperforms the MaxPower algorithm in terms of average node degree and energy expansion ratio.
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
The integration of artificial intelligence technology with a scalable Internet of Things (IoT) platform facilitates diverse smart communication services, allowing remote users to access services from anywhere at any time. The multi-server environment within IoT introduces a flexible security service model, enabling users to interact with any server through a single registration. To ensure secure and privacy preservation services for resources, an authentication scheme is essential. Zhao et al. recently introduced a user authentication scheme for the multi-server environment, utilizing passwords and smart cards, claiming resilience against well-known attacks. This paper conducts cryptanalysis on Zhao et al.'s scheme, focusing on denial of service and privacy attacks, revealing a lack of user-friendliness. Subsequently, we propose a new multi-server user authentication scheme for privacy preservation with fuzzy commitment over the IoT environment, addressing the shortcomings of Zhao et al.'s scheme. Formal security verification of the proposed scheme is conducted using the ProVerif simulation tool. Through both formal and informal security analyses, we demonstrate that the proposed scheme is resilient against various known attacks and those identified in Zhao et al.'s scheme.
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
In -Vehicle Ad-Hoc Network (VANET), vehicles continuously transmit and receive spatiotemporal data with neighboring vehicles, thereby establishing a comprehensive 360-degree traffic awareness system. Vehicular Network safety applications facilitate the transmission of messages between vehicles that are near each other, at regular intervals, enhancing drivers' contextual understanding of the driving environment and significantly improving traffic safety. Privacy schemes in VANETs are vital to safeguard vehicles’ identities and their associated owners or drivers. Privacy schemes prevent unauthorized parties from linking the vehicle's communications to a specific real-world identity by employing techniques such as pseudonyms, randomization, or cryptographic protocols. Nevertheless, these communications frequently contain important vehicle information that malevolent groups could use to Monitor the vehicle over a long period. The acquisition of this shared data has the potential to facilitate the reconstruction of vehicle trajectories, thereby posing a potential risk to the privacy of the driver. Addressing the critical challenge of developing effective and scalable privacy-preserving protocols for communication in vehicle networks is of the highest priority. These protocols aim to reduce the transmission of confidential data while ensuring the required level of communication. This paper aims to propose an Advanced Privacy Vehicle Scheme (APV) that periodically changes pseudonyms to protect vehicle identities and improve privacy. The APV scheme utilizes a concept called the silent period, which involves changing the pseudonym of a vehicle periodically based on the tracking of neighboring vehicles. The pseudonym is a temporary identifier that vehicles use to communicate with each other in a VANET. By changing the pseudonym regularly, the APV scheme makes it difficult for unauthorized entities to link a vehicle's communications to its real-world identity. The proposed APV is compared to the SLOW, RSP, CAPS, and CPN techniques. The data indicates that the efficiency of APV is a better improvement in privacy metrics. It is evident that the AVP offers enhanced safety for vehicles during transportation in the smart city.
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
Malware is one of the threats to security of computer networks and information systems. Since malware instances are available sufficiently, there is increased interest among researchers on usage of Artificial Intelligence (AI). Of late AI-enabled methods such as machine learning (ML) and deep learning paved way for solving many real-world problems. As it is a learning-based approach, accumulated training samples help in improving thequality of training and thus leveraging malware detection accuracy. Existing deep learning methods are focusing on learning-based malware detection systems. However, there is need for improving the state of the art through ensemble approach. Towards this end, in this paper we proposed a framework known as Deep Ensemble Framework (DEF) for automatic malware detection. The framework obtains features from training samples. From given malware instance a grayscale image is generated. There is another process to extract the opcode sequences. Convolutional Neural Network (CNN) and Long Short Term Memory (LSTM) techniques are used to obtain grayscale image and opcode sequence respectively. Afterwards, a stacking ensemble is employed in order to achieve efficient malware detection and classification. Malware samples collected fromthe Internet sources and Microsoft are used for theempirical study. An algorithm known as Ensemble Learning for Automatic Malware Detection (EL-AML) is proposed to realize our framework. Another algorithm named Pre-Process is proposed to assist the EL-AML algorithm for obtaining intermediate features required by CNN and LSTM.Empirical study reveals that our framework outperforms many existing methods in terms of speed-up and accuracy.
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficIJCNCJournal
With the emergence of smart devices and the Internet of Things (IoT), millions of users connected to the network produce massive network traffic datasets. These vast datasets of network traffic, Big Data are challenging to store, deal with and analyse using a single computer. In this paper we developed parallel implementation using a High Performance Computer (HPC) for the Non-Negative Matrix Factorization technique as an engine for an Intrusion Detection System (HPC-NMF-IDS). The large IoT traffic datasets of order of millions samples are distributed evenly on all the computing cores for both storage and speedup purpose. The distribution of computing tasks involved in the Matrix Factorization takes into account the reduction of the communication cost between the computing cores. The experiments we conducted on the proposed HPC-IDS-NMF give better results than the traditional ML-based intrusion detection systems. We could train the HPC model with datasets of one million samples in only 31 seconds instead of the 40 minutes using one processor), that is a speed up of 87 times. Moreover, we have got an excellent detection accuracy rate of 98% for KDD dataset.
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
Cyber intrusion attacks increasingly target the Internet of Things (IoT) ecosystem, exploiting vulnerable devices and networks. Malicious activities must be identified early to minimize damage and mitigate threats. Using actual benign and attack traffic from the CICIoT2023 dataset, this WORK aims to evaluate and benchmark machine-learning techniques for IoT intrusion detection. There are four main phases to the system. First, the CICIoT2023 dataset is refined to remove irrelevant features and clean up missing and duplicate data. The second phase employs statistical models and artificial intelligence to discover novel features. The most significant features are then selected in the third phase based on cooperative game theory. Using the original CICIoT2023 dataset and a dataset containing only novel features, we train and evaluate a variety of machine learning classifiers. On the original dataset, Random Forest achieved the highest accuracy of 99%. Still, with novel features, Random Forest's performance dropped only slightly (96%) while other models achieved significantly lower accuracy. As a whole, the work contributes substantial contributions to tailored feature engineering, feature selection, and rigorous benchmarking of IoT intrusion detection techniques. IoT networks and devices face continuously evolving threats, making it necessary to develop robust intrusion detection systems.
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
IoT networking uses real items as stationary or mobile nodes. Mobile nodes complicate networking. Internet of Things (IoT) networks have a lot of control overhead messages because devices are mobile. These signals are generated by the constant flow of control data as such device identity, geographical positioning, node mobility, device configuration, and others. Network clustering is a popular overhead communication management method. Many cluster-based routing methods have been developed to address system restrictions. Node clustering based on the Internet of Things (IoT) protocol, may be used to cluster all network nodes according to predefined criteria. Each cluster will have a Smart Designated Node. SDN cluster management is efficient. Many intelligent nodes remain in the network. The network design spreads these signals. This paper presents an intelligent and responsive routing approach for clustered nodes in IoT networks. An existing method builds a new sub-area clustered topology. The Nodes Clustering Based on the Internet of Things (NCIoT) method improves message transmission between any two nodes. This will facilitate the secure and reliable interchange of healthcare data between professionals and patients. NCIoT is a system that organizes nodes in the Internet of Things (IoT) by grouping them together based on their proximity. It also picks SDN routes for these nodes. This approach involves selecting one option from a range of choices and preparing for likely outcomes problem addressing limitations on activities is a primary focus during the review process. Predictive inquiry employs the process of analyzing data to forecast and anticipate future events. This document provides an explanation of compact units. The Predictive Inquiry Small Packets (PISP) improved its backup system and partnered with SDN to establish a routing information table for each intelligent node, resulting in higher routing performance. Both principal and secondary roads are available for use. The simulation findings indicate that NCIoT algorithms outperform CBR protocols. Enhancements lead to a substantial 78% boost in network performance. In addition, the end-to-end latency dropped by 12.5%. The PISP methodology produces 5.9% more inquiry packets compared to alternative approaches. The algorithms are constructed and evaluated against academic ones.
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
Cyber intrusion attacks increasingly target the Internet of Things (IoT) ecosystem, exploiting vulnerable devices and networks. Malicious activities must be identified early to minimize damage and mitigate threats. Using actual benign and attack traffic from the CICIoT2023 dataset, this WORK aims to evaluate and benchmark machine-learning techniques for IoT intrusion detection. There are four main phases to the system. First, the CICIoT2023 dataset is refined to remove irrelevant features and clean up missing and duplicate data. The second phase employs statistical models and artificial intelligence to discover novel features. The most significant features are then selected in the third phase based on cooperative game theory. Using the original CICIoT2023 dataset and a dataset containing only novel features, we train and evaluate a variety of machine learning classifiers. On the original dataset, Random Forest achieved the highest accuracy of 99%. Still, with novel features, Random Forest's performance dropped only slightly (96%) while other models achieved significantly lower accuracy. As a whole, the work contributes substantial contributions to tailored feature engineering, feature selection, and rigorous benchmarking of IoT intrusion detection techniques. IoT networks and devices face continuously evolving threats, making it necessary to develop robust intrusion detection systems.
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...IJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
IoT networking uses real items as stationary or mobile nodes. Mobile nodes complicate networking. Internet of Things (IoT) networks have a lot of control overhead messages because devices are mobile. These signals are generated by the constant flow of control data as such device identity, geographical positioning, node mobility, device configuration, and others. Network clustering is a popular overhead communication management method. Many cluster-based routing methods have been developed to address system restrictions. Node clustering based on the Internet of Things (IoT) protocol, may be used to cluster all network nodes according to predefined criteria. Each cluster will have a Smart Designated Node. SDN cluster management is efficient. Many intelligent nodes remain in the network. The network design spreads these signals. This paper presents an intelligent and responsive routing approach for clustered nodes in IoT networks. An existing method builds a new sub-area clustered topology. The Nodes Clustering Based on the Internet of Things (NCIoT) method improves message transmission between any two nodes. This will facilitate the secure and reliable interchange of healthcare data between professionals and patients. NCIoT is a system that organizes nodes in the Internet of Things (IoT) by grouping them together based on their proximity. It also picks SDN routes for these nodes. This approach involves selecting one option from a range of choices and preparing for likely outcomes problem addressing limitations on activities is a primary focus during the review process. Predictive inquiry employs the process of analyzing data to forecast and anticipate future events. This document provides an explanation of compact units. The Predictive Inquiry Small Packets (PISP) improved its backup system and partnered with SDN to establish a routing information table for each intelligent node, resulting in higher routing performance. Both principal and secondary roads are available for use. The simulation findings indicate that NCIoT algorithms outperform CBR protocols. Enhancements lead to a substantial 78% boost in network performance. In addition, the end-to-end latency dropped by 12.5%. The PISP methodology produces 5.9% more inquiry packets compared to alternative approaches. The algorithms are constructed and evaluated against academic ones.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Runway Orientation Based on the Wind Rose Diagram.pptx
AN OPTIMAL FUZZY LOGIC SYSTEM FOR A NONLINEAR DYNAMIC SYSTEM USING A FUZZY BASIS FUNCTION
1. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.2, March 2016
DOI: 10.5121/ijcnc.2016.8215 179
AN OPTIMAL FUZZY LOGIC SYSTEM FOR A
NONLINEAR DYNAMIC SYSTEM USING A FUZZY
BASIS FUNCTION
SherifKamel Hussein1
and Mahmoud Hanafy Saleh2
1
Department of Communications and Electronics, October University for Modern
Sciences and Arts- Giza - Egypt
2
Electrical Communication and Electronics Systems Engineering Department, Canadian
International College-CIC-Egypt
ABSTRACT
The impetus for this paper is the development of Fuzzy Basis Function “FBF” that assigns in an optimal
fashion, a function approximation for a nonlinear dynamic system. A fuzzy basis function is applied to
find the best location of the characteristic points by specifying the set of fuzzy rules. The advantage of this
technique is that, it may produce a simple and well-performing system because it selects the most
significant fuzzy basis functions to minimize an objective function in the output error for the fuzzy rules.
The fuzzy basis function is a linguistic fuzzy IF_THEN rule. It provides a combination of the numerical
information and the linguistic information in the form input-output pairs and in the form of fuzzy rules.
The proposed control scheme is applied to a magnetic ball suspension system.
KEYWORDS
Fuzzy Logic Control “FLC”,Fuzzy Basis Function “FBF”,Orthogonal Least Squares ”OLS”.
1. INTRODUCTION
The fuzzy logic controller comprises three stages namely fuzzifier, rule-based assignment tables and
the defuzzifier. In this system, theinput signals are converted to fuzzy representations, the rule base
will produce a consequent fuzzy region foreach solutionvariable, and the consequent fuzzy region
are defuzzified to find the expected solution variable [1-7].
In this paper, an optimal approach to function approximation is presented using fuzzy systems. The
proposed approach does not optimize the function approximation, but also gives some insight to the
role of different parts of fuzzy systems employing the new concepts of characteristic point.
A fuzzy basis function is then applied to find the best location of the characteristic points specifying
the optimal rule-set [8-12].This paper is organized as follows, the second section describes the fuzzy
logic system. The third section is devoted to discuss the optimal fuzzy system. The fourth section is
concerned with the fuzzy control procedures. In fifth section, a propose design for magnetic ball
system is introduced.the magnetic ball system is designed.Finally the last section is dedicated to the
computer simulation, and the conclusions.
2. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.2, March 2016
180
2. FUZZY LOGIC SYSTEMS
The fuzzy logic system with fuzzifier and defuzzifier has many attractive features. First , it is
suitable for engineering systems because its input and output are real-valued variables. Second , it
provides a natural framework to incorporate fuzzy IF-THEN rules from human experts. Finally ,
there is much freedom in the choices of fuzzifier, fuzzy rules, assembled in which as the fuzzy
inference engine and defuzzifier. Fig. 1 shows the Fuzzy Logic System "FLs" [13,14].
Figure 1. Fuzzy Logic System
The Fuzzy-Logic Control " FLC" comprises three stages namely Fuzzifier, Rule-base and
Defuzzifier. Fig. 2 shows the configuration of a fuzzy logic controller.The Fuzzy Control Theory
uses the fuzzy knowledge to describe the characteristics of the system, because the nonlinear
system is difficult to establish for traditional methods [12].
Figure 2. The basic Configuration of a Fuzzy Logic Controller
The signal e(k) is the error signal and it is the difference between the reference signal and the
actual signal, the signal ∆e(k) is defined as the rate of change of the error signal.
e(k) = ∆r(k) - ∆ c(k) (1)
∆e(k) = e(k) – e(k-1) (2)
Where :
∆r(k) is the reference speed at k-th sampling interval
∆ c(k) is the speed signal at k-th sampling interval
e(k) is the error signal
3. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.2, March 2016
181
The workable range is divided into intervals, these intervals are named for example , Positive " P"
, Zero " Z" , and Negative " N". These names for the intervals are called labels [14,20].The rules
relate the input variables to the output of the fuzzy controller. These rules can be expressed in a
table with the inputs in the horizontal Cartesianand the output in the vertical cartesian. However,
the output would be inside each cell as shown in table 1.
Table. 1 Rules Table
The rules base are expressed as IF-THEN as follows:
IF e is "N " AND ∆e is "N"
Then u is "P"
IF e is "N " AND ∆e is "Z"
Then u is "N"
IF e is "N " AND ∆e is "P"
Then u is "Z"
IF e is" Z " AND ∆e is "N"
Then u is "N"
IF e is "Z " AND ∆e is "Z"
Then u is "Z"
IF e is "Z " AND ∆e is "P"
Then u is "P"
IF e is "P " AND ∆e is "N"
Then u is "Z"
IF e is "P " AND ∆e is "Z"
Then u is "P"
IF e is "P " AND ∆e is "P"
Then u is "N"
3. OPTIMAL FUZZY LOGIC SYSTEMS
We develop an optimal fuzzy logic system, that is, it is optimal in the sense of matching all
inputs-outputs pairs in the training set to any given accuracy [15,17-21]. For an arbitrary Ɛ ˃ 0 ,
there exists, the difference between a real continuous function g(x) and a fuzzy system F(x) is
in the form of :
ǁF(x) – g(x) ǁ ˂ Ɛ (3)
Consider the set of fuzzy system with fuzzifier, product inference, defuzzifier, and isosceles
triangle membership function consists of the functions of the form :
F x =
∏ µ
∏ µ
(4)
4. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.2, March 2016
182
Where xi are the N-input variables to the fuzzy system, y is the M-output variable of the fuzzy
system, and µFi
k
(x) is the isosceles triangle membership function.
The first step in the approximation of such a function is to define the membership function for the
input-output spaces, the membership function is expressed by a triangle whose center and width
defined by ai and bi respectively [14,15,17-21]
μ x = 1 − 2 (5)
The function F(.) is the fuzzy logic system output.The number of rules in the optimal logic system
equal to the number of input-output pairs in the training set with one rule responsible for
matching one input-output pair (x1,y1).
Many types of membership function exists [2,3,14-20]. In this paper, the triangular-shaped
function µ(e) is the membership function of the error signal, with positive lable”P” and zero
Lable “Z” and negative labe “N”. The triangular shaped function, µ(∆e) is the membership
function of the rate of change of the error signal with positive label “P”, zero label”ZE” and
negative label “N” as shown in Fig.3 ,
Figure 3. The Membership Function of error "e" and the error change " ∆e"
3.1 Fuzzy Basis Function
Fuzzy Logic control technique has represented an alternative method to solve the problems in
control engineering in recent years. One of the most useful properties of fuzzy logic systems in
control is their ability to approximate a certain desired behavior function up to a desired level of
accuracy.
The Fuzzy Basis Function "FBF" is proposed for control multi-input-single output nonlinear
function [9-13]. The fuzzy basis function (FBF) is defined as a series of algebraic superposition
of fuzzy membership functions [12].
P x =
∏ µ
∏ µ
(6)
Then the fuzzy logic system is equivalent to an FBF expansion
d(t) = Σj
M
Pj (t) * θj+ e(t) (7)
µ(e)
e
-1 1
1
ZE NP
e∆
-1 1
1
ZE NP
µ(∆e)
5. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.2, March 2016
183
Where d(.) is the system output, θj are real parameters, Pj(t) are fixed function of system inputs
x(.). Suppose that ,we are given N-input-output pairs [x(t0, d(t)], t=1,2,…,N. The algorithm is to
design an FBF expansion F(x) , such that the error function between the F(x(t)) and d(t) is
minimized.The Fuzzy Basis Function” FBF” can be determined as follows:
• Calculate the product of all membership functions for the linguistic terms in the IF part of
rule
• Generate these product on a numerical input-output pair
It is an intuitive idea that FBF’s play an important role in the determining structure and property
of fuzzy systems. We gave a systematic analysis of FBF’s and presented the following properties
of fuzzitlity, and composition. The fuzzy logic system can be analyzed from two view points;
First, if the parameters in the FBF are free design parameters. Second, the FBF expansion is
nonlinear in the parameters.
In order to specify, such FBF expansion, it must use nonlinear optimization techniques [9-12].
The objective is to design an FBF expansion F(x), such that the error between F(x) and g(x) is
minimized.In order to describethat , consider the Orthogonal Least Squares "OLS" learning
algorithm works. In matrix form :
d = P * θ + e (8)
Where
d= [d1, d2, …dN]T
(9)
P= [ P1, P2, …, PM ]T
(10)
Pi = [ pi(1) , pi(2), …, pi(N)]T
Θ= [ θ1, θ2, …, θM ]T
(11)
e= [ e(1), e(2), , e(N) ]T
(12)
The orthogonal algorithm transforms the set of pi into a set of orthogonal basis vectors and uses
the significant basis vectors to form the final FBF expansion.
4. FUZZY CONTROL ALGORITHM
In this section, a systematic method is given to help designer get the best of reasoning algorithm
that works well with the application required. The proposed approach to develop a fuzzy logic
system consists of five stages. For the given pairs
(X1, X2, Y) Where F(X1,X2) Y
Step 1
Assume that , the range of each variable is known [ x1, x-
1 ],[ x2, x-
2 ] and [y1, y-
1]
Normalize each and find the corresponding scaling factors Kx1, Kx2 , and Ky.
Step 2
Generate the fuzzy rules from the data pairs
Determine the degree of each xi
1 , xi
2 , and yi
Step 3
Assign a degree of each rules
The degree of this rule D(rule) is defined as
D(rule) = µA (x1) * µB (x2)
6. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.2, March 2016
184
Step 4
Create a combined fuzzy basis function by making a look-up table as shown in table 1
Step 5
Determine the following defuzzification strategy to determine the output y for given
inputs (x1, x2)
5. MAGNETIC BALL SYSTEM
The magnetic ball suspension system is proposed as a nonlinear system is shown in fig.4.In this
system, the electro- mechanical nonlinear model of magnetic ball system can be described in
terms of the following set of differential equations[11-13, 21-22].
Figure 4. Magnetic Ball Suspension System
The system may be expressed as follows:
dx1 (t)/dt = x2(t) (13)
dx2(t)/dt = c1 + c2 . f(x) (14)
dx3 (t)/dt = c3 x3(t) + c4 . u(t) (15)
Where
c1: The gravity acceleration“ g=9,8
c2 : the magnetic force constant c2 = -10”
c3 :The unit conversion coefficient, c3=-100
c4: The coil conductance “ c4=2”
Equation(13) indicates that f(x) is a nonlinear of ball position
f(x) = x3
2
(t) / x1(t) (16)
6.COMPUTER SIMULATION
The Magnetic Suspension or magnetic ball is a type of suspension system where the shock
absorbers reacts to the road and adjusts much faster than regular absorbers. In this system, a steal
ball of mass can counteract the effect of gravity at any point. This relationship is a nonlinear
function as shown in Fig. 5.
7. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.2, March 2016
185
Figure 5. Block diagram of the Magnetic Ball Suspension
To illustrate the design process of a fuzzy system, consider the nonlinear function in Eq.(15). We
compute the performance of each membership function used the same information. The results
clearly show the applicability of the proposed scheme to the representation of a nonlinear
function. From this result, the following points can be concluded: The fuzzy logic has the
advantage of being able to handle the behavior of a nonlinear function. The fuzzy logic is simpler
than the conventional system. It is clear that, the function performance with fuzzy logic is
acceptable, and the result is faster response during transient compared to the conventional
technique. On contrary to that, the fuzzy logic result in a smaller steady state error. The two
opposing forces applied to the ball (magnetic force f(x) and the fuzzy basis function ) almost
identical are shown in Fig. 6.The difference between the two forces are almost negligible which
shows the good fuzzy basis function followed the trajectory desire.
Figure 6. Nonlinear Function and Fuzzy Basis Functions
7. CONCLUSION
The paper presents a fuzzy logic strategy to ensure excellent study and gurantees the operation of
the magnetic ball suspension. Simulation results show that the response shows a significant
improvement in the approximator performance.
It is clear that the responses show a close correspondence between the real function and the
estimated one throughout the operation periods which demonstrates the validity of the proposed
algorithm. The fuzzy basis function expansion provides a natural framework to combine both
0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4 0.45 0.5
-15
-10
-5
0
5
10
NONLINEAR MODEL
Output
Time
Nonlinear Function
Fuzzy Approximator
8. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.2, March 2016
186
numerical information in the form of input-output pairs and linguistic information in the form of
fuzzy IF-THEN rules.
An example of how to combine the fuzzy basis functions generated from a numerical state-
control and the fuzzy basis function generated form the common-sense linguistic fuzzy control
rules is shown and represented in this paper.
REFERENCES
[1] L.A.Zadah, (1980)“Fuzzy Sets Versus Probability”Proc.of the IEEE, Vol.68, No.3.
[2] C.C. Lee , (1990)” Fuzzy Logic in Control Systems-Part-II” IEEE Trans. On Systems, Man and
Cybernetics, Vol.20, No.2.
[3] L.A.Zadah,(1996)”Fuzzy Logic = Computing with Words” IEEE Trans. On Fuzzy Systems Vol.4,
No.2.
[4] A. Ike, A. Kulkam, and Dr. Veeresh, (2012)" Load Frequency Control Using Fuzzy Logic Controller
of Two Area Thermal- Power System" International Journal ofEngineering Technology and
Advanced Engineering, Vol.2.
[5] K. Des, P.Des, and S. Sharma , (2012)" Load Frequency Control Using Classical Controller in an
Isolated Single Area and Two Area Reheat Thermal Power Systems" International Journal of
Engineering Technology and Advanced Engineering, Vol.2.
[6] K.Yamashita, M.Hirayasu, K. OkafujiandH.Miyagi, (1995)“ A Design Method of Adaptive Load
Frequency Control With Dual-Rate Sampling” Int. Journal of Adaptive Control and Signal
Processing, Vol.9,No.2.
[7] M.H.Saleh&T.A.Moniem, (2012).” Fuzzy Logic Membership Implementation Using Optical
Hardware Component” Optics Communication, SciVerse, Science Direct.
[8] Li-Xin Wang and Jerry M. Mendel , (1992)" Fuzzy Basis Functions, Universal Approximation and
Orthogonal Least-Squares Learning" IEEE Transactions on Neural Networks, Vol.3,No.5.
[9] Zhang Huaguang, LilongGai, and ZeungnamBien , (2000) " A Fuzzy Basis Function Vector-Based
Multivariable Adaptive Controller For Nonlinear Systems" IEEE Transactions on Systems, Man , and
Cybernetics, Part B,, Vol.30, No.1.
[10] Man Zhihong, and X. H. Yu , (1998)" An adaptive Control Using Fuzzy Basis Function Expansions
For a Class ofd Nonlinear Systems " Journal of Intelligent and Robotics Systems 21, Kluwer
Academic Publishers.
[11] Hyun Mun Kim, and Mendel, J.M, (2002). " Fuzzy Basis Functions : Comparisons with Other Basis
Functions" IEEE Transactions on Computational Intelligence SocietyVol.3, No.1, Issue,2.
[12] HuannKeng Chiang, Chao Ting Chu, and Yong Tang Jhou, (2012)" Fuzzy Control With Fuzzy Basis
Function Neural Network in Magnetic Bearing Systems " IEEE Transactions on Neural Network.
[13] M.H.Saleh, A.H.Elassal, and I.H.Khalifa, (1996)“Fuzzy Logic Controller for Multi-Area Load
Frequency Control of Electric Power Systems”, The 6th. Conference on Computer and Applications,
IEEE Alex.Chapter, Alexandria, Egypt.
[14] M.H.Saleh, A.H.Elassal, and I.H.Khalifa,, (1997)”An Adaptive Fuzzy Controller to Improve System
Performance” The 7th.Conference on Computer and Applications, IEEE Alex.Chapter, Alexandria,
Egypt.
[15] RadaKushawa and SulochanaWadhawani, (2013)“Speed Control of Separately Excited DC Motor
Using Fuzzy Logic Controller” International Journal of Engineering Trends and Technology
(IJETT), Volume 4, Issue 6.
[16] M.H.Saleh, A.H.Elassal, and I.H.Khalifa, (1998)“An Adaptive Fuzzy Control for Dynamically
Interconnected Large-Scale Systems” The 6th International Middle East Power System Conference
”MEPCON’98” Al-Mansoura University, Al-Mansoura, Egypt.
[17] M.H.Saleh, A.H.Elassal, and I.H.Khalifa, (1997)”An Adaptive Fuzzy Controller to Improve System
Performance” The 7th.Conference on Computer and Applications, IEEE Alex. Chapter, Alexandria,
Egypt.
[18] M.H.Saleh& T.A. Moniem, (2013)” A knowledge-based adaptive fuzzy controller for a two-
areapower system” International Journal of Knowledge-based and Intelligent Engineering ,219–222
219 DOI 10.3233/KES-130260 IOS Press.
9. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.2, March 2016
187
[19] SherifKamelHusien, Mahmoud HanafySaleh, (2014)“ A Fuzzy Logic Controller For A Two-Link
Functional Manipulator” International Journal of Computer Networks & Communications (IJCNC),
Vol.6,No.6.
[20] Benjamin C.Kuo (1990), Automatic Control Systems, Prentice Hall Inc.
[21] YousfiKhemisi, (2010)“ Control Using Sliding Mode Of the Magnetic Suspension System”,
International Journals of Electrical & Computer Science IJECS-IJENS, Vol:10, N0: 03.
[22] P.Venkatesh& S. Balamurgan , (2014)” Real Time Control Of Magnetic Ball Suspension System
UsingdSPACE DS1104”dSPACE User Conference 2014, India.
AUTHORS
Sherifkamel Hussein Hassan Ratib has Graduated from the faculty of engineering in
1989 Communications and Electronics Department ,Helwan University. He received
hisDiploma,MSc,and Doctorate in Computer Science - Major Information Technology
and Networking from Cairo University in Egypt in 2007. He is currently Associate
Professor in Electrical and Communication Engineering department at October
University for Modern Sciences and Arts, He has worked internationally in thearea of
Networking , Control and automation. He joined many private and governmental universities inside and
outside Egypt for almost 15 years .He shared in the development of many industrial courses .His research
interest is GSM Based Control and Macro mobility based on Mobile IP.
Mahmoud HanafySaleh has received the M.Sc. degree in Automatic Control -
Electrical Engineering and PhD degree in Automatic Control from Faculty of
Engineering, Helwan University (Egypt). He is currently an Assistant Professor in
Electrical Communication and Electronics Systems Engineering Department,Canadian
International College-CIC. Dr Mahmoud Hanafy has worked in the areas of Fuzzy
logic, Neural Network, System Dynamics, Intelligent Control Logic Control, Physics
of Electrical Materials, Electronic Circuit-Analog-Digital, Electric Circuit Analysis
DC-AC, Power electronic, Analysis of Electric Energy Conversion Solar energy-Photovoltaic, and Electric
Power System analysis Interconnected Power System. His research interests include: Control System
Analysis, Systems Engineering, System Dynamics, Process Control, Neural network and fuzzy logic
controllers, Neuro-Fuzzy systems, Mathematical Modeling and Computer Simulation, Statistical Analysis.