Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Item Type
      Item Type
      Clear All
      Item Type
  • Subject
      Subject
      Clear All
      Subject
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
42 result(s) for "Mahdal, Miroslav"
Sort by:
Multi Swarm Optimization Based Clustering with Tabu Search in Wireless Sensor Network
Wireless Sensor Networks (WSNs) can be defined as a cluster of sensors with a restricted power supply deployed in a specific area to gather environmental data. One of the most challenging areas of research is to design energy-efficient data gathering algorithms in large-scale WSNs, as each sensor node, in general, has limited energy resources. Literature review shows that with regards to energy saving, clustering-based techniques for data gathering are quite effective. Moreover, cluster head (CH) optimization is a non-deterministic polynomial (NP) hard problem. Both the lifespan of the network and its energy efficiency are improved by choosing the optimal path in routing. The technique put forth in this paper is based on multi swarm optimization (MSO) (i.e., multi-PSO) together with Tabu search (TS) techniques. Efficient CHs are chosen by the proposed system, which increases the optimization of routing and life of the network. The obtained results show that the MSO-Tabu approach has a 14%, 5%, 11%, and 4% higher number of clusters and a 20%, 6%, 14%, and 6% lesser average packet loss rate as compared to a genetic algorithm (GA), differential evolution (DE), Tabu, and MSO based clustering, respectively. Moreover, the MSO-Tabu approach has 136%, 36%, 136%, and 38% higher lifetime computation, and 22%, 16%, 51%, and 12% higher average dissipated energy. Thus, the study’s outcome shows that the proposed MSO-Tabu is efficient, as it enhances the number of clusters formed, average energy dissipated, lifetime computation, and there is a decrease in mean packet loss and end-to-end delay.
A Compact Planar Monopole UWB MIMO Antenna for Short-Range Indoor Applications
A compact, four-element planar MIMO (Multiple Input, Multiple Output) antenna that operates in an ultra-wideband is presented for diversity application. The orthogonal position of the unit cells replicates the single antenna thrice, thereby decreasing mutual coupling. A UWB MIMO antenna measuring 35 × 35 × 1.6 mm3 is built using a microstrip line (50 Ω impedance) on an FR4 substrate having a thickness of 1.6 mm. The ground plane and radiator of this antenna are adjusted in several ways to bring it within its operating constraints between the frequencies of 3.1 GHz and 10.6 GHz. This technique makes the antenna small and covers the entire ultra-wideband (UWB) frequency range. The NI USRP was used to test the proposed MIMO antenna to determine its real-time performance. Based on the computed results, we conclude that this proposed antenna has outstanding characteristics in terms of performance and is suitable for wireless ultra-wideband indoor communication and diversity utilization with a small size.
An Efficient Chaos-Based Image Encryption Technique Using Bitplane Decay and Genetic Operators
Social networks have greatly expanded in the last ten years the need for sharing multimedia data. However, on open networks such as the Internet, where security is frequently compromised, it is simple for eavesdroppers to approach the actual contents without much difficulty. Researchers have created a variety of encryption methods to strengthen the security of this transmission and make it difficult for eavesdroppers to get genuine data. However, these conventional approaches increase computing costs and communication overhead and do not offer protection against fresh threats. The problems with current algorithms encourage academics to further investigate the subject and suggest new algorithms that are more effective than current methods, that reduce overhead, and which are equipped with features needed by next-generation multimedia networks. In this paper, a genetic operator-based encryption method for multimedia security is proposed. It has been noted that the proposed algorithm produces improved key strength results. The investigations using attacks on data loss, differential assaults, statistical attacks, and brute force attacks show that the encryption technique suggested has improved security performance. It focuses on two techniques, bitplane slicing and followed by block segmentation and scrambling. The suggested method first divides the plaintext picture into several blocks, which is then followed by block swapping done by the genetic operator used to combine the genetic information of two different images to generate new offspring. The key stream is produced from an iterative chaotic map with infinite collapse (ICMIC). Based on a close-loop modulation coupling (CMC) approach, a three-dimensional hyperchaotic ICMIC modulation map is proposed. By using a hybrid model of multidirectional circular permutation with this map, a brand-new colour image encryption algorithm is created. In this approach, a multidirectional circular permutation is used to disrupt the image’s pixel placements, and genetic operations are used to replace the pixel values. According to simulation findings and security research, the technique can fend off brute-force, statistical, differential, known-plaintext, and chosen-plaintext assaults, and has a strong key sensitivity.
A compressed image encryption algorithm leveraging optimized 3D chaotic maps for secure image communication
In today’s digital age, sensitive multimedia informations are transmitted over public networks that are vulnerable to unauthorized access and data tampering. This motivates more robust encryption methods to combat such security threats. In this paper, a chaotic map-based encryption technique is presented as a solution to these issues. The proposed algorithm termed as OptiSecure-3D presents optimized parameter-based 3D chaotic maps for image encryption. The method integrates three primary components: stacked autoencoder (SAE), optimized parameter-based chaotic mapping, and encryption/decryption module, to ensure robust and secure encryption of images. The result evaluated the proposed OptiSecure-3D image encryption algorithm with a randomness test, pixel adjacency correlation test, and differential analysis. The mean entropy was approx. 7.9 and the mean number of pixels changing rate (NPCR) was approx. 99.8, unified average changing intensity (UACI) was approx. 33.46. Moreover, the OptiSecure-3D algorithm also investigated the result under noise attacks and shows better cryptanalysis results as compared to comparative state-of-art models. The findings suggest that our chaotic map-based encryption technique not only provides an effective solution to the security vulnerabilities of digital image transmission but also enhances the overall reliability of multimedia communication systems. This paper presents a significant advancement in the field of secure image encryption to meets the increasing demands for data security in modern digital communication networks.
Adaptive Fuzzy Logic Deep-Learning Equalizer for Mitigating Linear and Nonlinear Distortions in Underwater Visible Light Communication Systems
Underwater visible light communication (UVLC) has recently come to light as a viable wireless carrier for signal transmission in risky, uncharted, and delicate aquatic environments like seas. Despite the potential of UVLC as a green, clean, and safe alternative to conventional communication methods, it is challenged by significant signal attenuation and turbulent channel conditions compared to long-distance terrestrial communication. To address linear and nonlinear impairments in UVLC systems, this paper presents an adaptive fuzzy logic deep-learning equalizer (AFL-DLE) for 64 Quadrature Amplitude Modulation-Component minimal Amplitude Phase shift (QAM-CAP)-modulated UVLC systems. The proposed AFL-DLE is dependent on complex-valued neural networks and constellation partitioning schemes and utilizes the Enhanced Chaotic Sparrow Search Optimization Algorithm (ECSSOA) to improve overall system performance. Experimental outcomes demonstrate that the suggested equalizer achieves significant reductions in bit error rate (55%), distortion rate (45%), computational complexity (48%), and computation cost (75%) while maintaining a high transmission rate (99%). This approach enables the development of high-speed UVLC systems capable of processing data online, thereby advancing state-of-the-art underwater communication.
Self-Supervised Wavelet-Based Attention Network for Semantic Segmentation of MRI Brain Tumor
To determine the appropriate treatment plan for patients, radiologists must reliably detect brain tumors. Despite the fact that manual segmentation involves a great deal of knowledge and ability, it may sometimes be inaccurate. By evaluating the size, location, structure, and grade of the tumor, automatic tumor segmentation in MRI images aids in a more thorough analysis of pathological conditions. Due to the intensity differences in MRI images, gliomas may spread out, have low contrast, and are therefore difficult to detect. As a result, segmenting brain tumors is a challenging process. In the past, several methods for segmenting brain tumors in MRI scans were created. However, because of their susceptibility to noise and distortions, the usefulness of these approaches is limited. Self-Supervised Wavele- based Attention Network (SSW-AN), a new attention module with adjustable self-supervised activation functions and dynamic weights, is what we suggest as a way to collect global context information. In particular, this network’s input and labels are made up of four parameters produced by the two-dimensional (2D) Wavelet transform, which makes the training process simpler by neatly segmenting the data into low-frequency and high-frequency channels. To be more precise, we make use of the channel attention and spatial attention modules of the self-supervised attention block (SSAB). As a result, this method may more easily zero in on crucial underlying channels and spatial patterns. The suggested SSW-AN has been shown to outperform the current state-of-the-art algorithms in medical image segmentation tasks, with more accuracy, more promising dependability, and less unnecessary redundancy.
Detection and Mitigation of IoT-Based Attacks Using SNMP and Moving Target Defense Techniques
This paper proposes a solution for ensuring the security of IoT devices in the cloud environment by protecting against distributed denial-of-service (DDoS) and false data injection attacks. The proposed solution is based on the integration of simple network management protocol (SNMP), Kullback–Leibler distance (KLD), access control rules (ACL), and moving target defense (MTD) techniques. The SNMP and KLD techniques are used to detect DDoS and false data sharing attacks, while the ACL and MTD techniques are applied to mitigate these attacks by hardening the target and reducing the attack surface. The effectiveness of the proposed framework is validated through experimental simulations on the Amazon Web Service (AWS) platform, which shows a significant reduction in attack probabilities and delays. The integration of IoT and cloud technologies is a powerful combination that can deliver customized and critical solutions to major business vendors. However, ensuring the confidentiality and security of data among IoT devices, storage, and access to the cloud is crucial to maintaining trust among internet users. This paper demonstrates the importance of implementing robust security measures to protect IoT devices in the cloud environment and highlights the potential of the proposed solution in protecting against DDoS and false data injection attacks.
The PID and 2DOF control of the integral system - influence of the 2DOF parameters and practical implementation
The article deals with the issue of using the Two Degree of Freedom (2DOF) PID controller to control an integral system and investigates by the simulation and experimental measurement what influence it has on the course of the control process compared to standard PID controller. The controlled plant is represented by the DC electric motor with worm gear and its output shaft rotation angle. The article studies the effect of the added parameters of the 2DOF controller on the dynamics of the closed-loop control. The influence of these parameters is then evaluated using the quality of feedback control criteria ITAE. The paper studies how the overshoot of the controlled variable during the setpoint step is eliminated using 2DOF control theory. The overshoot is caused due to an aggressive tuning of the controller to eliminate the disturbance effect on the controlled variable of the integral plants with dead zones.
Improving Power Quality in Grid-Connected Photovoltaic Systems: A Comparative Analysis of Model Predictive Control in Three-Level and Two-Level Inverters
The Single-Stage Grid-Connected Solar Photovoltaic (SSGC-SPV) topology has recently gained significant attention, as it offers promising advantages in terms of reducing overall losses and installation costs. We provide a comprehensive overview of the system components, which include the photovoltaic generator, the inverter, the Incremental Conductance Maximum Power Point Tracking (IC-MPPT) algorithm, and the PI regulator for DC bus voltage control. Moreover, this study presents detailed system configurations and control schemes for two types of inverters: 2L−3PVSI and 3L−3PNPC. In order to perform a comparative study between the two structures, we subjected them to the same irradiation profile using the same grid configuration. The Photovoltaic Array (PVA) irradiance is increased instantaneously, in 0.2 s, from 400 W/m2 to 800 W/m2, is kept at 800 W/m2 for 0.2 s, is then gradually decreased from 800 W/m2 to 200 W/m2 in 0.2 s, is then kept at 200 W/m2 for 0.2 s, and is then finally increased to 1000 W/m2 for 0.2 s. We explain the operational principles of these inverters and describe the various switching states involved in generating output voltages. To achieve effective control, we adopt the Finite Set–Model Predictive Control (FS-MPC) algorithm, due to the benefits of excellent dynamic responsiveness and precise current tracking abilities. This algorithm aims to minimise the cost function, while taking into account the dynamic behaviour of both the PV system and the inverter, including any associated delays. To evaluate the performance of the FS-MPC controller, we compare its application in the three-level inverter configuration with the two-level inverter setup. The DC bus voltage is maintained at 615 V using the PI controller. The objective is to achieve a Total Harmonic Distortion (THD) below 5%, with reference to the IEEE standards. The 2L−3PVSI inverter is above the threshold at an irradiance of 200 W/m2. The 3L−3PNPC inverter offers a great THD percentage, meaning improved quality of the power returned to the grid.
Scan Time Reduction of PLCs by Dedicated Parallel-Execution Multiple PID Controllers Using an FPGA
A programmable logic controller (PLC) executes a ladder diagram (LD) using input and output modules. An LD also has PID controller function blocks. It contains as many PID function blocks as the number of process parameters to be controlled. Adding more process parameters slows down PLC scan time. Process parameters are measured as analog signals. The analog input module in the PLC converts these analog signals into digital signals and forwards them to the PID controller as inputs. In this research work, a field-programmable gate array (FPGA)-based multiple PID controller is proposed to retain PLC scan time at a lower value. Concurrent execution of multiple PID controllers was assured by assigning separate FPGA hardware resources for every PID controller. Digital input to the PID controller is routed by the novel idea of analog to digital conversion (ADC), performed using a digital to analog converter (DAC), comparator, and FPGA. ADC combined with dedicated PID controller logic in an FPGA for every closed-loop control system confirms concurrent execution of multiple PID controllers. The time required to execute two closed-loop controls was identified as 18.96000004 ms. This design can be used either with or without a PLC.