This document describes using a snake optimization algorithm to tune the gains of an enhanced proportional-integral controller for congestion avoidance in a TCP/AQM system. The controller aims to maintain a stable and desired queue size without noise or transmission problems. A linearized model of the TCP/AQM system is presented. An enhanced PI controller combining nonlinear gain and original PI gains is proposed. The snake optimization algorithm is then used to tune the parameters of the enhanced PI controller to achieve optimal system performance and response. Simulation results are discussed showing the proposed controller provides a stable and robust behavior for congestion control.
Proportional-integral genetic algorithm controller for stability of TCP network IJECEIAES
ย
The life development and increase the number of internet users imposed an increase in data circulating on the internet network and then make the network more congestion. As a result of all this, some problems arose such as time delay in packets delivery, loss of packets, and exceed the buffer capacity for the middle routers. To overcome those problems, transmission control protocol and active queue management (TCP/AQM) have been used. AQM is the main approach used to control congestion and overcome those problems to improve network performance. This work proposes to use the proportional-integral (PI) controller with a genetic algorithm (GA) as an active queue manager for routers of the Internet. The simulation results show a good performance for managing the congestion with using proportionalintegral genetic algorithm (GA-PI) controller better than the PI controller.
Design and analysis of a model predictive controller for active queue managementISA Interchange
ย
Model predictive (MP) control as a novel active queue management (AQM) algorithm in dynamic computer networks is proposed. According to the predicted future queue length in the data buffer, early packets at the router are dropped reasonably by the MPAQM controller so that the queue length reaches the desired value with minimal tracking error. The drop probability is obtained by optimizing the network performance. Further, randomized algorithms are applied to analyze the robustness of MPAQM successfully, and also to provide the stability domain of systems with uncertain network parameters. The performances of MPAQM are evaluated through a series of simulations in NS2. The simulation results show that the MPAQM algorithm outperforms RED, PI, and REM algorithms in terms of stability, disturbance rejection, and robustness.
BBO tuned PI controller for the stability of TCP networksTELKOMNIKA JOURNAL
ย
The congestion is the most important issue that effects on the performance of data transition over internet networks. One of the important techniques developed is active queue management (AQM) that prepares an efficient congestion control by reducing losing packets, queue size, and energy consumption. Therefore, AQM technique deemed as a base of many congestion control algorithms schemes. This work suggested the using of proportional integral (PI) controller as an AQM and then use an optimized control system such as biogeography-based optimization (BBO) with PI controller as (BBO-PI). The optimal control (BBO-PI) is characterized by access to design and fine-tuning of defining the shapes of the optimal parameters of PI controller. The BBO algorithm was implemented by using the mathematical system model by M-file/Matlab and Simulink. The simulation results showed the best performance for the transmission control protocol (TCP) network when compared the system with using the PI controller and using optimal control (BBO-PI), the ratio of enhancing the system with using of BBO-PI better than using a PI controller only in terms of rising time is 1.11, settling time is 2.85 and overshooting is 85%. Therefore, the proposed method was very fast and required few iterations.
Comparison of the speedy estimate methods of the induction motorsTELKOMNIKA JOURNAL
ย
This paper deals with a novel method to achieve the effective performance of the extended Kalman filter (EKF) for the speedy estimate of an induction motor. The real coding genetic algorithm (GA) is used to optimize the components of the covariance matrix in the EKF, thus ensuring the stability and accuracy of the filter in the speed estimation. The advantage of the proposed method is less dependent on the parameters of the induction motor. The content includes the vector control model for induction motor, the speed estimation by modeling the reference frame-model reference adaptive system (RF-MRAS), the current based-model reference adaptive system (CB-MRAS), and the speed estimation with the EKF optimized by genetic algorithm. Simulative studies on the field-oriented controller (FOC) with different operating conditions are performed in Matlab Simulink when the rotor resistance changes in the current speed estimation methods. The simulation results demonstrate the efficiency of the proposed GA-EKF filter compared with other speed estimation methods of induction motors.
Fuzzy type 1 PID controllers design for TCP/AQM wireless networksnooriasukmaningtyas
ย
This document discusses the design of fuzzy type 1 PID controllers for TCP/AQM wireless networks. It begins by describing the TCP/AQM network model and topology used in the study. It then discusses PID controllers and fuzzy logic controllers (FLCs), explaining how the proposed FLC improves upon traditional PID controllers for congestion control in TCP/IP networks. The document presents simulation results comparing the performance of the PID controller and FLC-PID controller. The results show that the FLC-PID controller achieves faster rise and settling times and less overshoot than the PID controller alone. This demonstrates that the proposed FLC approach can better control congestion and improve network performance.
This work proposes an optimization algorithm to control speed of a permanent magnet synchronous motor (PMSM) during starting and speed reversal of motor, as well as during load disturbance conditions. The objective is to minimize the integral absolute control error of the PMSM shaft speed to achieve fast and accurate speed response under load disturbance and speed reversal conditions. The maximum overshoot, peak time, settling time and rise time of the motor is also minimized to obtain efficient transient speed response. Optimum speed control of PMSM is obtained with the aid of a PID speed controller. Modified Particle Swarm Optimization (MPSO) and Ant Colony Optimization (ACO) techniques has been employed for tuning of the PID speed controller, to determine its gain coefficients (proportional, integral and derivative). Simulation results demonstrate that with use of MPSO and ACO techniques improved control performance of PMSM can be achieved in comparison to the classical Ziegler-Nichols (Z-N) method of PID tuning.
Metamodel-based Optimization of a PID Controller Parameters for a Coupled-tan...TELKOMNIKA JOURNAL
ย
Liquid flow and level control are essential requirements in various industries, such as paper
manufacturing, petrochemical industries, waste management, and others. Controlling the liquids flow and
levels in such industries is challenging due to the existence of nonlinearity and modeling uncertainties of
the plants. This paper presents a method to control the liquid level in a second tank of a coupled-tank plant
through variable manipulation of a water pump in the first tank. The optimum controller parameters of this
plant are calculated using radial basis function neural network metamodel. A time-varying nonlinear
dynamic model is developed and the corresponding linearized perturbation models are derived from the
nonlinear model. The performance of the developed optimized controller using metamodeling is compared
with the original large space design. In addition, linearized perturbation models are derived from the
nonlinear dynamic model with time-varying parameters.
Quadratic exponential random early detection: a new enhanced random early de...IJECEIAES
ย
Network congestion is still a problem on the internet. The random early detection (RED) algorithm being the most notable and widely implemented congestion algorithm in routers faces the problems of queue instability and large delay arising from the presence of an ineffectual singular linear packet dropping function. This research article presents a refinement to RED, named quadratic exponential random early detection (QERED) algorithm, which exploits the advantages of two drop functions, namely quadratic and exponential in order to enhance the performance of RED algorithm. ns-3 simulation studies using various traffic load conditions to assess and benchmark the effectiveness of QERED with two improved variants of RED affirmed that QERED offers a better performance in terms of average queue size and delay metrics at various network scenarios. Fortunately, to replace/upgrade the implementation for RED algorithm with QEREDโs in routers will require minimal effort due to the fact that nothing more besides the packet dropping probability profile got to be adjusted.
Proportional-integral genetic algorithm controller for stability of TCP network IJECEIAES
ย
The life development and increase the number of internet users imposed an increase in data circulating on the internet network and then make the network more congestion. As a result of all this, some problems arose such as time delay in packets delivery, loss of packets, and exceed the buffer capacity for the middle routers. To overcome those problems, transmission control protocol and active queue management (TCP/AQM) have been used. AQM is the main approach used to control congestion and overcome those problems to improve network performance. This work proposes to use the proportional-integral (PI) controller with a genetic algorithm (GA) as an active queue manager for routers of the Internet. The simulation results show a good performance for managing the congestion with using proportionalintegral genetic algorithm (GA-PI) controller better than the PI controller.
Design and analysis of a model predictive controller for active queue managementISA Interchange
ย
Model predictive (MP) control as a novel active queue management (AQM) algorithm in dynamic computer networks is proposed. According to the predicted future queue length in the data buffer, early packets at the router are dropped reasonably by the MPAQM controller so that the queue length reaches the desired value with minimal tracking error. The drop probability is obtained by optimizing the network performance. Further, randomized algorithms are applied to analyze the robustness of MPAQM successfully, and also to provide the stability domain of systems with uncertain network parameters. The performances of MPAQM are evaluated through a series of simulations in NS2. The simulation results show that the MPAQM algorithm outperforms RED, PI, and REM algorithms in terms of stability, disturbance rejection, and robustness.
BBO tuned PI controller for the stability of TCP networksTELKOMNIKA JOURNAL
ย
The congestion is the most important issue that effects on the performance of data transition over internet networks. One of the important techniques developed is active queue management (AQM) that prepares an efficient congestion control by reducing losing packets, queue size, and energy consumption. Therefore, AQM technique deemed as a base of many congestion control algorithms schemes. This work suggested the using of proportional integral (PI) controller as an AQM and then use an optimized control system such as biogeography-based optimization (BBO) with PI controller as (BBO-PI). The optimal control (BBO-PI) is characterized by access to design and fine-tuning of defining the shapes of the optimal parameters of PI controller. The BBO algorithm was implemented by using the mathematical system model by M-file/Matlab and Simulink. The simulation results showed the best performance for the transmission control protocol (TCP) network when compared the system with using the PI controller and using optimal control (BBO-PI), the ratio of enhancing the system with using of BBO-PI better than using a PI controller only in terms of rising time is 1.11, settling time is 2.85 and overshooting is 85%. Therefore, the proposed method was very fast and required few iterations.
Comparison of the speedy estimate methods of the induction motorsTELKOMNIKA JOURNAL
ย
This paper deals with a novel method to achieve the effective performance of the extended Kalman filter (EKF) for the speedy estimate of an induction motor. The real coding genetic algorithm (GA) is used to optimize the components of the covariance matrix in the EKF, thus ensuring the stability and accuracy of the filter in the speed estimation. The advantage of the proposed method is less dependent on the parameters of the induction motor. The content includes the vector control model for induction motor, the speed estimation by modeling the reference frame-model reference adaptive system (RF-MRAS), the current based-model reference adaptive system (CB-MRAS), and the speed estimation with the EKF optimized by genetic algorithm. Simulative studies on the field-oriented controller (FOC) with different operating conditions are performed in Matlab Simulink when the rotor resistance changes in the current speed estimation methods. The simulation results demonstrate the efficiency of the proposed GA-EKF filter compared with other speed estimation methods of induction motors.
Fuzzy type 1 PID controllers design for TCP/AQM wireless networksnooriasukmaningtyas
ย
This document discusses the design of fuzzy type 1 PID controllers for TCP/AQM wireless networks. It begins by describing the TCP/AQM network model and topology used in the study. It then discusses PID controllers and fuzzy logic controllers (FLCs), explaining how the proposed FLC improves upon traditional PID controllers for congestion control in TCP/IP networks. The document presents simulation results comparing the performance of the PID controller and FLC-PID controller. The results show that the FLC-PID controller achieves faster rise and settling times and less overshoot than the PID controller alone. This demonstrates that the proposed FLC approach can better control congestion and improve network performance.
This work proposes an optimization algorithm to control speed of a permanent magnet synchronous motor (PMSM) during starting and speed reversal of motor, as well as during load disturbance conditions. The objective is to minimize the integral absolute control error of the PMSM shaft speed to achieve fast and accurate speed response under load disturbance and speed reversal conditions. The maximum overshoot, peak time, settling time and rise time of the motor is also minimized to obtain efficient transient speed response. Optimum speed control of PMSM is obtained with the aid of a PID speed controller. Modified Particle Swarm Optimization (MPSO) and Ant Colony Optimization (ACO) techniques has been employed for tuning of the PID speed controller, to determine its gain coefficients (proportional, integral and derivative). Simulation results demonstrate that with use of MPSO and ACO techniques improved control performance of PMSM can be achieved in comparison to the classical Ziegler-Nichols (Z-N) method of PID tuning.
Metamodel-based Optimization of a PID Controller Parameters for a Coupled-tan...TELKOMNIKA JOURNAL
ย
Liquid flow and level control are essential requirements in various industries, such as paper
manufacturing, petrochemical industries, waste management, and others. Controlling the liquids flow and
levels in such industries is challenging due to the existence of nonlinearity and modeling uncertainties of
the plants. This paper presents a method to control the liquid level in a second tank of a coupled-tank plant
through variable manipulation of a water pump in the first tank. The optimum controller parameters of this
plant are calculated using radial basis function neural network metamodel. A time-varying nonlinear
dynamic model is developed and the corresponding linearized perturbation models are derived from the
nonlinear model. The performance of the developed optimized controller using metamodeling is compared
with the original large space design. In addition, linearized perturbation models are derived from the
nonlinear dynamic model with time-varying parameters.
Quadratic exponential random early detection: a new enhanced random early de...IJECEIAES
ย
Network congestion is still a problem on the internet. The random early detection (RED) algorithm being the most notable and widely implemented congestion algorithm in routers faces the problems of queue instability and large delay arising from the presence of an ineffectual singular linear packet dropping function. This research article presents a refinement to RED, named quadratic exponential random early detection (QERED) algorithm, which exploits the advantages of two drop functions, namely quadratic and exponential in order to enhance the performance of RED algorithm. ns-3 simulation studies using various traffic load conditions to assess and benchmark the effectiveness of QERED with two improved variants of RED affirmed that QERED offers a better performance in terms of average queue size and delay metrics at various network scenarios. Fortunately, to replace/upgrade the implementation for RED algorithm with QEREDโs in routers will require minimal effort due to the fact that nothing more besides the packet dropping probability profile got to be adjusted.
Model predictive control (MPC) is an advanced contr
ol algorithm that has been very successful in the
control industries due to its capability of handlin
g multi input multi output (MIMO) systems with phys
ical
constraints. In MPC, the control action are obtaine
d by solving a constrained optimization problem at
every sample interval to minimize the difference be
tween the predicted outputs and the reference value
through the using of minimum control energy and sat
isfying the constraints of the physical system.
Quadratic programing (QP) problem is solved using Q
PKWIK method which improves the active set
method. The system architecture and design for the
implementation of online MPC on the FPGA is taken
into consideration in this paper to control a DC mo
tor. This implementation is completed using Spartan
6
Nexys3 FPGA chip using simulation environment (EDK
tool) and the comparison between MPC and PID
controller is also established.
In this paper, the optimal control problem of a nonlinear robot manipulator in absence of holonomic constraint force based on the point of view of adaptive dynamic programming (ADP) is presented. To begin with, the manipulator was intervened by exact linearization. Then the framework of ADP and Robust Integral of the Sign of the Error (RISE) was developed. The ADP algorithm employs Neural Network technique to tune simultaneously the actor-critic network to approximate the control policy and the cost function, respectively. The convergence of weight as well as position tracking control problem was considered by theoretical analysis. Finally, the numerical example is considered to illustrate the effectiveness of proposed control design.
This document summarizes an Active Congestion Control (ACC) mechanism that uses active networking technology to make feedback congestion control more responsive to network congestion. ACC includes programs in data packets that allow routers to react to congestion without incurring round trip delay. When congestion is detected, the congested router calculates and sends a new congestion control state to endpoints to synchronize distributed states. Simulations show ACC TCP can achieve up to 18% higher throughput than standard TCP under bursty traffic conditions by reacting more quickly to congestion. ACC and TCP perform comparably under stable network conditions.
Sample-by-sample and block-adaptive robust constant modulus-based algorithmsDr. Ayman Elnashar, PhD
ย
In this study, a robust sample-by-sample linearly constrained constant modulus algorithm (LCCMA) and a robust adaptive block-Shanno constant modulus algorithm (BSCMA) are developed. The well-established quadratic inequality constraint approach is exploited to add robustness to the developed algorithms. The LCCMA algorithm is implemented using a fast steepest descent adaptive algorithm, whereas the BSCMA algorithm is realised using a modified Newtonโs algorithm without the inverse of Hessian matrix estimation. The developed algorithms are exercised to cancel the multiple access interference in a loaded direct sequence code division multiple access (DS/CDMA) system. Simulations are presented in a rich multipath environment with a severe near-far effect to evaluate the robustness of the proposed DS/CDMA detectors. Finally, a comprehensive comparative analysis between the sample-by-sample and block-adaptive constant modulus-based detectors is presented. It has been demonstrated that the developed robust BSCMA detector offers rapid convergence speed and very low computational complexity, whereas the developed robust LCCMA detector engenders about 5 dB improvement in the output signal-to-interference-plus-noise ratio over the BSCMA detector.
A New Approach for Design of Model Matching Controllers for Time Delay System...IJERA Editor
ย
Modeling of physical systems usually results in complex high order dynamic representation. The simulation and design of controller for higher order system is a difficult problem. Normally the cost and complexity of the controller increases with the system order. Hence it is desirable to approximate these models to reduced order model such that these lower order models preserves all salient features of higher order model. Lower order models simplify the understanding of the original higher order system. Modern controller design methods such as Model Matching Technique, LQG produce controllers of order at least equal to that of the plant, usually higher order. These control laws are may be too complex with regards to practical implementation and simpler designs are then sought. For this purpose, one can either reduce the order the plant model prior to controller design, or reduce the controller in the final stage, or both. In the present work, a controller is designed such that the closed loop system which includes a delay response(s) matches with those of the chosen model with same time delay as close as possible. Based on desired model, a controller(of higher order) is designed using model matching method and is approximated to a lower order one using Approximate Generalized Time Moments (AGTM) / Approximate Generalized Markov Moments (AGMM) matching technique and Optimal Pade Approximation technique. Genetic Algorithm (GA) optimization technique is used to obtain the expansion points one which yields similar response as that of model, minimizing the error between the response of the model and that of designed closed loop system.
Stability by assigning structures by applying the multivariable subspace iden...TELKOMNIKA JOURNAL
ย
In this paper, a controller for a doubly fed induction generator (DFIG) connected to a wind system is proposed. This control assigning its own structures as an optimal control method, the electric model in the DFIG state space is also shown, for which it is expected to estimate a linear model through the subspace technique and thus to design the controller. It will be possible to show that a structure assignment controller is undoubtedly a good option for the control of multivariable systems. The results of the output signals will be analyzed when applying the controller, assigning their own structures, which will allow us to observe that the response and disturbance times are below two tenths of a second.
The document describes a proposed Fuzzy-AQM algorithm for congestion control in wireless ad-hoc networks. It begins by summarizing common Active Queue Management (AQM) policies and their issues. It then discusses congestion in ad-hoc networks and how the proposed Fuzzy-AQM algorithm uses fuzzy logic rules based on queue size and neighbor density to dynamically calculate packet drop probability, aiming to improve network performance. Simulation results showed the effectiveness of Fuzzy-AQM for congestion detection and avoidance.
Model Validation and Control of an In-Wheel DC Motor Prototype for Hybrid El...Scientific Review SR
ย
In this paper, a mathematical model and a controller for a DC motor are developed for the
construction of an in-wheel motor. In-wheel motors can be used in hybrid electric vehicles to provide traction
force of front or rear wheels. The model identification is achieved using a simple and low cost data acquisition
system. An Arduino Uno embedded board system is used to collect data from sensors to a computer and for
control purposes. Data processing is performed using Matlab/Simulink. Validations of the devel oped
mathematical model and controller performance are carried out by comparing simulation and experimental results.
The results obtained show that the mathematical model is accurate enough to assist in speed controller design and
implementation.
Newton-raphson method to solve systems of non-linear equations in VANET perfo...journalBEEI
ย
This document discusses using the Newton-Raphson method to solve systems of non-linear equations to optimize VANET performance. It selects three MAC protocol parameters - transmission power, bitrate, and contention window - as variables. Simulations are run with different values of these parameters. The results for energy consumption, packet delivery ratio, and delay are used to derive three non-linear equations. The Newton-Raphson method is then applied to find the coefficients a, b, and c to optimize the objective function of minimizing energy*delay/PDR. Tables 4-6 show the objective function results for different parameter configurations.
Hysteresis controllers (HC) are used to limit the torque and flux in the control band in conventional configuration of direct torque control (DTC) while in the space vector pulse width modulated (SVPWM) DTC, the HC are switched to PI or PID controllers. This paper presents a modern approach for the speed control applied on a DTC of a permanent magnet synchronous motor (PMSM) using the Cuckoo Search Optimization (CSO) algorithm in order to optimize the PI speed controller parameters of the outer loop and PID flux and torque controllers of the inner loop. The system is tested at no load and with a step change in load. The performance of the controllers is presented and the results of simulation indicate a very rapid dynamic response and the system achieves the steady state (SS.) in a very short time. Also it shows that both the SS. and dynamic performances are improved by applying of the CSO algorithm. The proposed DTC simulation model of the PMSM is presented using MATLAB / SIMULINK and capable of simulating both the steady-state and dynamic response. The CSO results are compared with another control strategy that incorporates fuzzy logic controller (FLC) with DTC.
Spectral opportunity selection based on the hybrid algorithm AHP-ELECTRETELKOMNIKA JOURNAL
ย
Due to an ever-growing demand for spectrum and the fast-paced developmentof wireless applications, technologies such as cognitive radio enablethe efficient use of the spectrum. The objective of the present article is todesign an algorithm capable of choosing the best channel for data transmission.It uses quantitative methods that can modify behavior by changing qualityparameters in the channel. To achieve this task, a hybrid decision-makingalgorithm is designed that combinesanalytical hierarchy process(AHP)algorithms and adjusts the weights of each channel parameter, using a prioritytable. TheElimination Et Choix Tranduisant La Realitรฉ(ELECTRE)algorithm processes the information from each channel through a weightmatrix and then delivers the most favorable result for the transmitted data. Theresults reveal that the hybrid AHP-ELECTRE algorithm has a suitableperformance, which improves the throughput rate by 14% compared to similaralternatives.
Critical clearing time estimation of multi-machine power system transient st...IJECEIAES
ย
This document presents a fuzzy logic method for estimating the critical clearing time (CCT) of faults in multi-machine power systems. The method involves a two-step fuzzy logic algorithm: 1) Calculate the time increment (ฮt) based on maximum angle deviation (ฮดmax) as input, 2) Classify system stability based on mechanical input power (Pm) and average acceleration (Aav) as inputs. The fuzzy logic method is tested on IEEE 9-bus and 39-bus systems and shows accuracy within 5% of time domain simulation results, while reducing computation time by about half. Tables compare estimated CCT and computation time between the two methods for different fault locations.
Energy efficient resources allocations for wireless communication systemsTELKOMNIKA JOURNAL
ย
The energy consumption level of the telecommunication process has become a new
consideration in resource management scheme. It is becoming a new parameter in the resource
management scheme besides throughput, spectral efficiency, and fairness. This work proposes a power
control scheme and user grouping method to keep the rational energy consumption level of the resource
management scheme. Inverse water-filling power allocation is a power allocation scheme that optimizes
the energy efficiency by giving the power to the user which have good channel conditions. The user
grouping method becomes the solution for carrier aggregation (CA) scheme that prevents edge cell user
get the resources from the high-frequency carrier. This can prevent energy wastage in the transmission
process. This power control scheme and user grouping method can optimize the spectral and energy
efficiency without increasing the time complexity of the system.
Time-varying sliding mode controller for heat exchanger with dragonfly algor...IJECEIAES
ย
This article proposes the design of a sliding mode controller with a time-varying sliding surface for the plate heat exchanger. A time-varying sliding mode controller (TVSMC) combines the benefit of the control systemโs robustness and convergence rate. Using Lyapunov stability theory, the stability of the designed controller is proved. In addition, the controller parameters of the designed controller are specified optimally via the dragonfly algorithm (DA). The input constraintโs effect is considered in the controller design process by applying the concept of the auxiliary system. The bounded disturbances are applied to investigate the robustness of the proposed techniques. Moreover, the quasi-sliding mode controller (QSMC) is developed as a benchmark to evaluate the convergence behavior of the proposed TVSMC technique. The simulation results demonstrate the proposed TVSMC with the optimal parameters provided by the DA algorithm (TVSMC+DA) can regulate the temperature to the desired level under bounded disturbances. When compared to the QSMC method, the TVSMC+DA performs significantly faster convergence speed and greater reduction in chattering occurrence. The results clearly indicate that the proposed controller can enhance convergence properties while being robust to disturbances.
Compensation of Data-Loss in Attitude Control of Spacecraft Systems rinzindorjej
ย
In this paper, a comprehensive comparison of two robust estimation techniques namely, compensated closed-loop Kalman filtering and open-loop Kalman filtering is presented. A common problem of data loss in a real-time control system is investigated through these two schemes. The open-loop scheme, dealing with the data-loss, suffers from several shortcomings. These shortcomings are overcome using compensated scheme, where an accommodating observation signal is obtained through linear prediction technique -- a closed-loop setting and is adopted at a posteriori update step. The calculation and employment of accommodating observation signal causes computational complexity. For simulation purpose, a linear time invariant spacecraft model is however, obtained from the nonlinear spacecraft attitude dynamics through linearization at nonzero equilibrium points -- achieved off-line through Levenberg-Marguardt iterative scheme. Attempt has been made to analyze the selected example from most of the perspectives in order to display the performance of the two techniques.
A hybrid of the selected mapping and partial transmit sequence approaches for...CSITiaesprime
ย
The orthogonal frequency division multiplexing (OFDM)-4G and 5G filter
technology suffer a drawback that represents the direction of the peak
average to power ratio (PAPR) in orthogonal frequency division
multiplexing due to the nonlinear nature of the transmitter. There are a lot of
traditional and hybrid methods of these traditional methods to reduce the
harmful high PAPR value. Newly, several new hybrid methods have been
adopted to reduce PAPR but it faces an increasing level of computational
complexity in the system. In this paper, two important and effective
conventional methods for reducing PAPR are studied, analyzed, and
investigated for the hybrid pathway which is the incorporation of selective
mapping (SLM) method and partial transport sequencing (PTS) method,
which achieve increased efficiency of PAPR reduction while computing the
computational complexity of each method. The method depends and
balances with computational complexity. The search is based on multi-carrier connections such as multi carrier-code division multiple access (MC-CDMA) and OFDM.
Comparative analysis of the performance of various active queue management te...IJECEIAES
ย
This paper demonstrates the robustness of active queue management techniques to varying load, link capacity and propagation delay in a wireless environment. The performances of four standard controllers used in Transmission Control Protocol/Active Queue Management (TCP/AQM) systems were compared. The active queue management controllers were the Fixed-Parameter Proportional Integral (PI), Random Early Detection (RED), Self-Tuning Regulator (STR) and the Model Predictive Control (MPC). The robustness of the congestion control algorithm of each technique was documented by simulating the varying conditions using MATLABยฎ and Simulinkยฎ software. From the results obtained, the MPC controller gives the best result in terms of response time and controllability in a wireless network with varying link capacity and propagation delay. Thus, the MPC controller is the best bet when adaptive algorithms are to be employed in a wireless network environment. The MPC controller can also be recommended for heterogeneous networks where the network load cannot be estimated.
This document summarizes the simulation steps for investigating the performance of three multi-carrier code division multiple access (MC-CDMA) techniques: conventional MC-CDMA, orthogonal wavelet packet based MC-CDMA (WP-MC-CDMA), and Huang Hilbert Transformation (HHT) based MC-CDMA. The steps include designing the three systems, simulating them with different modulation techniques under fading channels, and comparing their bit error rate performance. Numerical and simulation results are presented to validate the proposed schemes.
This document summarizes the simulation steps for investigating the performance of three multi-carrier code division multiple access (MC-CDMA) techniques: conventional MC-CDMA, orthogonal wavelet packet based MC-CDMA (WP-MC-CDMA), and Huang Hilbert Transformation (HHT) based MC-CDMA. The steps include designing the three systems, simulating them with different modulation techniques under fading channels, and comparing their bit error rate performance. Numerical and simulation results are presented to validate the proposed schemes.
DESIGN OF DELAY COMPUTATION METHOD FOR CYCLOTOMIC FAST FOURIER TRANSFORMsipij
ย
In this paper the Delay Computation method for Common Sub expression Elimination algorithm is being implemented on Cyclotomic Fast Fourier Transform. The Common Sub Expression Elimination algorithm is combined with the delay computing method and is known as Gate Level Delay Computation with Common Sub expression Elimination Algorithm. Common sub expression elimination is effective
optimization method used to reduce adders in cyclotomic Fourier transform. The delay computing method is based on delay matrix and suitable for implementation with computers. The Gate level delay computation method is used to find critical path delay and it is analyzed on various finite field elements. The presented algorithm is established through a case study in Cyclotomic Fast Fourier Transform over finite field. If Cyclotomic Fast Fourier Transform is implemented directly then the system will have high additive complexities. So by using GLDC-CSE algorithm on cyclotomic fast Fourier transform, the additive
complexities will be reduced and also the area and area delay product will be reduced.
Amazon products reviews classification based on machine learning, deep learni...TELKOMNIKA JOURNAL
ย
In recent times, the trend of online shopping through e-commerce stores and websites has grown to a huge extent. Whenever a product is purchased on an e-commerce platform, people leave their reviews about the product. These reviews are very helpful for the store owners and the productโs manufacturers for the betterment of their work process as well as product quality. An automated system is proposed in this work that operates on two datasets D1 and D2 obtained from Amazon. After certain preprocessing steps, N-gram and word embedding-based features are extracted using term frequency-inverse document frequency (TF-IDF), bag of words (BoW) and global vectors (GloVe), and Word2vec, respectively. Four machine learning (ML) models support vector machines (SVM), logistic regression (RF), logistic regression (LR), multinomial Naรฏve Bayes (MNB), two deep learning (DL) models convolutional neural network (CNN), long-short term memory (LSTM), and standalone bidirectional encoder representations (BERT) are used to classify reviews as either positive or negative. The results obtained by the standard ML, DL models and BERT are evaluated using certain performance evaluation measures. BERT turns out to be the best-performing model in the case of D1 with an accuracy of 90% on features derived by word embedding models while the CNN provides the best accuracy of 97% upon word embedding features in the case of D2. The proposed model shows better overall performance on D2 as compared to D1.
Design, simulation, and analysis of microstrip patch antenna for wireless app...TELKOMNIKA JOURNAL
ย
In this study, a microstrip patch antenna that works at 3.6 GHz was built and tested to see how well it works. In this work, Rogers RT/Duroid 5880 has been used as the substrate material, with a dielectric permittivity of 2.2 and a thickness of 0.3451 mm; it serves as the base for the examined antenna. The computer simulation technology (CST) studio suite is utilized to show the recommended antenna design. The goal of this study was to get a more extensive transmission capacity, a lower voltage standing wave ratio (VSWR), and a lower return loss, but the main goal was to get a higher gain, directivity, and efficiency. After simulation, the return loss, gain, directivity, bandwidth, and efficiency of the supplied antenna are found to be -17.626 dB, 9.671 dBi, 9.924 dBi, 0.2 GHz, and 97.45%, respectively. Besides, the recreation uncovered that the transfer speed side-lobe level at phi was much better than those of the earlier works, at -28.8 dB, respectively. Thus, it makes a solid contender for remote innovation and more robust communication.
Weitere รคhnliche Inhalte
รhnlich wie Design and simulation an optimal enhanced PI controller for congestion avoidance in TCP/AQM system
Model predictive control (MPC) is an advanced contr
ol algorithm that has been very successful in the
control industries due to its capability of handlin
g multi input multi output (MIMO) systems with phys
ical
constraints. In MPC, the control action are obtaine
d by solving a constrained optimization problem at
every sample interval to minimize the difference be
tween the predicted outputs and the reference value
through the using of minimum control energy and sat
isfying the constraints of the physical system.
Quadratic programing (QP) problem is solved using Q
PKWIK method which improves the active set
method. The system architecture and design for the
implementation of online MPC on the FPGA is taken
into consideration in this paper to control a DC mo
tor. This implementation is completed using Spartan
6
Nexys3 FPGA chip using simulation environment (EDK
tool) and the comparison between MPC and PID
controller is also established.
In this paper, the optimal control problem of a nonlinear robot manipulator in absence of holonomic constraint force based on the point of view of adaptive dynamic programming (ADP) is presented. To begin with, the manipulator was intervened by exact linearization. Then the framework of ADP and Robust Integral of the Sign of the Error (RISE) was developed. The ADP algorithm employs Neural Network technique to tune simultaneously the actor-critic network to approximate the control policy and the cost function, respectively. The convergence of weight as well as position tracking control problem was considered by theoretical analysis. Finally, the numerical example is considered to illustrate the effectiveness of proposed control design.
This document summarizes an Active Congestion Control (ACC) mechanism that uses active networking technology to make feedback congestion control more responsive to network congestion. ACC includes programs in data packets that allow routers to react to congestion without incurring round trip delay. When congestion is detected, the congested router calculates and sends a new congestion control state to endpoints to synchronize distributed states. Simulations show ACC TCP can achieve up to 18% higher throughput than standard TCP under bursty traffic conditions by reacting more quickly to congestion. ACC and TCP perform comparably under stable network conditions.
Sample-by-sample and block-adaptive robust constant modulus-based algorithmsDr. Ayman Elnashar, PhD
ย
In this study, a robust sample-by-sample linearly constrained constant modulus algorithm (LCCMA) and a robust adaptive block-Shanno constant modulus algorithm (BSCMA) are developed. The well-established quadratic inequality constraint approach is exploited to add robustness to the developed algorithms. The LCCMA algorithm is implemented using a fast steepest descent adaptive algorithm, whereas the BSCMA algorithm is realised using a modified Newtonโs algorithm without the inverse of Hessian matrix estimation. The developed algorithms are exercised to cancel the multiple access interference in a loaded direct sequence code division multiple access (DS/CDMA) system. Simulations are presented in a rich multipath environment with a severe near-far effect to evaluate the robustness of the proposed DS/CDMA detectors. Finally, a comprehensive comparative analysis between the sample-by-sample and block-adaptive constant modulus-based detectors is presented. It has been demonstrated that the developed robust BSCMA detector offers rapid convergence speed and very low computational complexity, whereas the developed robust LCCMA detector engenders about 5 dB improvement in the output signal-to-interference-plus-noise ratio over the BSCMA detector.
A New Approach for Design of Model Matching Controllers for Time Delay System...IJERA Editor
ย
Modeling of physical systems usually results in complex high order dynamic representation. The simulation and design of controller for higher order system is a difficult problem. Normally the cost and complexity of the controller increases with the system order. Hence it is desirable to approximate these models to reduced order model such that these lower order models preserves all salient features of higher order model. Lower order models simplify the understanding of the original higher order system. Modern controller design methods such as Model Matching Technique, LQG produce controllers of order at least equal to that of the plant, usually higher order. These control laws are may be too complex with regards to practical implementation and simpler designs are then sought. For this purpose, one can either reduce the order the plant model prior to controller design, or reduce the controller in the final stage, or both. In the present work, a controller is designed such that the closed loop system which includes a delay response(s) matches with those of the chosen model with same time delay as close as possible. Based on desired model, a controller(of higher order) is designed using model matching method and is approximated to a lower order one using Approximate Generalized Time Moments (AGTM) / Approximate Generalized Markov Moments (AGMM) matching technique and Optimal Pade Approximation technique. Genetic Algorithm (GA) optimization technique is used to obtain the expansion points one which yields similar response as that of model, minimizing the error between the response of the model and that of designed closed loop system.
Stability by assigning structures by applying the multivariable subspace iden...TELKOMNIKA JOURNAL
ย
In this paper, a controller for a doubly fed induction generator (DFIG) connected to a wind system is proposed. This control assigning its own structures as an optimal control method, the electric model in the DFIG state space is also shown, for which it is expected to estimate a linear model through the subspace technique and thus to design the controller. It will be possible to show that a structure assignment controller is undoubtedly a good option for the control of multivariable systems. The results of the output signals will be analyzed when applying the controller, assigning their own structures, which will allow us to observe that the response and disturbance times are below two tenths of a second.
The document describes a proposed Fuzzy-AQM algorithm for congestion control in wireless ad-hoc networks. It begins by summarizing common Active Queue Management (AQM) policies and their issues. It then discusses congestion in ad-hoc networks and how the proposed Fuzzy-AQM algorithm uses fuzzy logic rules based on queue size and neighbor density to dynamically calculate packet drop probability, aiming to improve network performance. Simulation results showed the effectiveness of Fuzzy-AQM for congestion detection and avoidance.
Model Validation and Control of an In-Wheel DC Motor Prototype for Hybrid El...Scientific Review SR
ย
In this paper, a mathematical model and a controller for a DC motor are developed for the
construction of an in-wheel motor. In-wheel motors can be used in hybrid electric vehicles to provide traction
force of front or rear wheels. The model identification is achieved using a simple and low cost data acquisition
system. An Arduino Uno embedded board system is used to collect data from sensors to a computer and for
control purposes. Data processing is performed using Matlab/Simulink. Validations of the devel oped
mathematical model and controller performance are carried out by comparing simulation and experimental results.
The results obtained show that the mathematical model is accurate enough to assist in speed controller design and
implementation.
Newton-raphson method to solve systems of non-linear equations in VANET perfo...journalBEEI
ย
This document discusses using the Newton-Raphson method to solve systems of non-linear equations to optimize VANET performance. It selects three MAC protocol parameters - transmission power, bitrate, and contention window - as variables. Simulations are run with different values of these parameters. The results for energy consumption, packet delivery ratio, and delay are used to derive three non-linear equations. The Newton-Raphson method is then applied to find the coefficients a, b, and c to optimize the objective function of minimizing energy*delay/PDR. Tables 4-6 show the objective function results for different parameter configurations.
Hysteresis controllers (HC) are used to limit the torque and flux in the control band in conventional configuration of direct torque control (DTC) while in the space vector pulse width modulated (SVPWM) DTC, the HC are switched to PI or PID controllers. This paper presents a modern approach for the speed control applied on a DTC of a permanent magnet synchronous motor (PMSM) using the Cuckoo Search Optimization (CSO) algorithm in order to optimize the PI speed controller parameters of the outer loop and PID flux and torque controllers of the inner loop. The system is tested at no load and with a step change in load. The performance of the controllers is presented and the results of simulation indicate a very rapid dynamic response and the system achieves the steady state (SS.) in a very short time. Also it shows that both the SS. and dynamic performances are improved by applying of the CSO algorithm. The proposed DTC simulation model of the PMSM is presented using MATLAB / SIMULINK and capable of simulating both the steady-state and dynamic response. The CSO results are compared with another control strategy that incorporates fuzzy logic controller (FLC) with DTC.
Spectral opportunity selection based on the hybrid algorithm AHP-ELECTRETELKOMNIKA JOURNAL
ย
Due to an ever-growing demand for spectrum and the fast-paced developmentof wireless applications, technologies such as cognitive radio enablethe efficient use of the spectrum. The objective of the present article is todesign an algorithm capable of choosing the best channel for data transmission.It uses quantitative methods that can modify behavior by changing qualityparameters in the channel. To achieve this task, a hybrid decision-makingalgorithm is designed that combinesanalytical hierarchy process(AHP)algorithms and adjusts the weights of each channel parameter, using a prioritytable. TheElimination Et Choix Tranduisant La Realitรฉ(ELECTRE)algorithm processes the information from each channel through a weightmatrix and then delivers the most favorable result for the transmitted data. Theresults reveal that the hybrid AHP-ELECTRE algorithm has a suitableperformance, which improves the throughput rate by 14% compared to similaralternatives.
Critical clearing time estimation of multi-machine power system transient st...IJECEIAES
ย
This document presents a fuzzy logic method for estimating the critical clearing time (CCT) of faults in multi-machine power systems. The method involves a two-step fuzzy logic algorithm: 1) Calculate the time increment (ฮt) based on maximum angle deviation (ฮดmax) as input, 2) Classify system stability based on mechanical input power (Pm) and average acceleration (Aav) as inputs. The fuzzy logic method is tested on IEEE 9-bus and 39-bus systems and shows accuracy within 5% of time domain simulation results, while reducing computation time by about half. Tables compare estimated CCT and computation time between the two methods for different fault locations.
Energy efficient resources allocations for wireless communication systemsTELKOMNIKA JOURNAL
ย
The energy consumption level of the telecommunication process has become a new
consideration in resource management scheme. It is becoming a new parameter in the resource
management scheme besides throughput, spectral efficiency, and fairness. This work proposes a power
control scheme and user grouping method to keep the rational energy consumption level of the resource
management scheme. Inverse water-filling power allocation is a power allocation scheme that optimizes
the energy efficiency by giving the power to the user which have good channel conditions. The user
grouping method becomes the solution for carrier aggregation (CA) scheme that prevents edge cell user
get the resources from the high-frequency carrier. This can prevent energy wastage in the transmission
process. This power control scheme and user grouping method can optimize the spectral and energy
efficiency without increasing the time complexity of the system.
Time-varying sliding mode controller for heat exchanger with dragonfly algor...IJECEIAES
ย
This article proposes the design of a sliding mode controller with a time-varying sliding surface for the plate heat exchanger. A time-varying sliding mode controller (TVSMC) combines the benefit of the control systemโs robustness and convergence rate. Using Lyapunov stability theory, the stability of the designed controller is proved. In addition, the controller parameters of the designed controller are specified optimally via the dragonfly algorithm (DA). The input constraintโs effect is considered in the controller design process by applying the concept of the auxiliary system. The bounded disturbances are applied to investigate the robustness of the proposed techniques. Moreover, the quasi-sliding mode controller (QSMC) is developed as a benchmark to evaluate the convergence behavior of the proposed TVSMC technique. The simulation results demonstrate the proposed TVSMC with the optimal parameters provided by the DA algorithm (TVSMC+DA) can regulate the temperature to the desired level under bounded disturbances. When compared to the QSMC method, the TVSMC+DA performs significantly faster convergence speed and greater reduction in chattering occurrence. The results clearly indicate that the proposed controller can enhance convergence properties while being robust to disturbances.
Compensation of Data-Loss in Attitude Control of Spacecraft Systems rinzindorjej
ย
In this paper, a comprehensive comparison of two robust estimation techniques namely, compensated closed-loop Kalman filtering and open-loop Kalman filtering is presented. A common problem of data loss in a real-time control system is investigated through these two schemes. The open-loop scheme, dealing with the data-loss, suffers from several shortcomings. These shortcomings are overcome using compensated scheme, where an accommodating observation signal is obtained through linear prediction technique -- a closed-loop setting and is adopted at a posteriori update step. The calculation and employment of accommodating observation signal causes computational complexity. For simulation purpose, a linear time invariant spacecraft model is however, obtained from the nonlinear spacecraft attitude dynamics through linearization at nonzero equilibrium points -- achieved off-line through Levenberg-Marguardt iterative scheme. Attempt has been made to analyze the selected example from most of the perspectives in order to display the performance of the two techniques.
A hybrid of the selected mapping and partial transmit sequence approaches for...CSITiaesprime
ย
The orthogonal frequency division multiplexing (OFDM)-4G and 5G filter
technology suffer a drawback that represents the direction of the peak
average to power ratio (PAPR) in orthogonal frequency division
multiplexing due to the nonlinear nature of the transmitter. There are a lot of
traditional and hybrid methods of these traditional methods to reduce the
harmful high PAPR value. Newly, several new hybrid methods have been
adopted to reduce PAPR but it faces an increasing level of computational
complexity in the system. In this paper, two important and effective
conventional methods for reducing PAPR are studied, analyzed, and
investigated for the hybrid pathway which is the incorporation of selective
mapping (SLM) method and partial transport sequencing (PTS) method,
which achieve increased efficiency of PAPR reduction while computing the
computational complexity of each method. The method depends and
balances with computational complexity. The search is based on multi-carrier connections such as multi carrier-code division multiple access (MC-CDMA) and OFDM.
Comparative analysis of the performance of various active queue management te...IJECEIAES
ย
This paper demonstrates the robustness of active queue management techniques to varying load, link capacity and propagation delay in a wireless environment. The performances of four standard controllers used in Transmission Control Protocol/Active Queue Management (TCP/AQM) systems were compared. The active queue management controllers were the Fixed-Parameter Proportional Integral (PI), Random Early Detection (RED), Self-Tuning Regulator (STR) and the Model Predictive Control (MPC). The robustness of the congestion control algorithm of each technique was documented by simulating the varying conditions using MATLABยฎ and Simulinkยฎ software. From the results obtained, the MPC controller gives the best result in terms of response time and controllability in a wireless network with varying link capacity and propagation delay. Thus, the MPC controller is the best bet when adaptive algorithms are to be employed in a wireless network environment. The MPC controller can also be recommended for heterogeneous networks where the network load cannot be estimated.
This document summarizes the simulation steps for investigating the performance of three multi-carrier code division multiple access (MC-CDMA) techniques: conventional MC-CDMA, orthogonal wavelet packet based MC-CDMA (WP-MC-CDMA), and Huang Hilbert Transformation (HHT) based MC-CDMA. The steps include designing the three systems, simulating them with different modulation techniques under fading channels, and comparing their bit error rate performance. Numerical and simulation results are presented to validate the proposed schemes.
This document summarizes the simulation steps for investigating the performance of three multi-carrier code division multiple access (MC-CDMA) techniques: conventional MC-CDMA, orthogonal wavelet packet based MC-CDMA (WP-MC-CDMA), and Huang Hilbert Transformation (HHT) based MC-CDMA. The steps include designing the three systems, simulating them with different modulation techniques under fading channels, and comparing their bit error rate performance. Numerical and simulation results are presented to validate the proposed schemes.
DESIGN OF DELAY COMPUTATION METHOD FOR CYCLOTOMIC FAST FOURIER TRANSFORMsipij
ย
In this paper the Delay Computation method for Common Sub expression Elimination algorithm is being implemented on Cyclotomic Fast Fourier Transform. The Common Sub Expression Elimination algorithm is combined with the delay computing method and is known as Gate Level Delay Computation with Common Sub expression Elimination Algorithm. Common sub expression elimination is effective
optimization method used to reduce adders in cyclotomic Fourier transform. The delay computing method is based on delay matrix and suitable for implementation with computers. The Gate level delay computation method is used to find critical path delay and it is analyzed on various finite field elements. The presented algorithm is established through a case study in Cyclotomic Fast Fourier Transform over finite field. If Cyclotomic Fast Fourier Transform is implemented directly then the system will have high additive complexities. So by using GLDC-CSE algorithm on cyclotomic fast Fourier transform, the additive
complexities will be reduced and also the area and area delay product will be reduced.
รhnlich wie Design and simulation an optimal enhanced PI controller for congestion avoidance in TCP/AQM system (20)
Amazon products reviews classification based on machine learning, deep learni...TELKOMNIKA JOURNAL
ย
In recent times, the trend of online shopping through e-commerce stores and websites has grown to a huge extent. Whenever a product is purchased on an e-commerce platform, people leave their reviews about the product. These reviews are very helpful for the store owners and the productโs manufacturers for the betterment of their work process as well as product quality. An automated system is proposed in this work that operates on two datasets D1 and D2 obtained from Amazon. After certain preprocessing steps, N-gram and word embedding-based features are extracted using term frequency-inverse document frequency (TF-IDF), bag of words (BoW) and global vectors (GloVe), and Word2vec, respectively. Four machine learning (ML) models support vector machines (SVM), logistic regression (RF), logistic regression (LR), multinomial Naรฏve Bayes (MNB), two deep learning (DL) models convolutional neural network (CNN), long-short term memory (LSTM), and standalone bidirectional encoder representations (BERT) are used to classify reviews as either positive or negative. The results obtained by the standard ML, DL models and BERT are evaluated using certain performance evaluation measures. BERT turns out to be the best-performing model in the case of D1 with an accuracy of 90% on features derived by word embedding models while the CNN provides the best accuracy of 97% upon word embedding features in the case of D2. The proposed model shows better overall performance on D2 as compared to D1.
Design, simulation, and analysis of microstrip patch antenna for wireless app...TELKOMNIKA JOURNAL
ย
In this study, a microstrip patch antenna that works at 3.6 GHz was built and tested to see how well it works. In this work, Rogers RT/Duroid 5880 has been used as the substrate material, with a dielectric permittivity of 2.2 and a thickness of 0.3451 mm; it serves as the base for the examined antenna. The computer simulation technology (CST) studio suite is utilized to show the recommended antenna design. The goal of this study was to get a more extensive transmission capacity, a lower voltage standing wave ratio (VSWR), and a lower return loss, but the main goal was to get a higher gain, directivity, and efficiency. After simulation, the return loss, gain, directivity, bandwidth, and efficiency of the supplied antenna are found to be -17.626 dB, 9.671 dBi, 9.924 dBi, 0.2 GHz, and 97.45%, respectively. Besides, the recreation uncovered that the transfer speed side-lobe level at phi was much better than those of the earlier works, at -28.8 dB, respectively. Thus, it makes a solid contender for remote innovation and more robust communication.
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...TELKOMNIKA JOURNAL
ย
Vehicular ad-hoc networks (VANETs) are wireless-equipped vehicles that form networks along the road. The security of this network has been a major challenge. The identity-based cryptosystem (IBC) previously used to secure the networks suffers from membership authentication security features. This paper focuses on improving the detection of intruders in VANETs with a modified identity-based cryptosystem (MIBC). The MIBC is developed using a non-singular elliptic curve with Lagrange interpolation. The public key of vehicles and roadside units on the network are derived from number plates and location identification numbers, respectively. Pseudo-identities are used to mask the real identity of users to preserve their privacy. The membership authentication mechanism ensures that only valid and authenticated members of the network are allowed to join the network. The performance of the MIBC is evaluated using intrusion detection ratio (IDR) and computation time (CT) and then validated with the existing IBC. The result obtained shows that the MIBC recorded an IDR of 99.3% against 94.3% obtained for the existing identity-based cryptosystem (EIBC) for 140 unregistered vehicles attempting to intrude on the network. The MIBC shows lower CT values of 1.17 ms against 1.70 ms for EIBC. The MIBC can be used to improve the security of VANETs.
Conceptual model of internet banking adoption with perceived risk and trust f...TELKOMNIKA JOURNAL
ย
Understanding the primary factors of internet banking (IB) acceptance is critical for both banks and users; nevertheless, our knowledge of the role of usersโ perceived risk and trust in IB adoption is limited. As a result, we develop a conceptual model by incorporating perceived risk and trust into the technology acceptance model (TAM) theory toward the IB. The proper research emphasized that the most essential component in explaining IB adoption behavior is behavioral intention to use IB adoption. TAM is helpful for figuring out how elements that affect IB adoption are connected to one another. According to previous literature on IB and the use of such technology in Iraq, one has to choose a theoretical foundation that may justify the acceptance of IB from the customerโs perspective. The conceptual model was therefore constructed using the TAM as a foundation. Furthermore, perceived risk and trust were added to the TAM dimensions as external factors. The key objective of this work was to extend the TAM to construct a conceptual model for IB adoption and to get sufficient theoretical support from the existing literature for the essential elements and their relationships in order to unearth new insights about factors responsible for IB adoption.
Efficient combined fuzzy logic and LMS algorithm for smart antennaTELKOMNIKA JOURNAL
ย
The smart antennas are broadly used in wireless communication. The least mean square (LMS) algorithm is a procedure that is concerned in controlling the smart antenna pattern to accommodate specified requirements such as steering the beam toward the desired signal, in addition to placing the deep nulls in the direction of unwanted signals. The conventional LMS (C-LMS) has some drawbacks like slow convergence speed besides high steady state fluctuation error. To overcome these shortcomings, the present paper adopts an adaptive fuzzy control step size least mean square (FC-LMS) algorithm to adjust its step size. Computer simulation outcomes illustrate that the given model has fast convergence rate as well as low mean square error steady state.
Design and implementation of a LoRa-based system for warning of forest fireTELKOMNIKA JOURNAL
ย
This paper presents the design and implementation of a forest fire monitoring and warning system based on long range (LoRa) technology, a novel ultra-low power consumption and long-range wireless communication technology for remote sensing applications. The proposed system includes a wireless sensor network that records environmental parameters such as temperature, humidity, wind speed, and carbon dioxide (CO2) concentration in the air, as well as taking infrared photos.The data collected at each sensor node will be transmitted to the gateway via LoRa wireless transmission. Data will be collected, processed, and uploaded to a cloud database at the gateway. An Android smartphone application that allows anyone to easily view the recorded data has been developed. When a fire is detected, the system will sound a siren and send a warning message to the responsible personnel, instructing them to take appropriate action. Experiments in Tram Chim Park, Vietnam, have been conducted to verify and evaluate the operation of the system.
Wavelet-based sensing technique in cognitive radio networkTELKOMNIKA JOURNAL
ย
Cognitive radio is a smart radio that can change its transmitter parameter based on interaction with the environment in which it operates. The demand for frequency spectrum is growing due to a big data issue as many Internet of Things (IoT) devices are in the network. Based on previous research, most frequency spectrum was used, but some spectrums were not used, called spectrum hole. Energy detection is one of the spectrum sensing methods that has been frequently used since it is easy to use and does not require license users to have any prior signal understanding. But this technique is incapable of detecting at low signal-to-noise ratio (SNR) levels. Therefore, the wavelet-based sensing is proposed to overcome this issue and detect spectrum holes. The main objective of this work is to evaluate the performance of wavelet-based sensing and compare it with the energy detection technique. The findings show that the percentage of detection in wavelet-based sensing is 83% higher than energy detection performance. This result indicates that the wavelet-based sensing has higher precision in detection and the interference towards primary user can be decreased.
A novel compact dual-band bandstop filter with enhanced rejection bandsTELKOMNIKA JOURNAL
ย
In this paper, we present the design of a new wide dual-band bandstop filter (DBBSF) using nonuniform transmission lines. The method used to design this filter is to replace conventional uniform transmission lines with nonuniform lines governed by a truncated Fourier series. Based on how impedances are profiled in the proposed DBBSF structure, the fractional bandwidths of the two 10 dB-down rejection bands are widened to 39.72% and 52.63%, respectively, and the physical size has been reduced compared to that of the filter with the uniform transmission lines. The results of the electromagnetic (EM) simulation support the obtained analytical response and show an improved frequency behavior.
Deep learning approach to DDoS attack with imbalanced data at the application...TELKOMNIKA JOURNAL
ย
A distributed denial of service (DDoS) attack is where one or more computers attack or target a server computer, by flooding internet traffic to the server. As a result, the server cannot be accessed by legitimate users. A result of this attack causes enormous losses for a company because it can reduce the level of user trust, and reduce the companyโs reputation to lose customers due to downtime. One of the services at the application layer that can be accessed by users is a web-based lightweight directory access protocol (LDAP) service that can provide safe and easy services to access directory applications. We used a deep learning approach to detect DDoS attacks on the CICDDoS 2019 dataset on a complex computer network at the application layer to get fast and accurate results for dealing with unbalanced data. Based on the results obtained, it is observed that DDoS attack detection using a deep learning approach on imbalanced data performs better when implemented using synthetic minority oversampling technique (SMOTE) method for binary classes. On the other hand, the proposed deep learning approach performs better for detecting DDoS attacks in multiclass when implemented using the adaptive synthetic (ADASYN) method.
The appearance of uncertainties and disturbances often effects the characteristics of either linear or nonlinear systems. Plus, the stabilization process may be deteriorated thus incurring a catastrophic effect to the system performance. As such, this manuscript addresses the concept of matching condition for the systems that are suffering from miss-match uncertainties and exogeneous disturbances. The perturbation towards the system at hand is assumed to be known and unbounded. To reach this outcome, uncertainties and their classifications are reviewed thoroughly. The structural matching condition is proposed and tabulated in the proposition 1. Two types of mathematical expressions are presented to distinguish the system with matched uncertainty and the system with miss-matched uncertainty. Lastly, two-dimensional numerical expressions are provided to practice the proposed proposition. The outcome shows that matching condition has the ability to change the system to a design-friendly model for asymptotic stabilization.
Implementation of FinFET technology based low power 4ร4 Wallace tree multipli...TELKOMNIKA JOURNAL
ย
Many systems, including digital signal processors, finite impulse response (FIR) filters, application-specific integrated circuits, and microprocessors, use multipliers. The demand for low power multipliers is gradually rising day by day in the current technological trend. In this study, we describe a 4ร4 Wallace multiplier based on a carry select adder (CSA) that uses less power and has a better power delay product than existing multipliers. HSPICE tool at 16 nm technology is used to simulate the results. In comparison to the traditional CSA-based multiplier, which has a power consumption of 1.7 ยตW and power delay product (PDP) of 57.3 fJ, the results demonstrate that the Wallace multiplier design employing CSA with first zero finding logic (FZF) logic has the lowest power consumption of 1.4 ยตW and PDP of 27.5 fJ.
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemTELKOMNIKA JOURNAL
ย
The flaw in 5G orthogonal frequency division multiplexing (OFDM) becomes apparent in high-speed situations. Because the doppler effect causes frequency shifts, the orthogonality of OFDM subcarriers is broken, lowering both their bit error rate (BER) and throughput output. As part of this research, we use a novel design that combines massive multiple input multiple output (MIMO) and weighted overlap and add (WOLA) to improve the performance of 5G systems. To determine which design is superior, throughput and BER are calculated for both the proposed design and OFDM. The results of the improved system show a massive improvement in performance ver the conventional system and significant improvements with massive MIMO, including the best throughput and BER. When compared to conventional systems, the improved system has a throughput that is around 22% higher and the best performance in terms of BER, but it still has around 25% less error than OFDM.
Reflector antenna design in different frequencies using frequency selective s...TELKOMNIKA JOURNAL
ย
In this study, it is aimed to obtain two different asymmetric radiation patterns obtained from antennas in the shape of the cross-section of a parabolic reflector (fan blade type antennas) and antennas with cosecant-square radiation characteristics at two different frequencies from a single antenna. For this purpose, firstly, a fan blade type antenna design will be made, and then the reflective surface of this antenna will be completed to the shape of the reflective surface of the antenna with the cosecant-square radiation characteristic with the frequency selective surface designed to provide the characteristics suitable for the purpose. The frequency selective surface designed and it provides the perfect transmission as possible at 4 GHz operating frequency, while it will act as a band-quenching filter for electromagnetic waves at 5 GHz operating frequency and will be a reflective surface. Thanks to this frequency selective surface to be used as a reflective surface in the antenna, a fan blade type radiation characteristic at 4 GHz operating frequency will be obtained, while a cosecant-square radiation characteristic at 5 GHz operating frequency will be obtained.
Reagentless iron detection in water based on unclad fiber optical sensorTELKOMNIKA JOURNAL
ย
A simple and low-cost fiber based optical sensor for iron detection is demonstrated in this paper. The sensor head consist of an unclad optical fiber with the unclad length of 1 cm and it has a straight structure. Results obtained shows a linear relationship between the output light intensity and iron concentration, illustrating the functionality of this iron optical sensor. Based on the experimental results, the sensitivity and linearity are achieved at 0.0328/ppm and 0.9824 respectively at the wavelength of 690 nm. With the same wavelength, other performance parameters are also studied. Resolution and limit of detection (LOD) are found to be 0.3049 ppm and 0.0755 ppm correspondingly. This iron sensor is advantageous in that it does not require any reagent for detection, enabling it to be simpler and cost-effective in the implementation of the iron sensing.
Impact of CuS counter electrode calcination temperature on quantum dot sensit...TELKOMNIKA JOURNAL
ย
In place of the commercial Pt electrode used in quantum sensitized solar cells, the low-cost CuS cathode is created using electrophoresis. High resolution scanning electron microscopy and X-ray diffraction were used to analyze the structure and morphology of structural cubic samples with diameters ranging from 40 nm to 200 nm. The conversion efficiency of solar cells is significantly impacted by the calcination temperatures of cathodes at 100 ยฐC, 120 ยฐC, 150 ยฐC, and 180 ยฐC under vacuum. The fluorine doped tin oxide (FTO)/CuS cathode electrode reached a maximum efficiency of 3.89% when it was calcined at 120 ยฐC. Compared to other temperature combinations, CuS nanoparticles crystallize at 120 ยฐC, which lowers resistance while increasing electron lifetime.
In place of the commercial Pt electrode used in quantum sensitized solar cells, the low-cost CuS cathode is created using electrophoresis. High resolution scanning electron microscopy and X-ray diffraction were used to analyze the structure and morphology of structural cubic samples with diameters ranging from 40 nm to 200 nm. The conversion efficiency of solar cells is significantly impacted by the calcination temperatures of cathodes at 100 ยฐC, 120 ยฐC, 150 ยฐC, and 180 ยฐC under vacuum. The fluorine doped tin oxide (FTO)/CuS cathode electrode reached a maximum efficiency of 3.89% when it was calcined at 120 ยฐC. Compared to other temperature combinations, CuS nanoparticles crystallize at 120 ยฐC, which lowers resistance while increasing electron lifetime.
A progressive learning for structural tolerance online sequential extreme lea...TELKOMNIKA JOURNAL
ย
This article discusses the progressive learning for structural tolerance online sequential extreme learning machine (PSTOS-ELM). PSTOS-ELM can save robust accuracy while updating the new data and the new class data on the online training situation. The robustness accuracy arises from using the householder block exact QR decomposition recursive least squares (HBQRD-RLS) of the PSTOS-ELM. This method is suitable for applications that have data streaming and often have new class data. Our experiment compares the PSTOS-ELM accuracy and accuracy robustness while data is updating with the batch-extreme learning machine (ELM) and structural tolerance online sequential extreme learning machine (STOS-ELM) that both must retrain the data in a new class data case. The experimental results show that PSTOS-ELM has accuracy and robustness comparable to ELM and STOS-ELM while also can update new class data immediately.
Electroencephalography-based brain-computer interface using neural networksTELKOMNIKA JOURNAL
ย
This study aimed to develop a brain-computer interface that can control an electric wheelchair using electroencephalography (EEG) signals. First, we used the Mind Wave Mobile 2 device to capture raw EEG signals from the surface of the scalp. The signals were transformed into the frequency domain using fast Fourier transform (FFT) and filtered to monitor changes in attention and relaxation. Next, we performed time and frequency domain analyses to identify features for five eye gestures: opened, closed, blink per second, double blink, and lookup. The base state was the opened-eyes gesture, and we compared the features of the remaining four action gestures to the base state to identify potential gestures. We then built a multilayer neural network to classify these features into five signals that control the wheelchairโs movement. Finally, we designed an experimental wheelchair system to test the effectiveness of the proposed approach. The results demonstrate that the EEG classification was highly accurate and computationally efficient. Moreover, the average performance of the brain-controlled wheelchair system was over 75% across different individuals, which suggests the feasibility of this approach.
Adaptive segmentation algorithm based on level set model in medical imagingTELKOMNIKA JOURNAL
ย
For image segmentation, level set models are frequently employed. It offer best solution to overcome the main limitations of deformable parametric models. However, the challenge when applying those models in medical images stills deal with removing blurs in image edges which directly affects the edge indicator function, leads to not adaptively segmenting images and causes a wrong analysis of pathologies wich prevents to conclude a correct diagnosis. To overcome such issues, an effective process is suggested by simultaneously modelling and solving systemsโ two-dimensional partial differential equations (PDE). The first PDE equation allows restoration using Eulerโs equation similar to an anisotropic smoothing based on a regularized Perona and Malik filter that eliminates noise while preserving edge information in accordance with detected contours in the second equation that segments the image based on the first equation solutions. This approach allows developing a new algorithm which overcome the studied model drawbacks. Results of the proposed method give clear segments that can be applied to any application. Experiments on many medical images in particular blurry images with high information losses, demonstrate that the developed approach produces superior segmentation results in terms of quantity and quality compared to other models already presented in previeous works.
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...TELKOMNIKA JOURNAL
ย
Drug addiction is a complex neurobiological disorder that necessitates comprehensive treatment of both the body and mind. It is categorized as a brain disorder due to its impact on the brain. Various methods such as electroencephalography (EEG), functional magnetic resonance imaging (FMRI), and magnetoencephalography (MEG) can capture brain activities and structures. EEG signals provide valuable insights into neurological disorders, including drug addiction. Accurate classification of drug addiction from EEG signals relies on appropriate features and channel selection. Choosing the right EEG channels is essential to reduce computational costs and mitigate the risk of overfitting associated with using all available channels. To address the challenge of optimal channel selection in addiction detection from EEG signals, this work employs the shuffled frog leaping algorithm (SFLA). SFLA facilitates the selection of appropriate channels, leading to improved accuracy. Wavelet features extracted from the selected input channel signals are then analyzed using various machine learning classifiers to detect addiction. Experimental results indicate that after selecting features from the appropriate channels, classification accuracy significantly increased across all classifiers. Particularly, the multi-layer perceptron (MLP) classifier combined with SFLA demonstrated a remarkable accuracy improvement of 15.78% while reducing time complexity.
ResNet-n/DR: Automated diagnosis of diabetic retinopathy using a residual neu...TELKOMNIKA JOURNAL
ย
Diabetic retinopathy (DR) is a progressive eye disease associated with diabetes, resulting in blindness or blurred vision. The risk of vision loss was dramatically decreased with early diagnosis and treatment. Doctors diagnose DR by examining the fundus retinal images to develop lesions associated with the disease. However, this diagnosis is a tedious and challenging task due to growing undiagnosed and untreated DR cases and the variability of retinal changes across disease stages. Manually analyzing the images has become an expensive and time-consuming task, not to mention that training new specialists takes time and requires daily practice. Our work investigates deep learning methods, particularly convolutional neural network (CNN), for DR diagnosis in the diseaseโs five stages. A pre-trained residual neural network (ResNet-34) was trained and tested for DR. Then, we develop computationally efficient and scalable methods after modifying a ResNet-34 with three additional residual units as a novel ResNet-n/DR. The Asia Pacific Tele-Ophthalmology Society (APTOS) 2019 dataset was used to evaluate the performance of models after applying multiple pre-processing steps to eliminate image noise and improve color contrast, thereby increasing efficiency. Our findings achieved state-of-the-art results compared to previous studies that used the same dataset. It had 90.7% sensitivity, 93.5% accuracy, 98.2% specificity, 89.5% precision, and 90.1% F1 score.
Digital Twins Computer Networking Paper Presentation.pptxaryanpankaj78
ย
A Digital Twin in computer networking is a virtual representation of a physical network, used to simulate, analyze, and optimize network performance and reliability. It leverages real-time data to enhance network management, predict issues, and improve decision-making processes.
Design and optimization of ion propulsion dronebjmsejournal
ย
Electric propulsion technology is widely used in many kinds of vehicles in recent years, and aircrafts are no exception. Technically, UAVs are electrically propelled but tend to produce a significant amount of noise and vibrations. Ion propulsion technology for drones is a potential solution to this problem. Ion propulsion technology is proven to be feasible in the earthโs atmosphere. The study presented in this article shows the design of EHD thrusters and power supply for ion propulsion drones along with performance optimization of high-voltage power supply for endurance in earthโs atmosphere.
Null Bangalore | Pentesters Approach to AWS IAMDivyanshu
ย
#Abstract:
- Learn more about the real-world methods for auditing AWS IAM (Identity and Access Management) as a pentester. So let us proceed with a brief discussion of IAM as well as some typical misconfigurations and their potential exploits in order to reinforce the understanding of IAM security best practices.
- Gain actionable insights into AWS IAM policies and roles, using hands on approach.
#Prerequisites:
- Basic understanding of AWS services and architecture
- Familiarity with cloud security concepts
- Experience using the AWS Management Console or AWS CLI.
- For hands on lab create account on [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
# Scenario Covered:
- Basics of IAM in AWS
- Implementing IAM Policies with Least Privilege to Manage S3 Bucket
- Objective: Create an S3 bucket with least privilege IAM policy and validate access.
- Steps:
- Create S3 bucket.
- Attach least privilege policy to IAM user.
- Validate access.
- Exploiting IAM PassRole Misconfiguration
-Allows a user to pass a specific IAM role to an AWS service (ec2), typically used for service access delegation. Then exploit PassRole Misconfiguration granting unauthorized access to sensitive resources.
- Objective: Demonstrate how a PassRole misconfiguration can grant unauthorized access.
- Steps:
- Allow user to pass IAM role to EC2.
- Exploit misconfiguration for unauthorized access.
- Access sensitive resources.
- Exploiting IAM AssumeRole Misconfiguration with Overly Permissive Role
- An overly permissive IAM role configuration can lead to privilege escalation by creating a role with administrative privileges and allow a user to assume this role.
- Objective: Show how overly permissive IAM roles can lead to privilege escalation.
- Steps:
- Create role with administrative privileges.
- Allow user to assume the role.
- Perform administrative actions.
- Differentiation between PassRole vs AssumeRole
Try at [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
Software Engineering and Project Management - Introduction, Modeling Concepts...Prakhyath Rai
ย
Introduction, Modeling Concepts and Class Modeling: What is Object orientation? What is OO development? OO Themes; Evidence for usefulness of OO development; OO modeling history. Modeling
as Design technique: Modeling, abstraction, The Three models. Class Modeling: Object and Class Concept, Link and associations concepts, Generalization and Inheritance, A sample class model, Navigation of class models, and UML diagrams
Building the Analysis Models: Requirement Analysis, Analysis Model Approaches, Data modeling Concepts, Object Oriented Analysis, Scenario-Based Modeling, Flow-Oriented Modeling, class Based Modeling, Creating a Behavioral Model.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
ย
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...shadow0702a
ย
This document serves as a comprehensive step-by-step guide on how to effectively use PyCharm for remote debugging of the Windows Subsystem for Linux (WSL) on a local Windows machine. It meticulously outlines several critical steps in the process, starting with the crucial task of enabling permissions, followed by the installation and configuration of WSL.
The guide then proceeds to explain how to set up the SSH service within the WSL environment, an integral part of the process. Alongside this, it also provides detailed instructions on how to modify the inbound rules of the Windows firewall to facilitate the process, ensuring that there are no connectivity issues that could potentially hinder the debugging process.
The document further emphasizes on the importance of checking the connection between the Windows and WSL environments, providing instructions on how to ensure that the connection is optimal and ready for remote debugging.
It also offers an in-depth guide on how to configure the WSL interpreter and files within the PyCharm environment. This is essential for ensuring that the debugging process is set up correctly and that the program can be run effectively within the WSL terminal.
Additionally, the document provides guidance on how to set up breakpoints for debugging, a fundamental aspect of the debugging process which allows the developer to stop the execution of their code at certain points and inspect their program at those stages.
Finally, the document concludes by providing a link to a reference blog. This blog offers additional information and guidance on configuring the remote Python interpreter in PyCharm, providing the reader with a well-rounded understanding of the process.
Applications of artificial Intelligence in Mechanical Engineering.pdfAtif Razi
ย
Historically, mechanical engineering has relied heavily on human expertise and empirical methods to solve complex problems. With the introduction of computer-aided design (CAD) and finite element analysis (FEA), the field took its first steps towards digitization. These tools allowed engineers to simulate and analyze mechanical systems with greater accuracy and efficiency. However, the sheer volume of data generated by modern engineering systems and the increasing complexity of these systems have necessitated more advanced analytical tools, paving the way for AI.
AI offers the capability to process vast amounts of data, identify patterns, and make predictions with a level of speed and accuracy unattainable by traditional methods. This has profound implications for mechanical engineering, enabling more efficient design processes, predictive maintenance strategies, and optimized manufacturing operations. AI-driven tools can learn from historical data, adapt to new information, and continuously improve their performance, making them invaluable in tackling the multifaceted challenges of modern mechanical engineering.
Generative AI Use cases applications solutions and implementation.pdfmahaffeycheryld
ย
Generative AI solutions encompass a range of capabilities from content creation to complex problem-solving across industries. Implementing generative AI involves identifying specific business needs, developing tailored AI models using techniques like GANs and VAEs, and integrating these models into existing workflows. Data quality and continuous model refinement are crucial for effective implementation. Businesses must also consider ethical implications and ensure transparency in AI decision-making. Generative AI's implementation aims to enhance efficiency, creativity, and innovation by leveraging autonomous generation and sophisticated learning algorithms to meet diverse business challenges.
https://www.leewayhertz.com/generative-ai-use-cases-and-applications/
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...PriyankaKilaniya
ย
Energy efficiency has been important since the latter part of the last century. The main object of this survey is to determine the energy efficiency knowledge among consumers. Two separate districts in Bangladesh are selected to conduct the survey on households and showrooms about the energy and seller also. The survey uses the data to find some regression equations from which it is easy to predict energy efficiency knowledge. The data is analyzed and calculated based on five important criteria. The initial target was to find some factors that help predict a person's energy efficiency knowledge. From the survey, it is found that the energy efficiency awareness among the people of our country is very low. Relationships between household energy use behaviors are estimated using a unique dataset of about 40 households and 20 showrooms in Bangladesh's Chapainawabganj and Bagerhat districts. Knowledge of energy consumption and energy efficiency technology options is found to be associated with household use of energy conservation practices. Household characteristics also influence household energy use behavior. Younger household cohorts are more likely to adopt energy-efficient technologies and energy conservation practices and place primary importance on energy saving for environmental reasons. Education also influences attitudes toward energy conservation in Bangladesh. Low-education households indicate they primarily save electricity for the environment while high-education households indicate they are motivated by environmental concerns.
Mechanical Engineering on AAI Summer Training Report-003.pdf
ย
Design and simulation an optimal enhanced PI controller for congestion avoidance in TCP/AQM system
1. TELKOMNIKA Telecommunication Computing Electronics and Control
Vol. 21, No. 5, October 2023, pp. 997~1004
ISSN: 1693-6930, DOI: 10.12928/TELKOMNIKA.v21i5.24872 ๏ฒ 997
Journal homepage: http://telkomnika.uad.ac.id
Design and simulation an optimal enhanced PI controller for
congestion avoidance in TCP/AQM system
Yousra Abd Mohammed1
, Layla H. Abood2
, Nahida Naji Kadhim2
1
Communication Engineering Department, University of Technology, Baghdad, Iraq
2
Department of Control and System Engineering, University of Technology, Baghdad, Iraq
Article Info ABSTRACT
Article history:
Received Dec 05, 2022
Revised Mar 28, 2023
Accepted Apr 30, 2023
In this paper, snake optimization algorithm (SOA) is used to find the optimal
gains of an enhanced controller for controlling congestion problem in
computer networks. M-file and Simulink platform is adopted to evaluate the
response of the active queue management (AQM) system, a comparison with
two classical controllers is done, all tuned gains of controllers are obtained
using SOA method and the fitness function chose to monitor the system
performance is the integral time absolute error (ITAE). Transient analysis and
robust analysis is used to show the proposed controller performance, two
robustness tests are applied to the AQM system, one is done by varying the size
of queue value in different period and the other test is done by changing the
number of transmission control protocol (TCP) sessions with a value of ยฑ 20%
from its original value. The simulation results reflect a stable and robust
behavior and best performance is appeared clearly to achieve the desired
queue size without any noise or any transmission problems.
Keywords:
AQM
Computer network
Congestion control
NLPI controller
SOA
This is an open access article under the CC BY-SA license.
Corresponding Author:
Yousra Abd Mohammed
Communication Engineering Department, University of Technology
Baghdad, Iraq
Email: yousra.a.mohammed@uotechnology.edu.iq
1. INTRODUCTION
Avoiding high rates of packet loss in the internet is an important issue, when a packet is losing before
it received from its destination point; all the data it has sent through transmission path are dissipated.
In excessive states, this case will cause a congestion collapse. Congestion control has become as an urgent
matter in computer and communication networks. Congestion has harmful effect on network effeciency which
reflecting to noticeable packet loss, poor utilization, high delay rate, few throughputs [1], [2].
Different algorithms is used to solve the congestion problem but the best one is the active queue
management (AQM) scheme, AQM algorithm maintains congestion by previously detection of incipient
congestion and giving feedback signals to end-hosts to permit them minimizing their transmission rate before the
routerโs buffer exceeded [3]. In [4] an inclusive study is demonstrated on the AQM algorithm techniques that
suggested and adopted to modify the performance efficiently, the AQM algorithms are classified based on length
of the queue or its delay or both of them. Proportional-integral-derivative (PID) fuzzy-neural controller was
presented; PID controller gains were tuned based on particle swarm optimization (PSO) tuning algorith to enhance
the fuzzy controller behavior [5]. An AQM scheme is controlled using fuzzy controller as a (mixing-fuzzy-PID)
controller to provie best congestion solution and few delay periods, high utilization and few data drop [6]. A fuzzy
proportional integral (FPI) controller with genetic tunning was suggested as an AQM for internet router [7].
An enhanced version of discrete linear quadratic optimal controller is adapted to track the desired queue size
in AQM scheme and genetic algorithm (GA) are used to fix the complexity of finding the weighting matrices
๐ and ๐ [8].
2. ๏ฒ ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 21, No. 5, October 2023: 997-1004
998
The adaptive suggested method was introduced as a newly adopted method, named PHAQM, by using the
Hebb neural network for adjusting the variables of the model predictive control (MPC)-based AQM system [9].
Different methods were formed to maintain the congestion problem at the router in the network [10]โ[13].
The algorithm that used for congestion problem is the drop tail (DT) method [14]. This method adopted the
first-in first-out (FIFO) technique. DT method are used without thresholds, then if the capacity is maximized
at the router buffer, the packets that arrived are directly. Maintaining the problem of congestion in AQM system
based on a smart and unique snake optimization algorithm (SOA) tuning method for finding gains of the
controller to fulfill the stability and robustness by fixing any problem mdropped [12], [15]. In [16] a fuzzy
controlling method was used to enhance the modify AQM system behavior without need for a precise model.
In this paper an enhanced proportional integral (PI) controller is proposed for solve congestion
problem that occurs in the communication networks during transmission data. The rest of the paper is: part 2
explains the modelling of AQM system. Part 3 indicateds the controller suggested scheme. Part 4, demonstrates
the SOA tuning algorithm, part 5 discuss the results obtained then part 6 presents the paper conclusions.
2. MODELING OF TCP/AQM
Transmission control protocol (TCP) operation was modeled and studied using differential equations,
together with a fluid-flow-based technique for ignoring TCP timeout and an investigation of stochastic
relationships [17], [18]. It is assumed that each homogenous TCP flow connected to a certain bottleneck
topology has an identical delay, as shown in Figure 1 [19]. The dynamic model is defined by the nonlinear
deferential equations [20], [21] shown below, where the parameters of (1), (2) and (3) are shown in Table 1.
๐(๐ก)
ฬ =
1
๐ (๐ก)
โ
๐(๐ก)๐(๐กโ๐ (๐ก))
2๐ (๐กโ๐ (๐ก))
๐(๐ก โ ๐ (๐ก)) (1)
๐(๐ก)
ฬ =
๐(๐ก)
๐ (๐ก)
๐(๐ก) โ ๐ถ (2)
๐ can be determined from (2) as shown in (3).
๐ =
๐
๐
+ ๐๐ (3)
Figure 1. Bottleneck scenario [19]
Table 1. Parameters of AQM model [21]
Symbol Description
(๐) TCP window size (packets) is positive, ๐ ๐ [0, ห๐], ห๐: (max. size of window)
แบ(๐ก) Derivative time of ๐(๐ก)
(๐) Queue size (packet), ๐ ๐ [0, โ๐], ห๐ (buffer capacity)
๐ฬ(๐ก) ๐(๐ก) derivative time
(๐ก) Time (sec)
(๐ ) Time of round trip (sec)
(๐) Number of TCP sessions
(๐ถ) Capacity of the link (packet/sec)
(๐) Packet probability (mark/drop) [0, 1]
(๐๐) Propagation delay
3. TELKOMNIKA Telecommun Comput El Control ๏ฒ
Design and simulation an optimal enhanced PI controller for โฆ (Yousra Abd Mohammed)
999
The nonlinear relations of the AQM model were linearized [8], [22] as shown in (4), Figure 2 shows
the linearized AQM control system.
๐(๐ ) = (
๐ถ2
2๐
๐โ๐ ๐ 0) ((๐ +
2๐
๐ 0
2๐ถ
) (๐ +
1
๐ 0
))
โ (4)
Figure 2. Linearized AQM system block diagram [8]
In this study the values of the parameter used are: ๐ ๐ = 0.253 (๐ ๐๐), (๐ถ = 15 Mbps = 3750 packets/sec) and
(๐ = 60 TCP sources) [4]. Using the preceding parameters in (4), the full TCP/AQM system is obtained, and
the transfer function of the model is as (5):
๐(๐ ) = (117187.5๐โ0.253๐
) (๐ 2
+ 4.5245๐ + 1.9759)
โ (5)
3. PROPOSED ENHANCED CONTROLLER
The classical PID controller is considered as a flexible and traditional type of controllers, itโs used for
enhancing system response. Recently, many studies are used these types with a numerous modifications such as
using intelligent techniques such as combines with sliding mode controller or using with any type of neural
network [23], [24], or change its structures to improve the response of the system as in [25], or use the fractional
calculus method by adding an integral or differential fractiona values or together to enhance system behavior [26],
the values are (๐ for the integral part and ๐ for derivative part), based on this controller gains become five
variables. In this study a nonlinear formula is adopted to improve system performance and led the system to its
efficient response[27], [28] as indicated in Figure 3, it is an enhanced combination between nonlinear gain ๐พ๐(๐)
and the original PI controller gains, this nonlinear gain is a function of system error also, as shown in (6).
Figure 3. Enhanced PI controller
๐พ๐(๐) = ๐๐๐โ(๐) =
๐๐ฅ๐(๐0๐)โ๐๐ฅ๐(๐0๐)
๐๐ฅ๐(๐0๐)+๐๐ฅ๐(๐0๐)
(6)
๐ = {
๐ |๐| โค ๐๐๐๐ฅ
๐๐๐๐ฅ . ๐ ๐๐๐(๐) |๐| > ๐๐๐๐ฅ
(7)
๐พ๐, ๐พ๐, and ๐พ0 are three parameters that will tuned for achieve an optimal response for this controller.
4. SNAKE OPTIMIZATION ALGORITHM
The SOA was adopted by Hashim and Hussien [29]. It explains the snakes mating way, it describes
how the snakes struggling for finding their suitable associate if there is a good place such as cold weather and
a sufficient food, itโs randomly starting with population generation, and an update for its position is done in
two phases: exploration and exploitation. They start with considring that the maleโs numbers and the femaleโs
numbers are equal when it starts the updating process. This action remains till complete chosen number of the
iteration (๐), the first phase is called exploration, it describes the state when there food is not sufficient and the
thier search is done in random style. Quantity of food is calculated using (8) [30].
4. ๏ฒ ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 21, No. 5, October 2023: 997-1004
1000
๐ = 0.5 ๐๐ฅ๐
๐กโ๐
๐
(8)
And the equations of this phase are:
๐๐,๐
๐ก+1
= ๐๐๐๐๐,๐
๐ก
ยฑ ๐ถ2 ร ๐ด๐ ร (๐๐๐๐ฅ โ ๐๐๐๐ ) ร ๐๐๐๐ + ๐๐๐๐ (9)
๐๐,๐
๐ก+1
= ๐๐๐๐๐,๐
๐ก
ยฑ ๐ถ2 ร ๐ด๐ ร (๐๐๐๐ฅ โ ๐๐๐๐ ) ร ๐๐๐๐ + ๐๐๐๐ (10)
Where ๐๐,๐
๐ก+1
, ๐๐,๐
๐ก+1
represent the ๐th places of both males and females. ๐๐๐๐๐,๐
๐ก
, ๐๐๐๐๐,๐,,
๐ก
represent the
places that taken randomly by the two types chosen population (males and females). ๐ถ2 represents a known
variable (๐ถ2 = 0.5), ๐ด๐ is the male ability while ๐ด๐ is the female ability to reach to the food place and it is
calculated by (11), (12).
๐ด๐ = ๐๐ฅ๐
โ๐๐๐๐๐,๐
๐ก
๐๐,๐
๐ก+1 (11)
๐ด๐ = ๐๐ฅ๐
โ๐๐๐๐๐,๐
๐ก
๐๐,๐
๐ก+1 (12)
๐น explains the fitness function magnitude of males and females. When they find their food, the
exploitation phase is begin, then their places is updated due to their environment temperature (TEMP) and its
founnd as indicated:
๐๐ธ๐๐ = exp
โ๐ก
๐
(13)
When the the weather becomes hot and the temperature exceeds the threshold level, the places of males and
females are updated as shown:
๐๐,๐,๐
๐ก+1
= ๐๐๐๐๐
๐ก
ยฑ ๐ถ3 ร ๐๐ธ๐๐ ร ๐๐๐๐ ร (๐๐๐๐๐ โ ๐๐,๐,๐
๐ก+1
) (14)
๐๐๐๐๐
๐ก
is regarded as the optimal place and ๐ถ3 equal to 2. Otherwise, the population will replaces between
each other randomly in two modes either fighting or mating and reach the places as explained in (15)-(18):
๐๐,๐
๐ก+1
= ๐๐,๐
๐ก
ยฑ ๐ถ3 ร ๐น๐ ร ๐๐๐๐ ร (๐๐๐๐ ๐ก,๐ โ ๐๐,๐
๐ก
) (15)
๐๐,๐
๐ก+1
= ๐๐,๐
๐ก+1
ยฑ ๐ถ3 ร ๐น๐น ร ๐๐๐๐ ร (๐๐๐๐ ๐ก,๐ โ ๐๐,๐
๐ก+1
) (16)
๐๐,๐
๐ก+1
= ๐๐,๐
๐ก
ยฑ ๐ถ3 ร ๐๐ ร ๐๐๐๐ ร (๐ ร ๐๐,๐
๐ก
โ ๐๐,๐
๐ก
) (17)
๐๐,๐
๐ก+1
= ๐๐,๐
๐ก
ยฑ ๐ถ3 ร ๐๐ ร ๐๐๐๐ ร (๐ ร ๐๐,๐
๐ก
โ ๐๐,๐
๐ก
) (18)
In (19), (20) is specific for fighting state and [21], [22] is specific for mating state and the ๐น๐น, ๐น๐ are
representing the ability of fighting, ๐๐ and ๐๐ are considered as a mating ability for malesโ and femaleโs as listed:
๐น๐ = ๐๐ฅ๐
โ๐๐๐๐ ๐ก,๐
๐๐
(19)
๐น๐น = ๐๐ฅ๐
โ๐๐๐๐ ๐ก,๐
๐๐
(20)
๐๐ = ๐๐ฅ๐
โ๐๐,๐
๐๐,๐
(21)
๐๐ = ๐๐ฅ๐
โ๐๐,๐
๐๐,๐
(22)
The selection of worst male and female is happen when egg hatch then switch between them.
๐๐ค๐๐๐ ๐ก,๐ = ๐๐๐๐ + ๐๐๐๐ ร (๐๐๐๐ฅ โ ๐๐๐๐ ) (23)
๐๐ค๐๐๐ ๐ก,๐ = ๐๐๐๐ + ๐๐๐๐ ร (๐๐๐๐ฅ โ ๐๐๐๐ ) (24)
5. TELKOMNIKA Telecommun Comput El Control ๏ฒ
Design and simulation an optimal enhanced PI controller for โฆ (Yousra Abd Mohammed)
1001
For monitor system performance in reaching the optimal response one of the cost function relations
will used to monitor the queue size until reachs to its optimal level and achieve stability for the system, the
integral time absolute error (ITAE) [31] was selected for checking system performance, optimal gains of
suggested controller are tuned by SOA tuning method with try to minimizing the magnitude of the fitness
function ITAE used [32], and it is defined in (25) by cheking the system error value continuously.
๐ผ๐๐ด๐ธ = โซ ๐ก|e|
โ
0
๐๐ก (25)
Figure 4 indicates the AQM system based on SOA and ,the flowchart of SOA is explained in Figure 5.
Figure 4. AQM system based on SOA
Figure 5. Flowchart of SOA
6. ๏ฒ ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 21, No. 5, October 2023: 997-1004
1002
5. SIMULATON RESULTS
The simulation results for the AQM system using the suggested controller is presented in this section
using Matlab/Simulink to analyze system performance based on suggested controller and the SOA then
compared it with the two conventional controller (optimal PI and Classical PI controllers). The first controller
is tuned using SOA and the second one is manually tuned, the SOA variables initial values are indicated in
Table 2. The efficient response of the system based on nonlinear proposed controller is appeared clearly when
compared with the two controllers (optimal PI, classical PI) as shown in Figure 6 and the three controllers gains
is shown in Table 3. Then this comparison is analyzed based on the results of response analysis obtained for
the three and it is shown Table 4.
Table 2. SOA parameters
Description Value
Population number 50
Maximum iteration number 30
Variables 3
Figure 6. The AQM system response based on all controllers
Table 3. The three controllerโs gains
Controller ๐พ๐ ๐พ๐ผ1 ๐พ๐
Classical PI 0.0000042 0.000009 -
Optimal PI 0.0000083 0.000074 -
Nonlinear PI 0.0091 0.00451 0.00285
Table 4. Response analysis results for the three controllers
Controller Maximum vershoot (๐๐ %) Peak time (๐๐) Rise time (๐ก๐) Settling time (๐ก๐ )
Normal PI 18.33 7.05 2.95 4.4
Optimal PI 7.5 7.15 3.32 4.8
Adaptive PI 0 3.75 1.975 3.4
As indicated in response analysis results in Table 4 the normal PI controller and the optimal PI
controller is similar in there evaluation parameters with small different in their values (355 packets and this led
to overshoot with 18.33% for the normal PI and 322.5 with 7.5% overshoot) while the nonlinear PI controller
is different from these two controllers by its fast response with stable behavior without any overshoot or noise
during simulated time this is due to the nonlinear function and the tuned ๐พ๐ variable value within the tanh
hyperbolic function that is used with the PI control which is regulate and stabilize controller behavior, ๐๐ value
is tuned using SOA algorithm. The fast settling time is appeared on nonlinear PI controller that makes the
system efficiently tracking the desired response, then the analysis of robustness to detect the stability of the
nonlinear controller, two test is done the first one is to monitor its ability in tracking the desired system response
in a stable manner by changing the value of queue size each 50 sec, the propsed controller solves this change
in queue size value regularly and give a stable response in spite of changing desired queue size applied as
shown in Figure 7, while the second test is done by changing the number of TCP sessions from its original
value ๐ = 60 to a ยฑ 20% from its original value (+20% equal 72 and -20% equal 48), it can be seen that the
system response is affected when changing system TCP sessions as indicated in Figure 8, when it is increased
to 72 it will suffer from slow response as compared with the original system while when it is decreased to 48
it will suffer from overshoot with value of 8.5 % and needs 10 sec to return to its stable response.
7. TELKOMNIKA Telecommun Comput El Control ๏ฒ
Design and simulation an optimal enhanced PI controller for โฆ (Yousra Abd Mohammed)
1003
Figure 7. AQM system responses with changing
queue size
Figure 8. AQM system response with changing ๐
with ยฑ 20%
6. CONCLUSION
In this paper an intelligent snake optimization tuning algorithm is suggested to tune an enhanced PI
controller with a hyperbolic function to maintain AQM system congestion problem. The controller achieve a
smooth and stable performance for monitoring the system response desired value. A comparison analysis is
utilized with two classical controllers (optimal PI, normal PI) to show the stable and robust response of the
proposed controller based on transient response analysis (peak time, settling time, rise time and overshoot), then
to test system ability to solve problems or changes which may happen during communication a robustness tests
are applied to the system. The results showed an efficient response in saving the desired value of thje queue size
and reach to a stable and robust performance in maintaining the issue of congestion hat occur in AQM system.
REFERENCES
[1] R. Barzamini, M. Shafiee, and A. Dadlani, โAdaptive generalized minimum variance congestion controller for dynamic TCP/AQM
networks,โ Computer Communications, vol. 35, no. 2, pp. 170-178, 2012, doi: 10.1016/j.comcom.2011.08.010.
[2] H. A. -Jaber, โAn exponential active queue management method based on random early detection,โ Journal of Computer Networks
and Communications, 2020, doi: 10.1155/2020/8090468.
[3] B. P. Lee, R. K. Balan, L. Jacob, W. K. G. Seah, and A. L. Ananda, โAvoiding congestion collapse on the Internet using TCP
tunnels,โ Computer Networks, vol. 39, no. 2, pp. 207โ219, 2002, doi: 10.1016/S1389-1286(01)00311-5.
[4] A. A. Mahawish and H. J. Hassan, โSurvey on: A variety of AQM algorithm schemas and intelligent techniques developed for
congestion control,โ Indonesian Journal of Electrical Engineering and Computer Science (IJEECS), vol. 23, no. 3, pp. 1419โ1431,
2021, doi: 10.11591/ijeecs.v23.i3.pp1419-1431.
[5] M. Z. Al-Faiz and S. A. Sadeq, โParticle Swarm Optimization Based Fuzzy-Neural Like PID Controller for TCP/AQM Router,โ
Intelligent Control and Automation, vol. 3, no. 1, 2012, doi: 10.4236/ica.2012.31009.
[6] H. Ashtiani, H. M. Pour, and M. Nikpour, โActive queue management in TCP networks based on fuzzy-PID controller,โ Journal of
Applied Computer Science & Mathematics, vol. 6, no. 1, 2012. [Online]. Available: https://jacsm.ro/view/?pid=12_1
[7] M. Z. Al-Faiz and A. M. Mahmood, โFuzzy-Genetic controller for congestion avoidance in computer networks,โ Iraqi Journal of
Computers, Communications, Control, and Systems Engineering, vol. 11, no. 2, pp. 20-27, 2011. [Online]. Available:
https://ijccce.uotechnology.edu.iq/article_46361.html
[8] M. Z. Al-Faiz and S. S. Sabry, โOptimal linear quadratic controller based on genetic algorithm for TCP/AQM router,โ 2012
International Conference on Future Communication Networks, 2012, pp. 78-83, doi: 10.1109/ICFCN.2012.6206877.
[9] Q. Xu, G. Ma, K. Ding, and B. Xu, โAn Adaptive Active Queue Management Based on Model Predictive Control,โ in IEEE Access,
vol. 8, pp. 174489-174494, 2020, doi: 10.1109/ACCESS.2020.3025377.
[10] S. A. Eissa, S. W. Shneen, and E. H. Ali, โFlower Pollination Algorithm to Tune PID Controller of TCP/AQM Wireless Networksโ,
Journal of Robotics and Control (JRC), vol. 4, no. 2, 2023, doi: 10.18196/jrc.v4i2.17533.
[11] A. A. A. -Shareha, โEnhanced random early detection using responsive congestion indicators,โ International Journal of Advanced
Computer Science and Applications (IJACSA), vol. 10, no. 3, 2019, doi: 10.14569/IJACSA.2019.0100347.
[12] M. M. Abualhaj, A. A. A. -Shareha, and M. M. Al-Tahrawi, โFLRED: an efficient fuzzy logic based network congestion control
method,โ Neural Computing and Applications, vol. 30, pp. 925-935, 2018, doi: 10.1007/s00521-016-2730-9.
[13] A. Alsaaidah, M. Zalisham, M. Fadzli, and H. A. -Jaber, โMarkov-modulated bernoulli-based performance analysis for gentle BLUE
and BLUE algorithms under bursty and correlated traffic,โ Journal of Computer Science, vol. 12, no. 6, pp. 289-299, 2016,
doi: 10.3844/jcssp.2016.289.299.
[14] C. Brandauer, G. Iannaccone, C. Diot, T. Ziegler, S. Fdida, and M. May, โComparison of tail drop and active queue management
performance for bulk-data and Web-like Internet traffic,โ Proceedings. Sixth IEEE Symposium on Computers and Communications,
2001, pp. 122-129, doi: 10.1109/ISCC.2001.935364.
[15] M. Welzl, Network Congestion Control, Managing Internet Traffic, England : John Wiley & Sons, Ltd, 2005. [Online]. Available:
http://pws.npru.ac.th/sartthong/data/files/Traffic__Wiley_Series_on_Communications_Networking.pdf
[16] M. K. Oudah, M. Q. Sulttan, and S. W. Shneen, โFuzzy type 1 PID controllers design for TCP/AQM wireless networks,โ Indonesian
Journal of Electrical Engineering and Computer Science, vol. 21, no. 1, pp. 118-127, 2021, doi: 10.11591/ijeecs.v21.i1.pp118-127.
[17] V. Misra, W. -B. Gong, and D. Towsley, โFluid-based analysis of a network of AQM routers supporting TCP flows with an
application to RED,โ SIGCOMM '00: Proceedings of the conference on Applications, Technologies, Architectures, and Protocols
for Computer Communication, 2000, pp. 151-160, doi: 10.1145/347059.347421.
[18] S. K. Bisoy, P. K. Pattnaik, M. Sain, and D. -U. Jeong, โA Self-Tuning Congestion Tracking Control for TCP/AQM Network for
Single and Multiple Bottleneck Topology,โ IEEE Access, vol. 9, pp. 27723-27735, 2021, doi: 10.1109/ACCESS.2021.3056885.
8. ๏ฒ ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 21, No. 5, October 2023: 997-1004
1004
[19] S. S. Sabry and N. M. Kaittan, โGrey wolf optimizer based fuzzy-PI active queue management design for network congestion
avoidance,โ Indonesian Journal of Electrical Engineering and Computer Science (IJEECS), vol. 18, no. 1, pp. 199-208, 2020,
doi: 10.11591/ijeecs.v18.i1.pp199-208.
[20] C. V. Hollot, V. Misra, D. Towsley, and W. -B. Gong, โA control theoretic analysis of RED,โ Proceedings IEEE INFOCOM 2001.
Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications
Society, 2001, vol. 3, pp. 1510-1519, doi: 10.1109/INFCOM.2001.916647.
[21] L. H. Abood, B. K. Oleiwi, A. J. Humaidi, A. A. Al-Qassar, and A. S. M. Al-Obaidi, โDesign a robust controller for congestion
avoidance in TCP/AQM system,โ Advances in Engineering Software, vol. 176, 2023, doi: 10.1016/j.advengsoft.2022.103395.
[22] M. I. Berbek and A. A. Oglah, โAdaptive neuro-fuzzy controller trained by genetic-particle swarm for active queue management in
internet congestion,โ Indonesian Journal of Electrical Engineering and Computer Science (IJEECS), vol. 26, no. 1, pp. 229-242,
2022, doi: 10.11591/ijeecs.v26.i1.pp229-242.
[23] L. Hattim, E. H. Karam, and A. H. Issa, โImplementation of Self Tune Single Neuron PID Controller for Depth of Anesthesia by
FPGA,โ in New Trends in Information and Communications Technology Applications: Third International Conference, NTICT
2018, 2018, pp. 159-170, doi: 10.1007/978-3-030-01653-1_10.
[24] W. E. A. -Lateef, Y. N. I. Alothman, and S. A. -H. Gitaffa, โAn optimal motion path planning control of a robotic manipulator based
on the hybrid PI-sliding mode controller,โ Bulletin of Electrical Engineering and Informatics (BEEI), vol. 12, no. 2, pp. 727-737,
2023, doi: 10.11591/eei.v12i2.3968.
[25] H. I. Ali, and A. H. Saeed, โRobust PI-PD Controller Design for Systems with Parametric Uncertainties,โ Engineering and
Technology Journal, vol. 34, no. 11, pp. 2167โ2173, 2016, doi: 10.30684/etj.34.11A.20.
[26] L. H. Abood and R. Haitham, โDesign an Optimal Fractional Order PI Controller for Congestion Avoidance in Internet Routers,โ
Mathematical Modelling of Engineering Problems, vol. 9, no. 5, pp. 1321โ1326, 2022, doi: 10.18280/mmep.090521.
[27] D. Pathak, S. Bhati, and P. Gaur, โFractionalโorder nonlinear PID controller based maximum power extraction method for a directโdriven
wind energy system,โ International Transactions on Electrical Energy Systems, vol. 30, no. 12, 2020, doi: 10.1002/2050-7038.12641.
[28] E. H. Ali, A. H. Reja, and L. H. Abood, โDesign hybrid filter technique for mixed noise reduction from synthetic aperture radar imagery,โ
Bulletin of Electrical Engineering and Informatics (BEEI), vol. 11, no. 3, pp. 1325-1331, 2022, doi: 10.11591/eei.v11i3.3708.
[29] F. A. Hashim and A. G. Hussien, โSnake Optimizer: A novel meta-heuristic optimization algorithm,โ Knowledge-Based Systems,
vol. 242, 2022, doi: 10.1016/j.knosys.2022.108320.
[30] M. Rawa, โTowards Avoiding Cascading Failures in Transmission Expansion Planning of Modern Active Power Systems Using
Hybrid Snake-Sine Cosine Optimization Algorithm,โ Mathematics, vol. 10, no. 8, 2022, doi: 10.3390/math10081323.
[31] L. H. Abood, โOptimal modified PID controller for automatic voltage regulation system,โ in AIP Conference Proceedings, 2022,
vol. 2415, doi: 10.1063/5.0092583.
[32] L. H. Abood, N. N. Kadhim, and Y. A. Mohammed, โDual stage cascade controller for temperature control in greenhouse,โ Bulletin
of Electrical Engineering and Informatics (BEEI), vol. 12, no. 1, pp, 51-58, 2023, doi: 10.11591/eei.v12i1.4328.
BIOGRAPHIES OF AUTHORS
Yousra Abd Mohammed is a lecturer at the Communication Engineering
Department, University of Technology-Baghdad, Iraq since 2005. She received her B.Sc. in
Electronic and Communication Engineering from Technology University/Baghdad, Iraq in
1992 and her M.Sc. degree in Computer Engineering from Technology University/Baghdad
in 2004. Her research interests include Control Systems, Encryption and Decryption
Algorithms. She can be contacted at email: yousra.a.mohammed@uotechnology.edu.iq.
Layla H. Abood received her B.Eng. and M.Sc. and PHD degrees in Electronic and
Communication Engineering from the University of Technology- Baghdad. She is currently an
Academic staff member in the Department of Control and System Engineering, University of
Technology, Baghdad, Iraq. Her research interests are Artificial Intelligent, Control Systems,
System Modeling, Optimization Techniques, IoT, Image processing, Robotics, Microcontrollers,
FPGA and Embedded systems. She can be contacted at email: 60066@uotechnology.edu.iq.
Nahida Naji Kadhim received B.Sc. and M.Sc. degrees in Control Engineering
and Mechatronics Engineering from Control and Systems Engineering Department in 1993
and 2005 respectively, University of Technology-Baghdad, Iraq. She is currently an academic
staff member in the Department of Control and Systems engineering. University of
Technology, Baghdad, Iraq. Her researcher interests are Control System, Robotic System,
Identification System and Artificial Inelegant. She can be contacted at email:
nahida.n.kadhim@uotechnology.edu.iq.