11 research outputs found

    UDC 004.4’2, DOI: 10.2298/csis0902141E The Adaptive Fuzzy Designed PID Controller using Wavelet Network

    No full text
    Abstract. During the past several years, fuzzy control has emerged as one of the most active and fruitful areas for research in the applications of the fuzzy set theory, especially in the realm of the industrial processes, which do not lend themselves to control by conventional methods because of a lack of quantitative data regarding the inputoutput relations i.e., accurate mathematical models. The fuzzy logic controller based on wavelet network provides a means of converting a linguistic control strategy based on expert knowledge into an automatic strategy. In the available literature, one can find scores of papers on fuzzy logic based controllers or fuzzy adaptation of PID controllers. However, relatively less number of papers is found on fuzzy adaptive control, which is not surprising since fuzzy adaptive control is relatively new tool in control engineering. In this paper, fuzzy adaptive PID controller with wavelet network is discussed in subsequent sections with simulations. An adaptive neural network structure was proposed. Thi

    M. J. AQEL et al.: MULTIDIMENSIONAL ENCRYPTION ALGORITHM MULTIDIMENSIONAL ENCRYPTION ALGORITHM FOR COMPUTER NETWORKS

    No full text
    Abstract: The paper proposes a multidimensional encryption algorithm for security in computer networks. The work in this paper is intended to be quite different from the security algorithms used today, like WEP (Wireless Equivalent Privacy), 802.1X and so on. With Quality of Protection (QoP) as a major consideration, the same security effectiveness of former predecessor algorithms can be achieved. The algorithm can be used at different levels of security based on the degree of security required. This degree of security is divided into four levels, three of which are based on block cipher and the fourth is based on stream cipher approach. Since the algorithm is developed based on symmetric key approach, it could also be used for decryption with different and extra complexities
    corecore