about.jpg

Filter by

Fractional Order Two Degree of Freedom PID Controller for a Robotic Manipulator with a Fuzzy Type-2 Compensator

In this paper a novel strategy for the position control and trajectory tracking of robotic manipulators is proposed. This strategy consists of an independent two degree of freedom PID controller for a two links robotic arm. Due to the capability of two degree of freedom PID controllers to deal with disturbances, each link is controlled independently considering that the disturbance does not affect

Artificial Intelligence
Circuit Theory and Applications
Mechanical Design

Two-Degree of Freedom Proportional Integral Derivative (2-DOF PID) Controller for Robotic Infusion Stand

Infusion Stand is one of the medical supportive tools in the field of biomedical that assist in holding and carrying medications to patients via intravenous injections. Mobilization of Infusion Stand from a place to another place is necessary not only for the patients itself but also for the nurses. Therefore, this leads to not only uneasiness but also inconvenience for both parties. Therefore, to

Artificial Intelligence
Circuit Theory and Applications
Software and Communications

Center pulse width modulation implementation based on memristor

This paper introduces two new versions for memristor-based center pulse-width modulator (PWM) circuits. The proposed circuits use only one comparator which reduces the circuit complexity and power dissipation compared to a former work. The first design is based on two memristors and two resistors while the second design is based on four memristors. Theoretical analysis is provided, and the

Circuit Theory and Applications
Software and Communications

Architectures and Challenges Towards Software Defined Cloud of Things (SDCoT)

Last decade witnessed a growth on developing of IoT architecture models to cope with various challenges and domains requirements. This leads to rapid increasing the number of the connected devices, which means large amount of data are needed to be stored and processed. Form this context, Cloud Computing is emerged as a solution to enable centrally unlimited storage of data and programs with the

Circuit Theory and Applications
Software and Communications

Comparative Study of Two Level and Three Level PWM-Rectifier with Voltage Oriented Control

This article presents performance evaluation and comparison between Voltage Oriented Control (VOC) methods for PWM-rectifiers, two levels and three levels, in order to demonstrate the great advantages of using a three-level Neutral Point Clamped (NPC). The control of the DC bus voltage is carried out using the PI controller. The effectiveness of this approach is illustrated by simulation results

Circuit Theory and Applications
Software and Communications

FPGA realization of a speech encryption system based on a generalized modified chaotic transition map and bit permutation

This paper proposes a generalized modified chaotic transition map with three independent parameters. A hardware speech encryption scheme utilizing this map along with a bit permutation network is presented. While the transition map’s generalization introduces additional parameters, the modification enhances its chaotic properties and overcomes the finite range of the control parameter and

Circuit Theory and Applications
Software and Communications

Reconfigurable chaotic pseudo random number generator based on FPGA

This paper presents an FPGA Pseudo Random Number Generator (PRNG) that is based on the Lorenz and Lü chaotic systems. These two systems are used to generate four different 3D chaotic attractors. One attractor is generated from Lorenz while the other three attractors are generated from Lü. The output attractor of the proposed PRNG can be reconfigured during real time operation using an efficient

Circuit Theory and Applications
Software and Communications

Cad tool for two-digit ternary functions design

Ternary number, which attracts the research attention for its high capacity, has emerged in many applications, recently. Unlike binary numbers, two bit ternary number involves 93 = 729 different functions while two bit binary number involves only 42 = 16 different possible functions. In this paper, a novel automatic software description two bits ternary functions design tool is presented

Circuit Theory and Applications
Software and Communications

Towards Mobility-Aware Proactive Caching for Vehicular Ad hoc Networks

Harnessing information about the user mobility pattern and daily demand can enhance the network capability to improve the quality of experience (QoE) at Vehicular Ad- Hoc Networks (VANETs). Proactive caching, as one of the key features offered by 5G networks, has lately received much interest. However, more research is still needed to convey large-sized multimedia content including video, audio

Circuit Theory and Applications
Software and Communications

Content Delivery in Mobility-Aware D2D Caching Networks

The massive data exchange between base stations and network backhaul creates a strong overhead on mobile networks, especially at peak times. This motivates researchers to think about the proactive caching concept which depends mainly on caching some of the expected data items during off-peak times. The caching problem consists of two distinct phases, placement phase and delivery phase. In this

Circuit Theory and Applications
Software and Communications