Different Approximation Techniques For A FOPID Feedback Control of a DC Motor

DC motors are commonly employed in many industrial applications due to their various advantages. This study aims to compare the response of the Oustaloup-Recursive-Approximation (ORA) and El-Khazali’s approximation method in controlling a DC motor with a FOPID controller. The two employed methods are used to design the FOPID and approximate. For various fractional orders, many behaviours are presented. A simulation comparison between these methods is performed regarding overshoot, settling time and rise time. © 2022 IEEE.

Blind Watermarking Using DCT and Fractional-Order Lorenz System

This paper presents a new blind watermarking system based on the Discrete Cosine Transform (DCT). The system’s security is increased by encrypting the watermark image using the fractional-order Lorenz system. After converting the cover image to the YCbCr color domain, DCT is applied on the Y channel and embedding of the encrypted watermark is performed in the frequency domain. The fractional-order Lorenz system has more parameters than the integer order system, which increase the length of the system key and make it secure against brute-force attacks. Although blind detection of the watermark is not easy, the proposed algorithm successfully detects the hidden watermark by using statistical properties of the DCT coefficients. Standard imperceptibility and robustness measures are used to evaluate the proposed system, and the results are good. © 2022 IEEE.

On Fractional-order Capacitive Wireless Power Transfer System

Wireless power transfer is becoming an increasingly viable solution for the electrical powering of various electronic gadgets. However, precise outputs are not guaranteed with integer systems, so fractional-order capacitors are vital. This paper studies a four-plate fractional capacitive power transfer system by varying six orders of capacitors between the plates along with the load resistance. A mathematical model based on a 4× 4 mutual fractional capacitance matrix is established for equidistantly placed four identical metal plates. Moreover, the chosen circuit topology is identified and analyzed based on the proposed model. © 2022 IEEE.

A Unified System for Encryption and Multi-Secret Image Sharing Using S-box and CRT

Multi-Secret Image Sharing (MSIS) is used when multiple images need to be shared to multiple participants, but the images can not be recovered without the presence of all shares. In this paper, a unified system for performing encryption and (n,n)-MSIS is proposed. While MSIS is based on the XOR operation, encryption combines the utilization of Chinese Remainder Theorem (CRT), SHA-256, and S-box for improved security. The same designed system is used for the generation of secret shares and the recovery of secret images. In addition, a sensitive system key is designed where three pairwise relatively prime subkeys are automatically generated for utilization in the CRT. The resulting secret shares pass statistical evaluation criteria such as RMSE, correlation, and entropy, and give good results for differential attack measures, and runtime. In addition, the proposed system succeeds in passing the NIST SP-800-22 statistical test suite and key sensitivity measures. © 2022 IEEE.

PRNG Using Primitive Roots of Primes and its Utilization in Chess-based Image Encryption

Recently, number theory has proved its importance in cryptography because of its well-known hard problems. For instance, a primitive root for a prime number shows a special property of uniqueness when raised to different powers mod the prime number. In this paper, a Pseudorandom Number Generator (PRNG) is designed based on this property using a prime number and some of its primitive roots. The PRNG is, first, validated for utilization in cryptography applications using histograms, correlation coefficients, and the National Institute of Standards and Technology (NIST) statistical test suite. Then, the PRNG is utilized in an image encryption system and the system security is tested using statistical measures, differential attack measures, and sensitivity to one-bit change. The results are promising and in the expected good ranges. © 2022 IEEE.

Generic Hardware Realization of K Nearest Neighbors on FPGA

K Nearest Neighbors (KNN) algorithm is a straight-forward yet powerful Machine Learning (ML) tool widely used in classification, clustering, and regression applications. In this work, KNN is applied, with three distance metrics, to classify different datasets, experimentally testing each distance metric effect on the classification performance. A static K is applied for the whole dataset optimally chosen based on a 5-fold cross-validation. A reconfigurable hardware realization on field programmable gate array (FPGA) of each distance metric applying selection sort algorithm is proposed. The FPGA realization reaches a throughput up to 4.44 Gbit/sec while only occupying 1% of the Genesys 2 Kintex-7 board area. The algorithm managed to classify all the tested datasets with above 90% accuracy. © 2022 IEEE.

Registerless Multiplierless YCoCg-R and YCoCg Color Space Converters Hardware Implementation

Multimedia data, e.g., images and videos, are widely used over the internet and on computers. Image processing applications require color space conversion to be able to deal with these types of data more efficiently. This paper investigates three color space conversions and proposes simplified combinational hardware designs and FPGA realizations for RGB to YCoCg-R and YCoCg color spaces encoders and decoders and compares them to their sequential counterparts. The proposed hardware design for the encoders and decoders uses only adders and subtractors without any registers or multipliers. The proposed YCoCg-R converter exhibits better resources utilization compared to implementing the design using shift registers, where it uses 56.3% and 72.1% less LUTs and FFs, respectively. Similarly for the YCoCg color space, the combinational design used 48.1% less LUTs and 67.8% less FFs than its sequential counterpart. © 2022 IEEE.

A Secured Lossless Visual Secret Sharing for Color Images Using Arnold Transform

Nowadays, with the rapid growth in information, a fast and secure method is eagerly needed to share images. (n, n)-Visual Secret Sharing (VSS) is used to share a secret image into n shares, where the secret can only be recovered using all the n shares and the recovery must be fast with low computational complexity. This paper proposes a secured lossless (n, n)-VSS system based on Arnold transform and pixel vectorization suitable to be used with binary, grayscale and color images. Multiple security tests were performed such as entropy, correlation, Mean Squared Error (MSE), National Institute of Standards and Technology (NIST) SP-800-22 statistical suite, and differential attacks, which demonstrate the good security of the proposed system. In addition, the time complexity and runtime of the recovery system indicate good efficiency. © 2022 IEEE.

Arithmetic optimization approach for parameters identification of different PV diode models with FOPI-MPPT

The Maximum Power Point Tracker (MPPT) provides the most efficient use of a Photo-voltaic system independent of irradiance or temperature fluctuations. This paper introduces the modeling and control of a photo-voltaic system operating at MPPT using the arithmetic optimization algorithm (AOA). The single and double Photo-voltaic models are investigated. Their optimal unknown parameters are extracted using AOA based on commercial Photo-voltaic datasheets. A comparison is performed between these optimal parameters extracted by AOA and other optimization techniques presented in the literature. These parameters generate the P – V and I – V curves for the studied models considering the temperature factor. A good match is achieved relative to the manufacturer data. A DC-DC boost converter is used as a link between the PV modules and the load. The converter duty cycle is adjusted, varying the climatic conditions using three cases: without a controller, using PI controller, and using the fractional-order PI controller (FOPI). The AOA is employed to set the optimum controllers parameters to maintain the impedance matching between the PV modules and the load. The FOPI shows a significant improvement in controlling the system performance. © 2021 THE AUTHORS

Discrete fractional-order Caputo method to overcome trapping in local optima: Manta Ray Foraging Optimizer as a case study

Enhancing the exploration and exploitation phases of the metaheuristic (MH) optimization algorithms is the key to avoiding local optima. The Manta ray foraging optimizer is a recently proposed MH optimizer. The MRFO showed a good performance in the simple optimization problems. However, it is trapped into the local optimum in the more elaborated ones due to the original algorithm’s low capability in exploiting the optimal solutions and its convergence. From this principle, in this work, a novel variant of the Manta ray foraging optimizer has been proposed for global optimization problems, engineering design optimization problems, and multi-threshold segmentation. In the proposed approach, the fractional calculus (FC) using Caputo fractional differ-sum operator has been adopted to enhance the manta rays movement in the exploitation phase via utilizing history dependency of FC to boost exploiting the optimal solutions via sharing the past knowledge over the optimization process. Moreover, to avoid premature convergence, the somersault factor has been adaptively tuned. The fractional-order Caputo Manta-Ray Foraging Optimizer (FCMRFO) has been proposed. The proposed algorithm’s sensitivity for the FC coefficients has been tested with ten-dimensional CEC2017 benchmarks. The scalability test of the proposed algorithm has been performed with 30, 50 and 100-dimensional CEC2017. Moreover, CEC2020 benchmarks with dimensions 5 and 20 have been applied for providing an extensive investigation, and the FCMRFO has been compared with recent state-of-the-art algorithms. Through utilizing the non-parametric statistical analysis and ranking test, the FCMRFO confirms its superiority and ability to avoid the local optimum in several cases. For the second part of the study, three constrained engineering design problems have been investigated; then, numerous natural images are applied to appraise the FCMRFO for multilevel threshold image segmentation. By performing several metrics, the FCMRFO proves its quality and efficiency compared to recent well-regarded algorithms in engineering applications and image segmentation. © 2021