DC motors are commonly employed in many industrial applications due to their various advantages. This study aims to compare the response of the Oustaloup-Recursive-Approximation (ORA) and El-Khazali’s approximation method in controlling a DC motor with a FOPID controller. The two employed methods are used to design the FOPID and approximate. For various fractional orders, many behaviours are presented. A simulation comparison between these methods is performed regarding overshoot, settling time and rise time. © 2022 IEEE.
Blind Watermarking Using DCT and Fractional-Order Lorenz System
This paper presents a new blind watermarking system based on the Discrete Cosine Transform (DCT). The system’s security is increased by encrypting the watermark image using the fractional-order Lorenz system. After converting the cover image to the YCbCr color domain, DCT is applied on the Y channel and embedding of the encrypted watermark is performed in the frequency domain. The fractional-order Lorenz system has more parameters than the integer order system, which increase the length of the system key and make it secure against brute-force attacks. Although blind detection of the watermark is not easy, the proposed algorithm successfully detects the hidden watermark by using statistical properties of the DCT coefficients. Standard imperceptibility and robustness measures are used to evaluate the proposed system, and the results are good. © 2022 IEEE.
On Fractional-order Capacitive Wireless Power Transfer System
Wireless power transfer is becoming an increasingly viable solution for the electrical powering of various electronic gadgets. However, precise outputs are not guaranteed with integer systems, so fractional-order capacitors are vital. This paper studies a four-plate fractional capacitive power transfer system by varying six orders of capacitors between the plates along with the load resistance. A mathematical model based on a 4× 4 mutual fractional capacitance matrix is established for equidistantly placed four identical metal plates. Moreover, the chosen circuit topology is identified and analyzed based on the proposed model. © 2022 IEEE.
A Unified System for Encryption and Multi-Secret Image Sharing Using S-box and CRT
Multi-Secret Image Sharing (MSIS) is used when multiple images need to be shared to multiple participants, but the images can not be recovered without the presence of all shares. In this paper, a unified system for performing encryption and (n,n)-MSIS is proposed. While MSIS is based on the XOR operation, encryption combines the utilization of Chinese Remainder Theorem (CRT), SHA-256, and S-box for improved security. The same designed system is used for the generation of secret shares and the recovery of secret images. In addition, a sensitive system key is designed where three pairwise relatively prime subkeys are automatically generated for utilization in the CRT. The resulting secret shares pass statistical evaluation criteria such as RMSE, correlation, and entropy, and give good results for differential attack measures, and runtime. In addition, the proposed system succeeds in passing the NIST SP-800-22 statistical test suite and key sensitivity measures. © 2022 IEEE.
PRNG Using Primitive Roots of Primes and its Utilization in Chess-based Image Encryption
Recently, number theory has proved its importance in cryptography because of its well-known hard problems. For instance, a primitive root for a prime number shows a special property of uniqueness when raised to different powers mod the prime number. In this paper, a Pseudorandom Number Generator (PRNG) is designed based on this property using a prime number and some of its primitive roots. The PRNG is, first, validated for utilization in cryptography applications using histograms, correlation coefficients, and the National Institute of Standards and Technology (NIST) statistical test suite. Then, the PRNG is utilized in an image encryption system and the system security is tested using statistical measures, differential attack measures, and sensitivity to one-bit change. The results are promising and in the expected good ranges. © 2022 IEEE.
Generic Hardware Realization of K Nearest Neighbors on FPGA
K Nearest Neighbors (KNN) algorithm is a straight-forward yet powerful Machine Learning (ML) tool widely used in classification, clustering, and regression applications. In this work, KNN is applied, with three distance metrics, to classify different datasets, experimentally testing each distance metric effect on the classification performance. A static K is applied for the whole dataset optimally chosen based on a 5-fold cross-validation. A reconfigurable hardware realization on field programmable gate array (FPGA) of each distance metric applying selection sort algorithm is proposed. The FPGA realization reaches a throughput up to 4.44 Gbit/sec while only occupying 1% of the Genesys 2 Kintex-7 board area. The algorithm managed to classify all the tested datasets with above 90% accuracy. © 2022 IEEE.
Registerless Multiplierless YCoCg-R and YCoCg Color Space Converters Hardware Implementation
Multimedia data, e.g., images and videos, are widely used over the internet and on computers. Image processing applications require color space conversion to be able to deal with these types of data more efficiently. This paper investigates three color space conversions and proposes simplified combinational hardware designs and FPGA realizations for RGB to YCoCg-R and YCoCg color spaces encoders and decoders and compares them to their sequential counterparts. The proposed hardware design for the encoders and decoders uses only adders and subtractors without any registers or multipliers. The proposed YCoCg-R converter exhibits better resources utilization compared to implementing the design using shift registers, where it uses 56.3% and 72.1% less LUTs and FFs, respectively. Similarly for the YCoCg color space, the combinational design used 48.1% less LUTs and 67.8% less FFs than its sequential counterpart. © 2022 IEEE.
A Secured Lossless Visual Secret Sharing for Color Images Using Arnold Transform
Nowadays, with the rapid growth in information, a fast and secure method is eagerly needed to share images. (n, n)-Visual Secret Sharing (VSS) is used to share a secret image into n shares, where the secret can only be recovered using all the n shares and the recovery must be fast with low computational complexity. This paper proposes a secured lossless (n, n)-VSS system based on Arnold transform and pixel vectorization suitable to be used with binary, grayscale and color images. Multiple security tests were performed such as entropy, correlation, Mean Squared Error (MSE), National Institute of Standards and Technology (NIST) SP-800-22 statistical suite, and differential attacks, which demonstrate the good security of the proposed system. In addition, the time complexity and runtime of the recovery system indicate good efficiency. © 2022 IEEE.
Modified fractional-order model for biomass degradation in an up-flow anaerobic sludge blanket reactor at Zenein Wastewater Treatment Plant
This paper presents a modified fractional-order model (FOM) for microorganism stimulation in an up-flow anaerobic sludge blanket (UASB) reactor treating low-strength wastewater. This study aimed to examine the famine period of methanogens due to biomass accumulation in the UASB reactor over long time periods at a constant organic loading rate (OLR). This modified model can investigate the substrate biodegradation in a UASB reactor while considering substrate diffusion into biological granules during the feast and famine periods of methanogens. The Grünwald-Letnikov numerical technique was used to indicate the effect of biomass degradation on the biogas production rate and substrate biodegradation in a UASB reactor installed at Zenein Wastewater Treatment Plant (WWTP) in Giza, Egypt. Several fractional orders were applied in the dynamic model at biomass concentrations of 20 and 4 kg/ m3 in the reactor bed and blanket zones, respectively. An OLR of 0.9 kgCOD/ m3/ day using the calibrated kinetic parameters at 11 ?C was applied to comply with the experimental outcomes. The simulation results indicate that the removal efficiency of chemical oxygen demand (COD) was maintained at approximately 55 – 65 % , whereas the biogas production rate declined from 0.35 to 0.05 m3CH4/ kgCODr in the reactor bed zone due to a decline in food to microorganism (F/M) ratio from 0.04 to 0.018 d- 1 during the sludge retention time (SRT) in the UASB reactor. © 2022, The Author(s), under exclusive licence to Springer-Verlag GmbH Germany, part of Springer Nature.
Review of activated carbon adsorbent material for textile dyes removal: Preparation, and modelling
Water contamination with colours and heavy metals from textile effluents has harmed the ecology and food chain, with mutagenic and carcinogenic effects on human health. As a result, removing these harmful chemicals is critical for the environment and human health. Various standard physicochemical and biological treatment technologies are used; however, there are still some difficulties. Adsorption is described as a highly successful technology for removing contaminants from textile-effluents wastewater compared to other methods. Several adsorbent materials, including nanomaterials, natural materials, and biological biomasses, are identified as effective adsorbents for textile effluents. Activated carbon preparation from these different adsorbents is an excellent pre-treatment to remove the adsorption capacity. Therefore, through this study various adsorbent types, especially activated carbon adsorbents will be discussed in addition to the factors affecting adsorption and models applied for optimising the adsorption process. © 2022