Menoufia University, Faculty of Electronic Engineering
Menoufia Journal of Electronic Engineering Research
1687-1189
26
1
2017
01
01
Modified Recovery Algorithms Using proposed algorithm for Compressive Sampling
1
20
63112
10.21608/mjeer.2017.63112
EN
Wafaa
Shalaby
Faculty of Electronic Engineering, Menoufia University, Menouf 32952, Egypt
Waleed
Saad
Faculty of Electronic Engineering, Menoufia University, Menouf 32952, Egypt
Mona
Shokair
Faculty of Electronic Engineering, Menoufia University, Menouf 32952, Egypt
Moawad
Dessouky
Faculty of Electronic Engineering, Menoufia University, Menouf 32952, Egypt
Journal Article
2016
03
31
Compressive sampling (CS) has been an effective research<br />area which plays an efficient role in many applications such as<br />cognitive radio, imaging, radar and many other applications. In<br />CS only a small number of linear measurements are used for<br />reconstruction of the signal. The significant condition for dealing<br />with compressed sensing system is that the signal in the input<br />must be sparse. Most signals in nature are sparse or can be<br />transformed to sparse by using any transform domain. This<br />paper modifies all the recovery algorithms by using the<br />proposed complex to real transformation algorithm. Conversion<br />from not sparse signal to sparse by using Fourier transform will<br />produce complexity, where this complexity can be removed<br />using complex to real transformation algorithm and then<br />applying it on all recovery algorithms to enhance their<br />performance. By using the proposed algorithm, the sparse<br />signal will be recovered in minimum error and less time. Also,<br />the signal to error ratio from the recovery process is increased.
Menoufia University, Faculty of Electronic Engineering
Menoufia Journal of Electronic Engineering Research
1687-1189
26
1
2017
01
01
An Efficient Scalable Hybrid Proposed MAC Protocol for M2M Networks
21
36
63113
10.21608/mjeer.2017.63113
EN
Eman
Hegazy
Dept. of Electrical and Communication Engineering, Faculty of Electronic Engineering, Menoufia University, Egypt
Waleed
Saad
Dept. of Electrical and Communication Engineering, Faculty of Electronic Engineering, Menoufia University, Egypt
Mona
Shokair
Dept. of Electrical and Communication Engineering, Faculty of Electronic Engineering, Menoufia University, Egypt
Said
El Halafawy
Dept. of Electrical and Communication Engineering, Faculty of Electronic Engineering, Menoufia University, Egypt
Journal Article
2016
04
17
Machine to Machine (M2M) refers to the technology that allows the devices to communicate autonomously with other devices over the wired or wireless systems. Neither the contention based Medium Access Control (MAC) protocols nor the reservation based MAC protocols can provide a flexible, scalable solution for M2M networks that contain a large number of the devices. In this paper, a proposed hybrid MAC protocol for M2M network will be suggested which combines the main features of two different protocols. It composes of three main parts: Notification Period, Contention Period, and Transmission Period. Different devices contend on the transmission opportunities with the same contending probability during the Contention Period based on Non-persistent Carrier Sense Multiple Access (NP-CSMA) mechanism. During the transmission period, only the successful devices will reserve a time slots to transmit its data packet based on Time Division Multiple Access (TDMA) reservation based mechanism. Moreover, the proposed protocol performance can be measured in terms of three metrics: throughput, average delay time, and Packet Delivery Ratio. Extensive MATLAB programs are done to present a comparison between the Proposed Protocol with other conventional protocols.
Menoufia University, Faculty of Electronic Engineering
Menoufia Journal of Electronic Engineering Research
1687-1189
26
1
2017
01
01
Bidirectional Amplification Technique and AcoustoOptic Filter for Upgrading Ultra-High Capacity Optical Transmission Systems
37
52
63414
10.21608/mjeer.2017.63414
EN
Ahmed Nabih Zaki
Rashed
Dept. of Electronics and Electrical Communications Engineering,
Faculty of Electronic Engineering, Menouf 32951, Menoufia University, EGYPT.
Abd El–Naser A
Mohamed
Dept. of Electronics and Electrical Communications Engineering,
Faculty of Electronic Engineering, Menouf 32951, Menoufia University, EGYPT.
Shimaa
El-Meadawy
Dept. of Electronics and Electrical Communications Engineering,
Faculty of Electronic Engineering, Menouf 32951, Menoufia University, EGYPT.
Journal Article
2016
05
26
<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;">This paper presents high transmission bit rate based on both<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> bidirectional erbium doped fiber amplifiers (EDFAs) and<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> acousto-optic filters using different modulation coding<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> techniques. The performance parameters such as gain flatness,<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> Quality factor, bit error rate, output power, gain with and without<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> acousto-optic filters with EDFA length variation, core radius,<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> pumping power, pumping wavelength, ion density, doping<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> radius, numerical aperture and ambient temperature can be<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> measured. The optimum values for the maximum gain flatness<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> can be obtained with the best modulation format and different<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> number of channels.<br style="font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: -webkit-auto; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px;" /></span></span></span></span></span></span></span></span></span></span></span>
Menoufia University, Faculty of Electronic Engineering
Menoufia Journal of Electronic Engineering Research
1687-1189
26
1
2017
01
01
Mushroom-like Electromagnetic Band Gap based Polarization Converters for Millimeter Wave Applications
53
66
63416
10.21608/mjeer.2017.63416
EN
Ahmad A.
Hassan
Faculty of Electronic Engineering, Menoufia University, Egypt
A. S.
Elkorany
Faculty of Electronic Engineering, Menoufia University, Egypt
Demyana A.
Saleeb
Faculty of Engineering, Kafr ElShiekh University Egypt rsity.
Journal Article
2016
08
04
<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;">Developments in radar navigation and remote sensing required<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> rugged and inexpensive location markers and calibration targets<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> with very large radar cross sections and a specified polarization<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> response. Passive radar targets derived from corner reflectors<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> were considered for this application. These targets require<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> polarization converters for their operation. Conventional<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> converters suffer from heavy weight, complicated structure,<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> losses, and/or limited bandwidth. Polarization converters made<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> of electromagnetic band gap materials are low profile, light<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> weight, efficient, and have large bandwidth. The work presented<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> here is a development of a simple procedure for the design of<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> these converters. The requirements for polarization<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> transformation are derived. The design procedure is outlined.<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> Mushroom-like electromagnetic band gap materials using<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> square patches are used. These materials are made<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> polarization dependent through making single slot or two slots in<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> the square patches. Detailed parametric study was conducted to<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> see the effect of different parameters upon reflection phase<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> difference. Polarization converters to transform linear<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> polarization to linear polarization with the reflected electric field<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> perpendicular to the incident electric field were designed.<br style="font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: -webkit-auto; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px;" /></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span>
Menoufia University, Faculty of Electronic Engineering
Menoufia Journal of Electronic Engineering Research
1687-1189
26
1
2017
01
01
RECONFIGURABLE POLARIZATION CONVERTERS USING EBG STRUCTURES WITH VARACTOR DIODES
67
78
63417
10.21608/mjeer.2017.63417
EN
Ahmed A.
Hassa
Faculty of Electronic Engineering, Menoufia University, Egypt.
Ahmed S.
Elkorany
Faculty of Electronic Engineering, Menoufia University, Egypt.
Demyana A.
Saleeb
Faculty of Engineering, Kafr ElShiekh University, Egypt
Journal Article
2016
05
11
<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;">A simple procedure for the design of polarization converters is<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> developed. The requirements for polarization transformation are<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> derived. The transmission line model for the converter is<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> presented and the design procedure is outlined. Reconfigurable<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> polarization converters with varactor diodesare designed to<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> transform a linearly polarized incident wave to a linearly<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> perpendicular polarized and to a circularly polarized reflected<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> waves are designed.FEM and FIT numerical techniques are<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> used to simulate the proposed EBG structures through HFSS,<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> and CST microwave studio respectively.<br style="font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: -webkit-auto; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px;" /></span></span></span></span></span></span></span></span></span></span>
Menoufia University, Faculty of Electronic Engineering
Menoufia Journal of Electronic Engineering Research
1687-1189
26
1
2017
01
01
Dynamic Recurrent Neural Network Based Indirect Adaptive Control for Nonlinear Systems
79
98
63423
10.21608/mjeer.2017.63423
EN
Mohamed A.
Hussien
Dept. of Industrial Electronics and Control Eng., Faculty of Electronic Engineering,
Menoufia University, Egypt
Tarek A.
Mahmoud
Dept. of Industrial Electronics and Control Eng., Faculty of Electronic Engineering,
Menoufia University, Egypt
Mohamed I.
Mahmoud
Dept. of Industrial Electronics and Control Eng., Faculty of Electronic Engineering,
Menoufia University, Egypt
Journal Article
2019
12
03
<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;">In this study, an indirect adaptive controller based on dynamic<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> recurrent neural network (DRNN) is developed in the form of the<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> internal model control structure. This control method includes<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> two learning phases, i.e., off-line and on-line learning. In the offline learning, the DRNN is learned by the epoch wise back<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> propagation through time (BPTT) method to represent the<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> forward dynamics of the system to be controlled. In the online<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> phase, the DRNN is used as the internal model of the controlled<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> system and its parameters can be trained by the Truncated<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> BPTT to cope with the possible change in the system dynamics.<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> Hence, the mathematical inversion of the DRNN internal model<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> is computed online to act as the forward controller. Finally, the<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> controller is then obtained by cascading this inverse model with<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> a robust filter and a linear compensator to improve the closed<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> loop performance. The proposed method is applied to a<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> continuous stirred tank reactor (CSTR) with time varying<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> behavior to evaluate the performance of controller.<br style="font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: -webkit-auto; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px;" /></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span>
Menoufia University, Faculty of Electronic Engineering
Menoufia Journal of Electronic Engineering Research
1687-1189
26
1
2017
01
01
Adaptive Hysteresis Active Power Filter using Fuzzy-Logic Controller for Nonlinear Systems
99
112
63429
10.21608/mjeer.2017.63429
EN
Yasser A. E
Lshrief
Dept. of Industrial Electronics and Automatic Control Engineering, Faculty of
Electronic Engineering, Menoufia University
Galal A.
Atlam
Dept. of Industrial Electronics and Automatic Control Engineering, Faculty of
Electronic Engineering, Menoufia University
Belal A.
Abozalalm
Dept. of Industrial Electronics and Automatic Control Engineering, Faculty of
Electronic Engineering, Menoufia University
Journal Article
2016
07
18
<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;">The widespread use of nonlinear loads is the main reason of<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> lower efficiency, poor power factor, Harmonic distortion<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> problems appear in the AC systems. In this paper, TakagiSugeno (TS) Fuzzy Logic Controller (FLC) is applied to a threephase Shunt Active Power Filter (SAPF) for improving the<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> performance of the non linear systems. The main advantage<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> that makes the FLCs distinguish over the other conventional<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> controllers like Proportional Integral (PI) controller is that it does<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> not need any mathematical model of the system. In this paper,<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> the FLC controller is mainly used to maintain the dc-side<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> capacitor voltage of the Voltage Source Inverter (VSI) nearly<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> constant. Furthermore, in this paper, the adaptive hysteresis<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> current controller (AHCC) is applied as a pulse widthmodulation (PWM) technique for switching signal generation.<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> Simulation and experimental results are performed using<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> MATLAB/SIMULINK, showing that the TS-FLC introduces a<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> better dynamic behavior than the conventional (PI) controller as<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> it has a strong robustness to the load changes and other<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> parameters of the system.<br style="font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: -webkit-auto; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px;" /></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span>
Menoufia University, Faculty of Electronic Engineering
Menoufia Journal of Electronic Engineering Research
1687-1189
26
1
2017
01
01
An Energy-Efficient Consolidation of Virtual Machines in Cloud Data Centers
113
128
63431
10.21608/mjeer.2017.63431
EN
Gamal Eldin I.
Selim
Dept. of Computer Science and Eng., Faculty of Elect., Eng., Menoufia University
Mohamed A.
El-Rashidy
Dept. of Computer Science and Eng., Faculty of Elect., Eng., Menoufia University
Nawal A.
El-Fishawy
Dept. of Computer Science and Eng., Faculty of Elect., Eng., Menoufia University
Journal Article
2015
10
10
<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;">The problem of migrating virtual machines (VMs) among<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> different physical hosts is vital for resource utilization and<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> carbon dioxide (CO2) minimization in cloud data centers. The<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> main objective of this paper is to introduce the proposed<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> technique CPU Utilization Variance (CUV). CUV is based on<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> selecting the best VMsfrom overutilized servers and migrating<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> them into other servers to save the utilized resources and not to<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> violate the Service Level Agreements established between the<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> end users and cloud service provider.CUV alsochooses the<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> most appropriate host to allocate these VMs by calculating the<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> minimum variance of all CPU utilization between all physical<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> servers. CUVis implemented in a large-scale data center<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> composed of 800 physical hosts and the results obtained by<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> CloudSim tool are in terms of energy consumption in KWh,<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> performance in Million Instructions per Second (MIPS), number<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> of VM migrations and Service Level Agreement Violation.<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> Further, a comparative study has been performed between CUV<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> and recently researches for evaluating it, which achieved high<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> performance and lower energy consumption without violating<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> the service level agreements in a large-scale data centers<span style="font-family: Tahoma,Bold; font-size: 14pt; color: #000000; font-style: normal; font-variant: normal;"><strong><br /></strong></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span>
Menoufia University, Faculty of Electronic Engineering
Menoufia Journal of Electronic Engineering Research
1687-1189
26
1
2017
01
01
Load Balancing Scheduling Algorithm in Cloud Computing System with Cloud Pricing Comparative Study
129
152
63435
10.21608/mjeer.2017.63435
EN
Elhossiny
Ibrahim
Dept. of Computer Science and Eng., Faculty of Elect., Eng., Menoufia University
Nirmeen A.
El-Bahnasawy
Dept. of Computer Science and Eng., Faculty of Elect., Eng., Menoufia University
Fatma A.
Omara
Faculty of Computers & information, Cairo University, Egypt.
Journal Article
2016
02
23
; "> <span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;">Cloud Computing is one of the most recent technologies based<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> on virtualization over IT resources where virtual storage and<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> computing services are provided.On the other hands, cloud<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> computing is based on the concepts of virtualization, multitenancy, and shared infrastructure.Task scheduling on the<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> available resources (i.e., Virtual Machines (VMs)) is considered<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> one of the main challenges in cloud computing wherescheduling<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> compliation time (make_span), and execution price of tasks<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> should be minimized.In this paper, a task scheduling algorithm<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> on the Cloud Computing environment has been proposed to<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> reduce the make-span, as well as, decrease the price of<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> executing the independent tasks on the cloud resources.The<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> proposed algorithm is based on calculating the total processing<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> power of the available resources (i.e., VMs) and the total<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> requested processing power by the users' tasks,then calculate<br /><span style="font-family: Arial; font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;">the power factor of each VM (the ratio of it’s processing power to<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> the total processing power of all VMs ) ,then searching the users'<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> tasks to find a task or a group of tasks that their processing<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> power near to the power factor of each VM. So, fairness is<br /><span style="font-family: Arial; font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;">achieved by allocating each VM according it’s power. To<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> evaluate the performance of the proposed algorithm, a<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> comparative study has been done among the proposed<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> algorithm, and the existedGA, and PSO algorithms, The price of<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> the execution has been measured using Amazon and Google<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> pricing models. The experimental results show that the proposed</span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span>
<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"><span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;">algorithm outperforms other algorithms by reducing make-span<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> and the price of the running tasks on specific resource.<br style="font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: -webkit-auto; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px;" /></span></span></span>
Menoufia University, Faculty of Electronic Engineering
Menoufia Journal of Electronic Engineering Research
1687-1189
26
1
2017
01
01
Cluster Head Selection Enhancement of LEACH Protocol in Wireless Sensor Network
153
170
63438
10.21608/mjeer.2017.63438
EN
Ahmed
AL-BAZ
Dept. of Computer Science and Eng., Faculty of Elect., Eng., Menoufia University
Ayman
EL-SAYED
Dept. of Computer Science and Eng., Faculty of Elect., Eng., Menoufia University
0000-0002-4437-259X
Journal Article
2016
03
02
<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;">Clustering is a viable procedure that can take an interest to whole<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> framework acceptable period of use in service, capability of a<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> network to increase its total output under an increased load when<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> nodes are added and to reduce the amount of energy required to<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> provide services in wireless sensor networks. Low energy<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> grouping chain of command convention is an extremely powerful<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> convention that upgrades the system lifetime. A giving so as to<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> group based convention adjusts the energy utilization square with<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> opportunity to all nodes to wind up a cluster head. This paper<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> introduces another calculation to choose the group head with<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> expanding sensor lifetime, throughput, and the conveyance bundle<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> proportion. The outcomes demonstrate that our suggested<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> calculation is more proficient than past calculations.Energy<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> Limitation of Sensor node is a basic considerable problem in<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> WSN, take into account in traditional clustering routing algorithm<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> LEACH, and a distance-energy cluster algorithm considering both<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> the distance and residual energy of nodes is presented in the<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> dissertation, which improves the CH election and the process of<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> data exchange. It sorts outthe adverse effect on the energy<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> consumption of the cluster head, which results from the unfair<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> nodes distribution in the network and avoids the direct<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> communication between the base station and cluster head, which<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> may has low energy and far away from base station.<br style="font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: -webkit-auto; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px;" /></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span>
Menoufia University, Faculty of Electronic Engineering
Menoufia Journal of Electronic Engineering Research
1687-1189
26
1
2017
01
01
An Enhancement of Leveled DAG Prioritized Task Scheduling Algorithm in Distributed Computing Systems
171
192
63443
10.21608/mjeer.2017.63443
EN
Amal
EL-NATTAT
Dept. of Computer Science and Eng., Faculty of Elect., Eng., Menoufia University
Nirmeen A.
El-Bahnasawy
Dept. of Computer Science and Eng., Faculty of Elect., Eng., Menoufia University
Ayman
EL-SAYED
Dept. of Computer Science and Eng., Faculty of Elect., Eng., Menoufia University
0000-0002-4437-259X
Journal Article
2016
03
03
<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;">Task scheduling is an important issue in distributed systems<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> that must be done efficiently to provide high system<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> performance. In this paper, the problem of scheduling<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> dependent tasks on homogeneous distributed systems is<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> addressed. Two new static scheduling algorithms have been<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> proposed to work on homogeneous distributed systems namely;<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> Leveled DAG Prioritized Task (LDPT) and Enhanced Leveled<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> DAG Prioritized Task (ELDPT). Both algorithms aim to<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> minimizing the schedule length in order to improve the system<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> performance.<br style="font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: -webkit-auto; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px;" /></span></span></span></span></span></span></span></span></span></span>
Menoufia University, Faculty of Electronic Engineering
Menoufia Journal of Electronic Engineering Research
1687-1189
26
1
2017
01
01
New Hybrid Approach for Secure Data Storage in Cloud Computing Environment
193
212
63449
10.21608/mjeer.2017.63449
EN
Sheren A.
El-Booz
Dept. of Computer Science and Eng., Faculty of Elect., Eng., Menoufia University
Gamal M.
Attiya
Dept. of Computer Science and Eng., Faculty of Elect., Eng., Menoufia University
Nawal
El-Fishawy
Dept. of Computer Science and Eng., Faculty of Elect., Eng., Menoufia University
Journal Article
2016
04
12
"> <span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;">Cloud storages in cloud data centers are used for enterprises<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> and individuals to store and access their data remotely<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> anywhere anytime without any additional burden. By data<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> outsourcing, users can relieve the burden of local data storage<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> and maintenance. However, one of the major problems of cloud<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> environment is data storage security. Therefore, data auditing is<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> introduced to verify the data in the cloud storages with the aid of<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> Third Party Auditor (TPA). However, the TPA is leased by cloud<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> service provider and after a time the provider may contract with<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> the TPA to conceal the loss of data from the user to prevent the<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> defamation. This paper presents a new hybrid approach for data<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> storage security in cloud computing to protect organi<span style="font-family: Arial; font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;">zations’<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> data from the cloud provider, the third party auditor and some<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> users who may use their old accounts to access the data stored<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> on the cloud. The hybrid approach enhances the authentication<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> level of security by combining two efficient authentication<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> techniques; Time-based One Time Password (TOTP) for cloud<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> users verification and Automatic Blocker Protocol (ABP) to fully<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> protect the system from unauthorized TPA. The experimental<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> results demonstrate the effectiveness and efficiency of the<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> proposed approach when auditing shared data integrity.</span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span>
Menoufia University, Faculty of Electronic Engineering
Menoufia Journal of Electronic Engineering Research
1687-1189
26
1
2017
01
01
Performance Enhancement of Border Gateway protocol for Large-Scale Autonomous
213
225
63478
10.21608/mjeer.2017.63478
EN
Nasser
Solayman
Dept. of Computer Science and Eng., Faculty of Elect., Eng., Menoufia University
Mohammed
Badawy
Dept. of Computer Science and Eng., Faculty of Elect., Eng., Menoufia University
Ayman
EL-SAYED
Dept. of Computer Science and Eng., Faculty of Elect., Eng., Menoufia University
0000-0002-4437-259X
Journal Article
2016
05
05
"> <span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;">BGP (border gateway protocol)is used for routing between<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> autonomous systems, its main advantage among the other<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> routing protocols is its stability and its ability to maintain and<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> contain large amount of updates in its routing table, and so this<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> is very important as its main usage of it is routing in the internet<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> which consists of large amount of autonomous systems.These<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> internet autonomous systems create a large amount of updates<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> that cannot be maintained and handled by other routing protocol<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> except the BGP. BGP has a big problem which is convergence<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> delay due to large amount of updates that may reach to minutes<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> in cases of topology failure or problems, also it need to high<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> processing in the CPU memory which may lead to a freezing<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> node in l<span style="font-family: Arial; font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;">ot of cases.So it’sso important to pay more work and<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> attention to reduce these effects that lead to routing instability<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> and nodes freeze. A lot of studied work on solving this problems<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> which create a dynamic model change in the BGP routing MRAI<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> (minimum route advertisement interval) according to the<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> network size.This MRAI is a main functional factor to decrease<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> the convergence delay in much networks, but no one study the<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> effect of many flapping node (neighbor) in a topology on the<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> convergence delay and number of created messages which<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> recreated more and more every time the flapping happened.In<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> this work we will study the effect of the flapping node on a<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> different network size with different sized failure network and<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> then we will apply our solution and study the effect of it on the<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> same different sized failure network, this solutiondepends on<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> disabling this node for the flapping time of this node.</span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span>
Menoufia University, Faculty of Electronic Engineering
Menoufia Journal of Electronic Engineering Research
1687-1189
26
1
2017
01
01
Comparison between On-line Supervised Learning and Unsupervised Learning of Link Quality estimates in wireless networks Performance
226
246
63480
10.21608/mjeer.2017.63480
EN
M. F.
ZAGHLOUL
Dept. of Computers and Systems Eng., Faculty of Eng., Al-azhar University
R. H.
ABO EL-EZZ
Dept. of Computers and Systems Eng., Faculty of Eng., Al-azhar University
M. M.
ABO-GHAZALA
Dept. of Computers and Systems Eng., Faculty of Eng., Al-azhar University
Journal Article
2019
12
03
<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;">In this paper, Optimized Link State routing protocol (OLSR) and<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> Link Quality Learning protocol (LQL) are employed to show how<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> to control the rerouting time process of a local area network. At<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> every node and for every wireless link, OLSR passively gathers<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> measurements to quantify the network features current value and<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> to assess the related link quality value according to many<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> metrics. The measurements, of These metrics, are used as<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> training samples for the incremental, regression mapping, and<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> supervised learning model which can be used by network<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> protocol LQL to derive link qualities in real-time and robust<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> manner. According to OLSR and LQL, Nodes can also cooperate<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> by exchanging training samples, speeding up the overall learning<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> process. This cooperative feature is useful when the local<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> network configurations are continually changing because of<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> mobility and/or varying traffic pattern. We propose a distributed<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> online protocol based on organized maps learning technique<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> called Self Organized Mapping (SOM). Three performance<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> methods are applied to the wireless network used within this<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> paper: OLSR_SOM that cares making modification, OLSR<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> protocol code, OLSR_LQL that depends on the introducing LQL<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> as a supervised learning protocol and OLSR_SOM that depends<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> on the introducing SOM as an unsupervised learning protocol.<br style="font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: -webkit-auto; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px;" /></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span>
Menoufia University, Faculty of Electronic Engineering
Menoufia Journal of Electronic Engineering Research
1687-1189
26
1
2017
01
01
Suppression of the vibrations of a harmonically excited nonlinear shaker by using a passive vibration absorber
247
270
63484
10.21608/mjeer.2017.63484
EN
Hassan M.
Abdelhafez
Dept. of Physics and Engineering Mathematics, Faculty of Elect., Engineering,
Menoufia University
Magdy M.
Kamel
Dept. of Physics and Engineering Mathematics, Faculty of Elect., Engineering,
Menoufia University
Mohamed E.
Nassar
Dept. of Physics and Engineering Mathematics, Faculty of Elect., Engineering,
Menoufia University
Journal Article
2016
04
21
; "> <span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;">In this work, a passive vibration absorber is used to control the<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> vibrations of a harmonically excited nonlinear shakerwhich<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> emulates a machine. A linear and nonlinear vibration<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> absorberswere considered to suppress the primary<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> resonancevibrations of the shaker in presence ofone to one<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> internal resonance and a comparison between the results of two<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> cases was obtained.The multiple time scales perturbation MTSP<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> techniquewas used to analyze the system and to obtain a first<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> order approximate solution of the closed loop system in presence<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> of one to one internal resonance. In addition,the stability of the<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> systemwas studied using frequency response equations,the<br /><span style="font-family: Arial; font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;">effect of absorber’s p<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;">arameters on system performanceis<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> discussed to choose the optimal absorber parameters for<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> vibration control process.We also discussed the role of cubic<br /><span style="font-family: Arial; font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;">nonlinearity in vibration absorber in suppression of shaker’s<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> vibrations when frequency of the harmonic excitation is well<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> above the resonance frequency of the shaker. All analytical<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> results are validated using numerical solution and the results are<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> convincing. Finally we deduced the best cases for using linear<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> vibration absorber and the best cases for using nonlinear</span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span>
Menoufia University, Faculty of Electronic Engineering
Menoufia Journal of Electronic Engineering Research
1687-1189
26
1
2017
01
01
Positive position feedback (PPF) controller applied toa quarter car active Suspension systems
271
292
63488
10.21608/mjeer.2017.63488
EN
H. M.
Abdelhafez
Dept. of Physics and Engineering Mathematics, Faculty of Electronic Engineering,
Menoufia University
O. M.
Omara
Dept. of Physics and Engineering Mathematics, Faculty of Electronic Engineering,
Menoufia University
Journal Article
2016
06
28
<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;">This paper introduced, the positive position feedback (PPF) active<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> controller is applied to control the quarter car suspension system,<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> it excited by the disturbances on surface of the road. The PPF<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> active controller is investigated for ride comfort improvement at<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> simultaneous resonance. The main idea to control the system that<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> is the magneto-rheological or Electrical-rheological damper is<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> attached parallel with the hydraulic damper and a controller is<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> developed for suppressing the vibration of the closed loop control<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> system, hence improving the passenger comfort. The control<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> signal can be produced by control circuits such as programmable<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> logic controller or embedded electronics circuits that produced the<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> control electrical signal to the controlled damper. The approximate<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> solution is produced by using multiple time scales perturbation<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> method (MSTP).The corresponding frequency response equations<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> are extracted and plotted at the different systems parameters.<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> Finally, numerical simulations are constructed to validate the<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> approximate solution. Found that all analytical solutions are near<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> to the numerical simulation. The all output approximate solution<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> can be programmed to the control circuits.<br style="font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: -webkit-auto; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px;" /></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span>