Publications by authors named "Miroslav Mahdal"

In this study, we tackle the challenge of optimizing the design of a Brushless Direct Current (BLDC) motor. Utilizing an established analytical model, we introduced the Multi-Objective Generalized Normal Distribution Optimization (MOGNDO) method, a biomimetic approach based on Pareto optimality, dominance, and external archiving. We initially tested MOGNDO on standard multi-objective benchmark functions, where it showed strong performance.

View Article and Find Full Text PDF

The Single-Stage Grid-Connected Solar Photovoltaic (SSGC-SPV) topology has recently gained significant attention, as it offers promising advantages in terms of reducing overall losses and installation costs. We provide a comprehensive overview of the system components, which include the photovoltaic generator, the inverter, the Incremental Conductance Maximum Power Point Tracking (IC-MPPT) algorithm, and the PI regulator for DC bus voltage control. Moreover, this study presents detailed system configurations and control schemes for two types of inverters: 2L-3PVSI and 3L-3PNPC.

View Article and Find Full Text PDF
Article Synopsis
  • Wireless sensor networks (WSNs) rely on efficient energy management to optimize performance and address challenges like network lifetime, coverage, and data aggregation.
  • The paper presents an enhanced dual-selection krill herd (KH) optimization clustering scheme that improves energy utilization and reduces communication among nodes, tackling energy conservation issues in WSN deployment.
  • The proposed algorithm significantly boosts network lifetime by 23.21%, stable energy by 19.84%, and reduces latency by 22.88%, thereby providing a more efficient and reliable energy management solution for WSNs.
View Article and Find Full Text PDF

The cluster technique involves the creation of clusters and the selection of a cluster head (CH), which connects sensor nodes, known as cluster members (CM), to the CH. The CH receives data from the CM and collects data from sensor nodes, removing unnecessary data to conserve energy. It compresses the data and transmits them to base stations through multi-hop to reduce network load.

View Article and Find Full Text PDF

The Internet of Things (IoT) is seen as the most viable solution for real-time monitoring applications. But the faults occurring at the perception layer are prone to misleading the data driven system and consume higher bandwidth and power. Thus, the goal of this effort is to provide an edge deployable sensor-fault detection and identification algorithm to reduce the detection, identification, and repair time, save network bandwidth and decrease the computational stress over the Cloud.

View Article and Find Full Text PDF

Underwater visible light communication (UVLC) has recently come to light as a viable wireless carrier for signal transmission in risky, uncharted, and delicate aquatic environments like seas. Despite the potential of UVLC as a green, clean, and safe alternative to conventional communication methods, it is challenged by significant signal attenuation and turbulent channel conditions compared to long-distance terrestrial communication. To address linear and nonlinear impairments in UVLC systems, this paper presents an adaptive fuzzy logic deep-learning equalizer (AFL-DLE) for 64 Quadrature Amplitude Modulation-Component minimal Amplitude Phase shift (QAM-CAP)-modulated UVLC systems.

View Article and Find Full Text PDF

A compact, four-element planar MIMO (Multiple Input, Multiple Output) antenna that operates in an ultra-wideband is presented for diversity application. The orthogonal position of the unit cells replicates the single antenna thrice, thereby decreasing mutual coupling. A UWB MIMO antenna measuring 35 × 35 × 1.

View Article and Find Full Text PDF

To determine the appropriate treatment plan for patients, radiologists must reliably detect brain tumors. Despite the fact that manual segmentation involves a great deal of knowledge and ability, it may sometimes be inaccurate. By evaluating the size, location, structure, and grade of the tumor, automatic tumor segmentation in MRI images aids in a more thorough analysis of pathological conditions.

View Article and Find Full Text PDF

This paper proposes a solution for ensuring the security of IoT devices in the cloud environment by protecting against distributed denial-of-service (DDoS) and false data injection attacks. The proposed solution is based on the integration of simple network management protocol (SNMP), Kullback-Leibler distance (KLD), access control rules (ACL), and moving target defense (MTD) techniques. The SNMP and KLD techniques are used to detect DDoS and false data sharing attacks, while the ACL and MTD techniques are applied to mitigate these attacks by hardening the target and reducing the attack surface.

View Article and Find Full Text PDF

Social networks have greatly expanded in the last ten years the need for sharing multimedia data. However, on open networks such as the Internet, where security is frequently compromised, it is simple for eavesdroppers to approach the actual contents without much difficulty. Researchers have created a variety of encryption methods to strengthen the security of this transmission and make it difficult for eavesdroppers to get genuine data.

View Article and Find Full Text PDF

A programmable logic controller (PLC) executes a ladder diagram (LD) using input and output modules. An LD also has PID controller function blocks. It contains as many PID function blocks as the number of process parameters to be controlled.

View Article and Find Full Text PDF

Wireless Sensor Networks (WSNs) can be defined as a cluster of sensors with a restricted power supply deployed in a specific area to gather environmental data. One of the most challenging areas of research is to design energy-efficient data gathering algorithms in large-scale WSNs, as each sensor node, in general, has limited energy resources. Literature review shows that with regards to energy saving, clustering-based techniques for data gathering are quite effective.

View Article and Find Full Text PDF