Browsing by Author "Kamil, I. A."
Now showing 1 - 8 of 8
- Results Per Page
- Sort Options
Item Chaotic Behaviours in Dynamical Systems with Application to Secure Communication(Medwell Journals, 2012) Kamil, I. A.; Fakolujo, O. A.Attention has recently been focused on irregular aspects of the behaviour of dynamical systems. One of such behavioural modes is chaos which has been widely reported as having a great potential in communications. This study aimed at demonstrating the major concepts in non-linear dynamics and chaos and the application of these properties in communication. The behavioural modes of logistic map which is a simple dynamical system were investigated with different values of system parameters and initial conditions by computer simulation using Microsoft Excel. The simulation results indicated the sensitivities of the logistic map to parameter changes as well as variations in the initial conditions. The noise-like chaotic trajectory obtained for certain parameter value was employed in masking a message signal. The resulting signal confirmed the potential application of chaos in secure communication.Item Chaotic Secure Communication Schemes employing Chua's Circuit(2010) Kamil, I. A.; Fakolujo, O. A.In recent years, chaotic secure communication systems have attracted significant interest due to their higher unpredictability over conventional secure communications system and simplicity of implementation. This study presents the modeling of four chaotic modulation techniques. The techniques are Chaotic Masking (CM), Chaos Shift Keying (CSK), Chaos On-Off Keying (COOK), and Differential Choa Shift Keying (DCSK). Simulations were carried out using Simulink in Matlab environmnet to implement these techniques. A qualitative evaluation of the transmitted signal waveforms in all the cases considered showed that DCSK gives the highest level of secuirty followed by CSK while COOK gives the least level of security. The data transmission rate of the other three techniques was however twice that of DCSK.Item Chaotic secure communication schemes employing Chua's Circuit(2010) Kamil, I. A.; Fakolujo, O. A.In recent years, chaotic secure communication systems have attracted significant interest due to their higher unpredictability over conventional secure communications systems and simplicity of implementation. This study presents the modeling of four chaotic modulation techniques. The techniques are Chaotic Masking (CM), Chaos Shift Keying (CSK), Chaos On-Off Keying (COOK), and Differential Chaos Shift Keying (DCSK). Simulations were carried out using Simulink in Matlab environment to implement these techniques. A qualitative evaluation of the transmitted signal waveforms in all the cases considered showed that DCSK gives the highest level of security followed by CSK while COOK gives the least level of security. The data transmission rate of the other three techniques was however twice that of DCSK.Item Demonstration of chaos in selected chaotic systems(Scholarlink Research Institute Journals, 2012) Kamil, I. A.Chaos is one of the most important behavioural modes exhibited by dynamical systems and refers to the unpredictable, seemingly random, motion of trajectories of a dynamical system. In recent time, non-linear dynamics and chaos have become familiar in the technical vocabulary of most sciences and technology due to the various applications of chaos in these areas. Chaotic systems display chaotic behaviours only for specific range of values of their parameters. It is therefore important to understand the chaotic features as well as parameter values resulting in its emergence in systems. In this paper, the emergence of chaos in six chaotic systems was demonstrated using Simulink with specific initial conditions and parameter values. The simulation results obtained in form of time series illustrated noise-like waveforms which were unpredictable even after a long interval of time, while the phase portraits were irregular and sponge-like in appearance. The noise-like and unpredictable trajectories as well strange attractors observed clearly demonstrated the emergence of chaos the chosen parameter values.Item Fuzzy logic: a means of handling uncertainties in expert systems(2005) Kamil, I. A.This paper discusses on historical perspective of the evolution of fuzzy logic from the Boolean or crisp logic as well as some noteworthy objections to its use. Some fundamental notions on fuzzy set and fuzzy logic as well as the application areas are considered. The use of fuzzy logic in application involving imprecision and uncertainty is also discussed. An introductory account on expert systems and the basic components necessary for its development especially the knowledge base is presented. The main subject of this paper which is the applicability of fuzzy logic in handling of uncertainty in expert system is illustrated with two examples. Though the two illustrations used involve the use of expert systems in fault diagnosis in the field of electrical and electronic engineering which is the area of specialization of the author, they could easily be adapted to fault diagnosis in other areas.Item A linearized thermometer circuit employing a thermistor and a diode as probing elements(Development Africa Consortium, 2003) Kamil, I. A.; Adegbenro, O.The development of a linearized thermistor-based thermometer circuit with a thermistor and a diode as the temperature probing elements is here reported. The circuit is effectively that of an op amp based logarithmic amplifier, which takes its input from another inverting op amp circuit having a thermistor in its feedback loop. The performance of the circuit is demonstrated experimentally and has been found to have a linearity error of less than 0.2%. The accuracy analysis of the circuit is also discussed.Item Lorenz-based chaotic secure communication schemes(Research Insight Publishing Corporation, 2012) Kamil, I. A.; Fakolujo, O. A.Secure communication systems employing chaos have recently attracted significant interest. This is partly due to their high unpredictability and simplicity of implementation over conventional secure communications systems. This study presents the implementation of four chaotic modulation techniques employing Lorenz system as chaos generator. The techniques are Chaotic Masking (CM), Chaos Shift Keying (CSK), Chaos On-Off Keying (COOK), and Differential Chaos Shift Keying (DCSK). Simulations were carried out using Simulink in Matlab environment to implement these techniques. A qualitative evaluation of the transmitted signal waveforms in all the cases considered showed that DCSK gives the highest level of security followed by CSK while COOK gives the least level of security.Item Post-graduate professional experience in electronic and electrical engineering(1994) Kamil, I. A.A brief but illustrative account of the author's acquired experience in the areas of consultancy, teaching and research, and repair and maintenance is presented