DEPARTMENT OF ELECTRICAL AND ELECTRONIC ENGINEERING

Permanent URI for this communityhttps://repository.ui.edu.ng/handle/123456789/478

Browse

Search Results

Now showing 1 - 7 of 7
  • Thumbnail Image
    Item
    Post-graduate professional experience in electronic and electrical engineering
    (1994) Kamil, I. A.
    A brief but illustrative account of the author's acquired experience in the areas of consultancy, teaching and research, and repair and maintenance is presented
  • Thumbnail Image
    Item
    Fuzzy logic: a means of handling uncertainties in expert systems
    (2005) Kamil, I. A.
    This paper discusses on historical perspective of the evolution of fuzzy logic from the Boolean or crisp logic as well as some noteworthy objections to its use. Some fundamental notions on fuzzy set and fuzzy logic as well as the application areas are considered. The use of fuzzy logic in application involving imprecision and uncertainty is also discussed. An introductory account on expert systems and the basic components necessary for its development especially the knowledge base is presented. The main subject of this paper which is the applicability of fuzzy logic in handling of uncertainty in expert system is illustrated with two examples. Though the two illustrations used involve the use of expert systems in fault diagnosis in the field of electrical and electronic engineering which is the area of specialization of the author, they could easily be adapted to fault diagnosis in other areas.
  • Thumbnail Image
    Item
    A linearized thermometer circuit employing a thermistor and a diode as probing elements
    (Development Africa Consortium, 2003) Kamil, I. A.; Adegbenro, O.
    The development of a linearized thermistor-based thermometer circuit with a thermistor and a diode as the temperature probing elements is here reported. The circuit is effectively that of an op amp based logarithmic amplifier, which takes its input from another inverting op amp circuit having a thermistor in its feedback loop. The performance of the circuit is demonstrated experimentally and has been found to have a linearity error of less than 0.2%. The accuracy analysis of the circuit is also discussed.
  • Thumbnail Image
    Item
    Lorenz-based chaotic secure communication schemes
    (Research Insight Publishing Corporation, 2012) Kamil, I. A.; Fakolujo, O. A.
    Secure communication systems employing chaos have recently attracted significant interest. This is partly due to their high unpredictability and simplicity of implementation over conventional secure communications systems. This study presents the implementation of four chaotic modulation techniques employing Lorenz system as chaos generator. The techniques are Chaotic Masking (CM), Chaos Shift Keying (CSK), Chaos On-Off Keying (COOK), and Differential Chaos Shift Keying (DCSK). Simulations were carried out using Simulink in Matlab environment to implement these techniques. A qualitative evaluation of the transmitted signal waveforms in all the cases considered showed that DCSK gives the highest level of security followed by CSK while COOK gives the least level of security.
  • Thumbnail Image
    Item
    Demonstration of chaos in selected chaotic systems
    (Scholarlink Research Institute Journals, 2012) Kamil, I. A.
    Chaos is one of the most important behavioural modes exhibited by dynamical systems and refers to the unpredictable, seemingly random, motion of trajectories of a dynamical system. In recent time, non-linear dynamics and chaos have become familiar in the technical vocabulary of most sciences and technology due to the various applications of chaos in these areas. Chaotic systems display chaotic behaviours only for specific range of values of their parameters. It is therefore important to understand the chaotic features as well as parameter values resulting in its emergence in systems. In this paper, the emergence of chaos in six chaotic systems was demonstrated using Simulink with specific initial conditions and parameter values. The simulation results obtained in form of time series illustrated noise-like waveforms which were unpredictable even after a long interval of time, while the phase portraits were irregular and sponge-like in appearance. The noise-like and unpredictable trajectories as well strange attractors observed clearly demonstrated the emergence of chaos the chosen parameter values.
  • Thumbnail Image
    Item
    Chaotic secure communication schemes employing Chua's Circuit
    (2010) Kamil, I. A.; Fakolujo, O. A.
    In recent years, chaotic secure communication systems have attracted significant interest due to their higher unpredictability over conventional secure communications systems and simplicity of implementation. This study presents the modeling of four chaotic modulation techniques. The techniques are Chaotic Masking (CM), Chaos Shift Keying (CSK), Chaos On-Off Keying (COOK), and Differential Chaos Shift Keying (DCSK). Simulations were carried out using Simulink in Matlab environment to implement these techniques. A qualitative evaluation of the transmitted signal waveforms in all the cases considered showed that DCSK gives the highest level of security followed by CSK while COOK gives the least level of security. The data transmission rate of the other three techniques was however twice that of DCSK.
  • Thumbnail Image
    Item
    Chaotic Secure Communication Schemes employing Chua's Circuit
    (2010) Kamil, I. A.; Fakolujo, O. A.
    In recent years, chaotic secure communication systems have attracted significant interest due to their higher unpredictability over conventional secure communications system and simplicity of implementation. This study presents the modeling of four chaotic modulation techniques. The techniques are Chaotic Masking (CM), Chaos Shift Keying (CSK), Chaos On-Off Keying (COOK), and Differential Choa Shift Keying (DCSK). Simulations were carried out using Simulink in Matlab environmnet to implement these techniques. A qualitative evaluation of the transmitted signal waveforms in all the cases considered showed that DCSK gives the highest level of secuirty followed by CSK while COOK gives the least level of security. The data transmission rate of the other three techniques was however twice that of DCSK.