ArticlePDF Available

Improving Against Cyber-attack by Hackers in our tertiary institutions-Artificial Intelligence approach

Authors:

Abstract and Figures

The rate at which hackers have devised means of increasing threats is becoming unbearable. Classified information is no longer confidential in financial institutions and academic environments. Government agencies and election organizers are no exception in these nefarious activities. The resultant effect is a decline in the number of subscribers that patronize the affected telecommunication companies. The threats could be minimized or prevented by introducing a smart means of checking to eliminate the threats to improve the security management in the higher institution or multimedia environment using intelligent agents. The methodology used to understand the nature of threats and types of threats observed in multimedia could be outlined as follows: Designing a smart rule base that will detect and reduce threats in multimedia, training Artificial Neural Network (ANN) in the multimedia rule base to increase the efficiency of the rules. The next stage is to design a SIMULINK model for improving security management in the higher institution using Artificial Intelligence (Neuro-fuzzy software). The results obtained are highest without Neuro-Fuzzy Controller with percentage threat level recorded as is 83% while that when Neuro-fuzzy is incorporated in the system is 81.18%. This clearly shows that there is an obvious percentage reduction in the number of threats when Neuro-fuzzy is incorporated into the system. The positive performance index was 1.82%. KEYWORDS Improving, Cyber-attack, Hackers, Artificial Intelligence, Tertiary Institutions
Content may be subject to copyright.
American Journal of Engineering Research (AJER)
2022
American Journal of Engineering Research (AJER)
e-ISSN: 2320-0847 p-ISSN : 2320-0936
Volume-11, Issue-01, pp-194-199
www.ajer.org
Research Paper Open Access
w w w . a j e r . o r g
w w w . a j e r . o r g
Page 194
Improving Against Cyber-attack by Hackers in our
Tertiary institutions: Artificial Intelligence Approach
1Bakare Kazeem, Department of Electrical and Electronic Engineering, Enugu State University of
Science and Technology, (ESUT), Nigeria
2Ngang Bassey Ngang, Department of Electronics and ComputerEngineering, Veritas University,
Abuja, Nigeria.
ABSTRACT :
The rate at which hackers have devised means of increasing threats is becoming unbearable. Classified
information is no longer confidential in financial institutions and academic environments. Government agencies
and election organizers are no exception in these nefarious activities. The resultant effect is a decline in the
number of subscribers that patronize the affected telecommunication companies. The threats could be minimized
or prevented by introducing a smart means of checking to eliminate the threats to improve the security
management in the higher institution or multimedia environment using intelligent agents. The methodology used
to understand the nature of threats and types of threats observed in multimedia could be outlined as follows:
Designing a smart rule base that will detect and reduce threats in multimedia, training Artificial Neural
Network (ANN) in the multimedia rule base to increase the efficiency of the rules. The next stage is to design a
SIMULINK model for improving security management in the higher institution using Artificial Intelligence
(Neuro-fuzzy software). The results obtained are highest without Neuro-Fuzzy Controller with percentage threat
level recorded as is 83% while that when Neuro-fuzzy is incorporated in the system is 81.18%. This clearly
shows that there is an obvious percentage reduction in the number of threats when Neuro-fuzzy is incorporated
into the system. The positive performance index was 1.82%.
KEYWORDS Improving, Cyber-attack, Hackers, Artificial Intelligence, Tertiary Institutions.
--------------------------------------------------------------------------------------------------------------------------------------
Date of Submission: 16-01-2022 Date of acceptance: 31-01-2022
--------------------------------------------------------------------------------------------------------------------------------------
I. INTRODUCTION
Information security system, in the public or private sector, is of paramount importance to all national
security objectives. Such institutions provide the ability to collect, manage, and share valuable information
between multiple organizations that can build large e-commerce businesses and often participate in private
domain relationships [1]. Information shared between multiple domains can come in a variety of forms
including text, audio, video, and images that can increase the complexity of security and privacy management
[2]. Major security challenges include the integration of various security policies of cooperating organizations in
collaborative efforts to protect information and use shared information to detect and respond to any emerging
threats [3]. In addition, confidentiality of data is often a major problem [4]. In addition, some data analysts and
mining tools have suggested that cybercriminals can use it to extract sensitive information from a private and
confidential multimedia system and detect patterns and functions that reflect potential threats to infrastructure
[5]. Thus, two key challenges in the development of multimedia-based flexibility strategies for managing threats
and data mining and information security [6]. This study will use blockchain technology to improve security
management in the multimedia environment. Wireless ad networks represent live streaming systems that are
fully distributed without infrastructure [7]. Significant disruption occurs when multiple transfers occur with
links to the same or different codes, thus leading to additional problems and issues such as delay, jitter, limited
bandwidth, packet loss (packet loss), etc., which also affects service level (QoS) [8].Over the past few years,
wireless networks have attracted a lot of research across the network and social functioning [9]. Recently,
multimedia programs on ad hoc wireless have become increasingly common, but even largely the effects of
delays and packet loss challenges [10]. Low multimedia transmission quality caused by packet delay and loss of
voice traffic, for example, is still one of the major technical barriers to the voice communication system. Due to
American Journal of Engineering Research (AJER)
2022
w w w . a j e r . o r g
w w w . a j e r . o r g
Page 195
the growing popularity of wireless ad networks, QoS support for multimedia transmission has become an
important requirement because it is closely related to service satisfaction. [11] Introducing Security and Privacy
in the computer cloud where he analyzed the key security issues enveloped the market today with security
measures, in order to provide the server and business providers with the best possible solution. In the same
article, [12] introduced Data Privacy on cloud computing, which was a relatively new homomorphic encryption
system based on numbers. The encryption system can be used primarily to protect logical data from a cloud
computing. The proposed system uses a clear text space ring and a single encryption key to remove encryption,
that is, a standard encryption system. In order to understand the basics of distributed computerization and to
distance information from the cloud, a number of assets have been advised [13 [. In [15] the authors provide a
comprehensive insight into the basic concepts of distributed computation [16]. of threats identified in our area,
Designing a smart legal framework that will detect and reduce threats to multimedia, training ANN in the legal
framework designed to improve format efficiency, design a SIMULINK model for enhancing security
optimization in a multimedia environment using Neuro-fuzzy controller. Many tools are now in use for
improving the performance of the power electronics in the industry to enhance increased productivity; some of
these are, artificial intelligence, fuzzy logic, neural networks, hybrid networks, etc [17]. They have been recently
recognized as the important tools to improve the output performance of machines in the industrial sectors.
Utilization of these intelligent control with adaptiveness seems to yield a promising research area in the
development, implementation, and control of electrical drives.In the study conducted by [18], he affirmed that
fuzzy controller is an effective means of regulating system frequency; when combined alongside other control
devices would yield good results; hence being used for complementary functions with Artificial neural network
(ANN) our design would be effective and efficient. The work done in [19] does recommend that for any
successful design the methodology involved in the work must be followed step-by-step and adhered to the
specific objectives of the study; which has to do with the measurement of the collected data, classification, and
tabulation.Investment that will pay considerable dividends over the course of its operating life is a
comprehensive power monitoring system. Even though increased energy prices have become a larger influence
on the balance sheet, many facilities do not take advantage of opportunities to better manage these expenses.
Those without monitoring systems likely have no understanding of their energy usage; those with them may not
be using their systems to the fullest potential.
Because the quality of energy supplied can adversely affect its operation, oftentimes leading to loss or
degradation of equipment, product, revenue, and reputation, plant managers must weigh the advantages of
implementing a monitoring program.
The second section of this paper shows three methods for monitoring systems of solar plants. The third
section discusses communication and monitoring system for wind turbines, and finally the conclusion is
discussed in the fourth section.
II. METHODOLOGY
The procedure adopted in achieving the goal of this task is the step-by-step approach to the specific
objectives of the work; this entails collecting and weighing the threat levels using trending method; classifying the
threats and types, using the time series method approach from the service provider’s records in the database of the
company.
This involves characterizing the types of threats observed in the affected area, designing a rule base
that will detect and minimize threats in the multimedia environment, training Artificial Neural Network (ANN)
in the multimedia rule base to enhance the efficiency of the stated rules; finally designing a SIMULINK model
for improving the security system in a multimedia environment using Neuro-Fuzzy approach. Multimedia is
simply multiple forms of media integrated together. An example of multimedia is a web page with animation.
The basic types can be described as follows: Text, Graphics, Audio, Animation, Video, and Graphics Objects
(see: Computer graphics and visualization, etc. The threats can come from any source and has to be reported.
ii
2.1 Classifying the types of threats observed in multimedia
Table: 1 Characterized threats in a Multimedia environment
TYPES OF THREATS IN
MULTIMEDIA
% OF THREATS IN
MULTIMEDIA NETWORK
DATE OF
THREAT
DAYS OF
THREAT
Copy right
80%
6/11/2018
1
Hacking in to ones data or data
leakage
82%
7/8/2019
2
Explotation of internate conection
70%
8/6/2019
3
Corruption of data
60%
4/4/2019
4
Bonnets
60%
5/10/2018
5
Distributed denial-of-service
(ddos)
75%
6/6/2018
6
American Journal of Engineering Research (AJER)
2022
w w w . a j e r . o r g
w w w . a j e r . o r g
Page 196
Malware
83%
7/10/2019
7
2.2 Designing a multimedia rule base that will detect and reduce threats in multimedia
Fig 1 designed multimedia Fuzzy inference system that will detect and reduce threats in multimedia
Fig 1 shows designed multimedia Fuzzy inference system that will detect and reduce threats in multimedia;with
two inputs of threats and multimedia and an output of result.
Fig 2 designed multimedia rule base that will detect and reduce threats in multimedia
Fig 2 shows designed multimedia rule base that will detect and reduce threats in multimedia. The rules are three
in number as shown in fig 2.
American Journal of Engineering Research (AJER)
2022
w w w . a j e r . o r g
w w w . a j e r . o r g
Page 197
2.3 Training ANN in the multimedia rule base to enhance the efficacy of the rules
Fig 3 trained ANN in the multimedia rule base to enhance the efficacy of the rules
Fig 3 shows trained ANN in the multimedia rule base to enhance the efficacy of the rules.
2.4 Designing a SIMULINK model for improving security management in a multimedia environment
using Neuro-fuzzy controller
Fig 4 designed SIMULINK model forimproving security management in a multimedia environment using
Neuro-fuzzy controller.
Fig 4 shows designed SIMULINK model forimproving security management in a multimedia environment using
Neuro-fuzzy controller. The results obtained after simulation are as shown in fig 5.
III. RESULTS AND DISCUSSION
Figure 1 shows a multimedia designed using Fuzzy Inference System that can detect and reduce threats in
multimedia. Figure 1 has both threats and multimedia as inputs and the result as output.
0.2 0.3 0.4 0.5 0.6 0.7 0.8
0.2
0.25
0.3
0.35
0.4
0.45
0.5
0.55
0.6
0.65
0.7
W(i,1)
W(i,2)
IMPROVING SECURITY MANAGEMENT IN A MULTIMEDIA ENVIRONMENT USING NEURO-FUZZY CONTROLLER
x{1}
Input 1
rulebasem
In1
Out1
In1Out1
In1
Out1
In1Out1
Subsystem5
In1
COPY RIGHT
HACKING INTO ONES DATA
EXPLOTATION OF INTERNATE
CORRUPTION OF DATA
BONNET
DISTRIBUTED DENIAL OF SERVICE
MALWARE
NO OF DAYS
In1Out1
In1
Out1
Subsystem2
In1
Out1
In1Out1
In1Out1
Subsystem13
In1Out1
In1
Out1
In1
Out1
In1
Out1
In1Out1
In1
In2
Out1
In1Out1
Neural Network
x{1} y{1}
NO OF DAYS
1
2
3
4
5
6
7
MALWARE1
81.18
In1
Out1
Out2
Out3
Out4
Out5
Out6
Out7
HACKING INTO ONES DATA
80.21
EXPLOTATION OF INTERNATE
68.47
DISTRIBUTED DENIAL OF SERVICE
73.36
CORRUPTION DATA
58.69
COPY RIGHT
78.25
Bernoulli Binary
Generator
Bernoulli
Binary
BONNET
58.69
Add
AWGN
Channel
AWGN
1
American Journal of Engineering Research (AJER)
2022
w w w . a j e r . o r g
w w w . a j e r . o r g
Page 198
Figure 2 shows the basics of multimedia rule designed to detect and reduce threats in multimedia.
Three rules are involved as displayed in figure 3. It shows ANN trained in the basics of multimedia rule to
improve the efficiency of the rules.
Figure 4 is a SIMULINK designed model for enhancing security management in a multimedia
environment using Neuro-fuzzy control. The results obtained after simulation are as shown in Figure 5. Figure 5
shows a comparison between a common threat and a Neuro-fuzzy threat in improving security management in a
multimedia environment. The average prevalence rate is 83% without a controller, when the controller is
included in the system we have 81.18%. With these results obtained, it shows that the percentage reduction in
the number of threats when Neuro-fuzzy is introduced into the system is 1.82%. Table 1 shows the types of
threats found in the multimedia; while Table 2 compares the common threat and the Neuro-fuzzy threat to
improving security management in a multimedia environment.
Table: 2 comparison between the conventional threat and Neuro-fuzzy threat in improving security
management in a multimedia environment
TIME (s)
CONVENTIONAL THREAT IN
IMPROVING SECURITY
MANAGEMENT IN A MULTIMEDIA
ENVIRONMENT
NEURO FUZZY THREAT IN
IMPROVING SECURITY
MANAGEMENT IN A MULTIMEDIA
ENVIRONMENT
1
83
81.18
2
75
73.36
3
60
58.6
4
80
78.25
5
82
80.21
6
70
68.47
7
60
58.69
Fig 5 comparing conventional threat and Neuro-fuzzy threat in improving security management in a multimedia
environment. Fig 5 shows comparing conventional threat and Neuro-fuzzy threat in improving security
management
IV. CONCLUSION
The high rate of increase in the number of threats experienced in multimedia has led to its reduction in
the number of its subscribers. This number of threats observed in the multimedia that has drastically led to the
reduction of its subscribers is eradicated by an introduction of improving security management in a multimedia
environment using neuro-fuzzy controller. To achieve this, it is done in this manner, characterizing types of
threats observed in multimedia, designing a multimedia rule base that will detect and reduce threats in
multimedia, training ANN in the multimedia rule base to enhance the efficacy of the rules and designing a
SIMULINK model forimproving security management in a multimedia environment using Neuro-fuzzy
controller. The results obtained are the highest conventional percentage of threat is 83% while that when Neuro-
fuzzy is incorporated in the system is 81.18%. With these results obtained, it shows that the percentage
reduction in the number of threats when Neuro- fuzzy is incorporated in the system is 1.82%..
1 2 3 4 5 6 7
55
60
65
70
75
80
85
threat (%)
Time(s)
Conventional threat in improving security management in a multimedia environment
Neuro –fuzzy t hreat in improving security management in a multimedia environment
American Journal of Engineering Research (AJER)
2022
w w w . a j e r . o r g
w w w . a j e r . o r g
Page 199
REFERENCES
[1]. Hasib,M. and Schormans,A.(2018). Limitations of passive & active measurement methods in packet networks, Proc. LCS.London
Communications Symp.
[2]. D'Antonio,D.Esposito,M. and Gargiulo,M.(2019). A Component based approach to SLA monitoring in premium IP networks', First
Int. Workshop on Inter domain Performance and Simulation
[3]. Al-Sbou,Y., Saatchi, R. and Strachan, R.(2017). Estimation of the distributions of the QoS parameters using sampled passive
measurements techniques, Proc. Second Int. Conf. e-Business and Telecommunication Networks (ICETE), Reading, UK, pp. 37.
[4]. Nedeljkovic,.I(.2020) Image classification based on fuzzy logic, in Proc. Geo-Imagery Bridging Continents ISPRS Congr., pp. 83
88, Istanbul, Turkey.
[5]. Oliveira,R and Braum, T.,(2014).A fuzzy logic engine to assist TCP error detection in wireless mobile ad hoc networks, Next
Generation Wired/Wireless Advanced Networking, Int. J. Comp. Intel. Appl.
[6]. Urathal,U and Chandrasekar,C ,(2012).An efficient fuzzy based congestion control technique for wireless sensor networks, Int. J.
Comput. Appl. 40(14) (2012) 4756.
[7]. Anthony Lordson Amana,Uko Ofe, Ngang Bassey(2021).Enhancement of Data Network Robustness in Nigeria, Using Adaptive
Modulation Technique. International Journal of Advances In Engineering and Management(IJAEM),Vol. 3 Issue 6
[8]. Ngang. B.N. Anthony.L.A.and Uko, O.(2021).Intelligent Agent BasedReal Time monitoring and Evaluation of GSM Quality of
Service. Journal of Information and Knowledge (JIKM), IISTE
[9]. Umoh,A and Udosen,A.,(2014). Sugeno-type fuzzy inference model for stock price prediction, Int. J. Comput. Appl. 103(3) (2014)
112.
[10]. Mohammed,E.,Brahim.R. and B. Mostafa,B.,(2018). Fuzzy logic for QoS control in IMS network, Int. J. Comput. Appl. 28(9), 39
46.
[11]. Shrivastava,S.,Bhilare,D., andThakur,R.(2013). Improving QoS and service level agreement of mobile application at transport layer
using fuzzy logic mapping, Int. J. Adv. Res. Computer Sci. Softw. Eng. 3(11) 7784.
[12]. Asuquo,D. and Umoh,U. (2015).Analytic hierarchy process for QoS evaluation of mobile data Networks, Int. J. Comput. Netw.
Commun. 7(6)
[13]. Abbasi, R.,Bidgoli,A. and Abbasi,M.(2012). A new fuzzy algorithm for improving quality of service in real time wireless sensor
networks, Int. J. Advanced Smart Sensor Netwrk. System. 2(2), 114.
[14]. Zarei,M., Rahmani, A, and Teshnehlab,M.(2019). Fuzzy based trust estimation for congestion control in wireless sensor networks,
Int. Conf. Intelligent Networking and Collaborative Systems.
[15]. Bazaz1, Y.,Kumar,S. and Anand,S.(2012). Congestion control mechanism using fuzzy logic, Int. J. Emerging Trends Technol.
Comput. Sci. 2(2), 313319.
[16]. Ugwu,K.I.et al.Modeling of Alternating Current Motor Performance for Increased Production Using Fuzzy Logic Controller.
International Journal of Electrical Components and Energy Conversion. Vol. 7, No. 1, 2021, pp. 17-22. doi:
10.11648/j.ijecec.20210701
[17]. Bakare, K., Ngang, N.B., Improving Frequency Stability of the Nigerian 330kv Transmission Network Using Fuzzy
Controller. American Journal of Electrical Power and Energy Systems. Vol. 10, No. 3, 2021, pp. 43-50. doi: 10.11648/j.epes.20211003.1
[18]. Onuba, C., et al., Energy Efficiency Improvement of Doubly Fed Induction Generator Machines using Adaptive Control Technique.
International Journal of Advances in Engineering and Management (IJAEM) Volume 3, Issue 7 July 2021
ResearchGate has not been able to resolve any citations for this publication.
Article
Full-text available
It is about the Energy Efficiency Improvement of Doubly Fed Induction Generator Machines using Adaptive Control Technique
Article
Full-text available
Most Telecommunication companies could not guarantee complete free and quality communication network service. In recent times there had been Undesirable service delivery, this problem is traced to not having free and quality network which had arisen as a result of not monitoring when there is high bit error rate. The problem had been addressed and a solution proffered in this paper by Real time Evaluation and Monitoring of GSM quality of service utilizing intelligent agent device. This was achieved by first determining the channel capacity for GSM quality network, obtaining the bit error rate for the determined capacity, designing an intelligent GSM rule that will monitor and minimize the high bit error rate for quality service and finally designing a Simulink model for real time monitoring and evaluation of GSM quality of service using intelligent agent. The result obtained was10% better than using the conventional methods or techniques like Hieratical, Proportional Integral Derivative (PID). Real time monitoring and Evaluation of GSM quality of service using intelligent agent is preferred to other conventional methods as it can guarantee a perfect and free network in our communication network. The advent of modern technologies and concepts have improved the way IT services provide, maintain and regulate their services to end users. Telecommunication equipment/systems have to function to accomplish the profound effects of this new trend. Network elements starting from low resource devices to large scale distributed applications have been affected by the evolutionary trend. The new technologies and concepts in both data and telecommunication industry are modifying the way service providers, maintain and use the various IT services. Management systems have to ensure the deliverance of good services despite the effects of this technological evolution that was introduced into the network. Large quantities of different network elements ranging from low resource devices to large scale distributed applications are now in use competitively. Network congestion in data networking and queuing concept or theory has to do with reduced quality of service that occurs when a network node or link is carrying more than it can handle. The undesirable consequence is queueing delay, packet loss or the blocking of new connections eventually. 1.2 Aim of the Study This paper is aimed at Using Intelligent Agent to achieve Real-time monitoring and evaluation of GSM quality of service in Nigeria. 1.3 Objectives of Study Demand on mobile phones and data service applications have influenced the expansion of telecommunication equipment and caused Network congestion. Therefore, the objectives of this work are to  Determine the channel capacity for GSM Quality Network.  Evaluate the bit error rate for the determined capacity  Design an Intelligent GSM Rule that will monitor and minimize the high bit error rate for quality Service
Article
Full-text available
Passing information or transfer of data from one point to the other has become a chronic problem in our communication industry. This can be overcome by improving the robustness of data network using adaptive modulation technique. Wireless communication technology transmits information over the air using electromagnetic waves like Infrared, Radio Frequency, and satellite. Recall that GPS, Wi-Fi, satellite television, wireless computer parts, wireless phones that include 3G and 4G networks, and Bluetooth are typical examples. Adaptive Modulation is a technique which allows a radio to change its modulation rate or speed as conditions in the radio network change. Interference from outside sources, such as changes in the environment (temperature, tree foliage, moving objects usually affect radio coverage. Therefore, the physical layer mode is usually adapted to the worst case link condition, however, Adaptive method would improve the robustness of the Network. This is done in this manner, Designing a Simulink model of the network of study and use it to study the extent of robustness of data in the network, determining the bit error rate, evaluating the behavior of packets in the channel network, designing an adaptive modulation scheme to reduce high bit error rate, congestion and interference thereby improving robustness in the data network and designing a model for improving the robustness of data network using adaptive modulation. The result obtained is four times reduction of robustness in data network using adaptive modulation which thereby enhances the efficiency oftransfering data from one point to the other without stress.
Article
Full-text available
ABSTRACT The widespread demand for data applications over mobile networks requires that service providers guarantee a well defined quality of service (QoS) for subscribers. Evaluating the QoS provided by service providers within a geographical area to determine which network provides the best QoS is a challenging task. The complex nature of mobile networks with multi-criteria and conflicting factors makes good decision making difficult. This paper presents a measurement based method called Analytic Hierarchy Process (AHP) for evaluating QoS in application specific and user centric data on 3G mobile networks.The evaluation problem is formulated as a multicriteria decision problem. Latency, jitter, data loss, and throughput are the parameters collected as criteria in drive testing over the mobile network. Decision matrix is applied to solve the problem by reaching a final ranking of the network based on the collected measured values of the problem parameters. A case study of 3G mobile networks in Uyo metropolis is used to show how this approach can be effective in ranking the QoS in data applications to determine which network provides the best QoS based on users’ perception of quality. The implemented results in Java indicate that Etisalat network is the alternative that offers the best QoS for web browsing application based on measured criteria. This is followed by Airtel and then MTN, while Glo is ranked least. The result provides useful information to decision makers for performance improvement on service quality. Analytic Hierarchy Process for Qos Evaluation of Mobile Data Networks. Available from: https://www.researchgate.net/publication/286649886_Analytic_Hierarchy_Process_for_Qos_Evaluation_of_Mobile_Data_Networks [accessed Jan 4, 2016].
Article
Full-text available
ABSTRACT The operations of the prediction of stock price are complex and risky due to fluctuation in the stock market because of the vagueness, incompleteness, and uncertainty of the information used. However, it is therefore as a matter of necessity to seek to foresee stock prices because traders need to know when to invest in order to get the maximum return of the investment. This paper proposes a Sugeno-type fuzzy inference system for stock price prediction using technical indicators as its input values. Knowledge Base, Fuzzification, Inference Engine and Defuzzification are the essential components of our model. We explore Sugeno-type fuzzy inference engine to optimize the estimated result. We evaluate the degree of participation of each input parameter with Trapezoidal membership function. Center of Gravity technique is employed for defuzzification. We employ object oriented design tool to model our database. MATLAB and fuzzy relational database are used in the implementation of our study. The development of this system is based on the selection of stock data history which are studied and used for training the system. This system provides vital support to stock traders, researchers and other financial experts in making decisions as regards stock trading.
Article
Full-text available
T he nature of the services provided by IP Multimedia Subsystem ( IMS ) networks require a maximum quality , this will appear in service provisioning for differentiate between the added value of IMS and other classical case as well as I nternet. Toward , the QoS management mechanisms focus primarily on resource reservation in service provision ing, all this specific ation are introduced by 3GPP standards . Although , all proposed m echanisms hav e n’t any entity overseeing and monitoring services after supply . For that in this work, w e propose a new approach QoS monitoring based on fuzzy logic . The technique allows modelling a control system able to identify any QoS deterioration in real - time , also a rapid resources reconfiguration and restoration to ensure customer satisfaction IMS .
Article
Full-text available
Premium IP networks provide users with a portfolio of services, thanks to their intrinsic capability to perform a service creation process while relying on a QoS-enabled infrastructure. The most natural interface between users and Premium IP networks is represented by the Service Level Agreement (SLA). In order to allow an effective exploitation of such networks, it is of primary importance the availability of mechanisms for the monitoring of performance parameters related to a specified service instance. This capability, named SLA monitoring, is of interest for both the end user, as the entity that uses the service, and the service provider, as the entity that creates, configures and delivers the service. In SLA monitoring several components are involved, such as network operators, content providers, and end-users, often spread over multiple domains. Involving all these entities has a cost: it is due to the usage of computational, storage and network resources, as needed for information retrieving, analysis and distribution. In this paper, we illustrate a proposal for a monitoring framework for the collection and distribution of performance data. The idea our proposal is mainly based on, makes reference to the definition of an information document named Service Level Indication (SLI). Monitoring information, related to a specific Service Level Agreement, are so retrieved from the network and provided to the user application, by collecting and appropriately combining performance metrics and measures in an SLI document instance. Such a document is the interface allowing to exchange monitoring information between peer components located in different domains as well as between components at different levels of abstraction in the same domain.
Article
Full-text available
Measurements and simulations are the main tools for studying the performance of IP networks. Furthermore, active measurement techniques are becoming an integral part of real network performance management systems. But if excessive testing packets are generated and injected into the network, then it might lead to worsening congestion. However, passive monitoring of queue length distributions will not cause any intrusive effect to the network, but it may not be scalable. This paper will explore the limitations of passive and active measurements and provide some measurement results related to them.
Article
The low productivity experienced in our industries is as a result of not imbibing intelligence in its production mechanism. We know that induction motors are reliable, robust and with good operating characteristics. A means of starting, regulating and controlling operating parameters are very necessary to improve motor efficiency. This low productivity witnessed in our brewery industry is surmounted by modeling of alternating current (a.c) motor performance for increased production output using fuzzy logic controller. To achieve this it is done in this manner, characterizing and modeling a conventional AC motor so as to establish its operational features while working on variable frequency drive (VFD) control model with known production output, designing a rule base for the use of fuzzy controller for a stable and improved production output of AC motor and designing SIMULINK model for the performance of AC motor under operational condition for an increased output using fuzzy controller for a brewery industry. The results obtained are the highest conventional quantity of bottles of beer produced was 3240 while that of fuzzy controller was 3245 at a stable time of 4 through 10 seconds. With these results obtained, it shows there is an improvement in the production capacity in brewery industry when fuzzy controller is incorporated in the system. Keywords: Modeling, Alternating Current, Motor, Increase Production, Fuzzy Controller