Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Physical Sciences and Mathematics (12336)
- Computer Sciences (11853)
- Electrical and Computer Engineering (6961)
- Artificial Intelligence and Robotics (3642)
- Operations Research, Systems Engineering and Industrial Engineering (3621)
-
- Numerical Analysis and Scientific Computing (3340)
- Systems Science (3283)
- Digital Communications and Networking (2055)
- Computer and Systems Architecture (1596)
- Data Storage Systems (1453)
- Social and Behavioral Sciences (1394)
- Other Computer Engineering (1326)
- Civil and Environmental Engineering (1180)
- Robotics (1137)
- Civil Engineering (1101)
- Electrical and Electronics (948)
- Mechanical Engineering (809)
- Information Security (720)
- Environmental Engineering (655)
- Other Civil and Environmental Engineering (645)
- Systems and Communications (607)
- Hydraulic Engineering (575)
- Law (565)
- Business (503)
- Hardware Systems (494)
- Materials Science and Engineering (474)
- Legal Studies (473)
- Chemical Engineering (471)
- Institution
-
- China Simulation Federation (3264)
- TÜBİTAK (2998)
- Wright State University (1749)
- University of Nebraska - Lincoln (1087)
- University of Texas at El Paso (833)
-
- Washington University in St. Louis (717)
- Technological University Dublin (650)
- Brigham Young University (642)
- Selected Works (590)
- California Polytechnic State University, San Luis Obispo (587)
- Embry-Riddle Aeronautical University (515)
- Singapore Management University (482)
- Universitas Indonesia (433)
- Old Dominion University (389)
- Marquette University (386)
- Air Force Institute of Technology (356)
- Santa Clara University (302)
- University of South Carolina (274)
- SelectedWorks (272)
- University of Central Florida (244)
- Portland State University (242)
- California State University, San Bernardino (236)
- Purdue University (212)
- Western University (191)
- Nova Southeastern University (170)
- New Jersey Institute of Technology (166)
- University of Arkansas, Fayetteville (163)
- University of Massachusetts Amherst (163)
- University of Nevada, Las Vegas (162)
- University of South Florida (156)
- Keyword
-
- Machine learning (335)
- Computer Science (312)
- Department of Computer Science and Engineering (255)
- Engineering (240)
- Deep learning (237)
-
- Simulation (229)
- Robotics (202)
- Machine Learning (188)
- Security (173)
- College of Engineering and Computer Science (157)
- Newsletters (157)
- Science news (157)
- Technical writing (157)
- Optimization (154)
- Classification (146)
- Computer Science and Engineering (121)
- Artificial intelligence (120)
- Deep Learning (119)
- Cybersecurity (108)
- Genetic algorithm (107)
- Internet (105)
- Computer vision (100)
- Computer Engineering (97)
- Computer science (94)
- Data mining (94)
- Privacy (92)
- Particle swarm optimization (87)
- Clustering (85)
- Cloud computing (84)
- Applied sciences (82)
- Publication Year
- Publication
-
- Journal of System Simulation (3264)
- Turkish Journal of Electrical Engineering and Computer Sciences (2998)
- Computer Science & Engineering Syllabi (1312)
- Departmental Technical Reports (CS) (760)
- All Computer Science and Engineering Research (683)
-
- International Congress on Environmental Modelling and Software (630)
- Theses and Dissertations (536)
- Department of Electrical and Computer Engineering: Faculty Publications (483)
- Research Collection School Of Computing and Information Systems (450)
- Makara Journal of Technology (431)
- Electrical and Computer Engineering Faculty Research and Publications (366)
- Electronic Theses and Dissertations (347)
- Faculty Publications (314)
- Dissertations (308)
- Journal of Digital Forensics, Security and Law (299)
- Browse all Theses and Dissertations (278)
- Computer Engineering (267)
- Masters Theses (206)
- Computer Science and Engineering Senior Theses (201)
- Department of Computer Science and Engineering: Dissertations, Theses, and Student Research (190)
- Doctoral Dissertations (183)
- Master's Theses (176)
- Electrical and Computer Engineering Faculty Publications (171)
- Conference papers (163)
- BITs and PCs Newsletter (157)
- College of Engineering and Computing Course Catalogs (152)
- Chulalongkorn University Theses and Dissertations (Chula ETD) (149)
- USF Tampa Graduate Theses and Dissertations (133)
- Publications (130)
- Articles (128)
Articles 12031 - 12060 of 23213
Full-Text Articles in Computer Engineering
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Countering Noise-Based Splicing Detection Using Noise Density Transfer, Thibault Julliand, Vincent Nozick, Hugues Talbot
Countering Noise-Based Splicing Detection Using Noise Density Transfer, Thibault Julliand, Vincent Nozick, Hugues Talbot
Journal of Digital Forensics, Security and Law
Image splicing is a common and widespread type of manipulation, which is defined as pasting a portion of an image onto a second image. Several forensic methods have been developed to detect splicing, using various image properties. Some of these methods exploit the noise statistics of the image to try and find discrepancies. In this paper, we propose a new counter-forensic approach to eliminate the noise differences that can appear in a spliced image. This approach can also be used when creating computer graphics images, in order to endow them with a realistic noise. This is performed by changing the …
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Robust Multi-Criteria Optimal Fuzzy Control Of Discrete-Time Nonlinear Systems, Xin Wang, Edwin E. Yaz
Robust Multi-Criteria Optimal Fuzzy Control Of Discrete-Time Nonlinear Systems, Xin Wang, Edwin E. Yaz
Electrical and Computer Engineering Faculty Research and Publications
This paper presents a novel fuzzy control design of discrete-time nonlinear systems with multiple performance criteria. The purpose behind this work is to improve the traditional fuzzy controller performance to satisfy several performance criteria simultaneously to secure quadratic optimality with an inherent stability property together with a dissipativity type of disturbance reduction. The Takagi–Sugeno-type fuzzy model is used in our control system design. By solving a linear matrix inequality at each time step, the optimal control solution can be found to satisfy mixed performance criteria. The effectiveness of the proposed technique is demonstrated by simulation of the control of the …
The Role Of Uncertainty In Categorical Perception Utilizing Statistical Learning In Robots, Nathaniel V. Powell
The Role Of Uncertainty In Categorical Perception Utilizing Statistical Learning In Robots, Nathaniel V. Powell
Graduate College Dissertations and Theses
At the heart of statistical learning lies the concept of uncertainty.
Similarly, embodied agents such as robots
and animals must likewise address uncertainty, as sensation
is always only a partial reflection of reality. This
thesis addresses the role that uncertainty can play in
a central building block of intelligence: categorization.
Cognitive agents are able to perform tasks like categorical perception
through physical interaction (active categorical perception; ACP),
or passively at a distance (distal categorical perception; DCP).
It is possible that the former scaffolds the learning of
the latter. However, it is unclear whether DCP indeed scaffolds
ACP in humans and …
Bytewise Approximate Matching: The Good, The Bad, And The Unknown, Vikram S. Harichandran, Frank Breitinger, Ibrahim Baggili
Bytewise Approximate Matching: The Good, The Bad, And The Unknown, Vikram S. Harichandran, Frank Breitinger, Ibrahim Baggili
Electrical & Computer Engineering and Computer Science Faculty Publications
Hash functions are established and well-known in digital forensics, where they are commonly used for proving integrity and file identification (i.e., hash all files on a seized device and compare the fingerprints against a reference database). However, with respect to the latter operation, an active adversary can easily overcome this approach because traditional hashes are designed to be sensitive to altering an input; output will significantly change if a single bit is flipped. Therefore, researchers developed approximate matching, which is a rather new, less prominent area but was conceived as a more robust counterpart to traditional hashing. Since the conception …
Towards Syntactic Approximate Matching-A Pre-Processing Experiment, Doowon Jeong, Frank Breitinger, Hari Kang, Sangjin Lee
Towards Syntactic Approximate Matching-A Pre-Processing Experiment, Doowon Jeong, Frank Breitinger, Hari Kang, Sangjin Lee
Electrical & Computer Engineering and Computer Science Faculty Publications
Over the past few years, the popularity of approximate matching algorithms (a.k.a. fuzzy hashing) has increased. Especially within the area of bytewise approximate matching, several algorithms were published, tested, and improved. It has been shown that these algorithms are powerful, however they are sometimes too precise for real world investigations. That is, even very small commonalities (e.g., in the header of a file) can cause a match. While this is a desired property, it may also lead to unwanted results. In this paper, we show that by using simple pre-processing, we significantly can influence the outcome. Although our test set …
Exploring Deviant Hacker Networks (Dhn) On Social Media Platforms, Samer Al-Kateeb, Kevin Conlan, Nitin Agarwal, Ibrahim Baggili, Frank Breitinger
Exploring Deviant Hacker Networks (Dhn) On Social Media Platforms, Samer Al-Kateeb, Kevin Conlan, Nitin Agarwal, Ibrahim Baggili, Frank Breitinger
Electrical & Computer Engineering and Computer Science Faculty Publications
Online Social Networks (OSNs) have grown exponentially over the past decade. The initial use of social media for benign purposes (e.g., to socialize with friends, browse pictures and photographs, and communicate with family members overseas) has now transitioned to include malicious activities (e.g., cybercrime, cyberterrorism, and cyberwarfare). These nefarious uses of OSNs poses a signi_cant threat to society, and thus requires research attention. In this exploratory work, we study activities of one deviant groups: hacker groups on social media, which we term Deviant Hacker Networks (DHN). We investigated the connection between different DHNs on Twitter: how they are connected, identified …
Find Me If You Can: Mobile Gps Mapping Applications Forensic Analysis & Snavp The Open Source, Modular, Extensible Parser, Jason Moore, Ibrahim Baggili, Frank Breitinger
Find Me If You Can: Mobile Gps Mapping Applications Forensic Analysis & Snavp The Open Source, Modular, Extensible Parser, Jason Moore, Ibrahim Baggili, Frank Breitinger
Electrical & Computer Engineering and Computer Science Faculty Publications
The use of smartphones as navigation devices has become more prevalent. The ubiquity of hand-held navigation devices such as Garmins or Toms Toms has been falling whereas the ownership of smartphones and their adoption as GPS devices is growing. This work provides a comprehensive study of the most popular smartphone mapping applications, namely Google Maps, Apple Maps, Waze, MapQuest, Bing, and Scout, on both Android and iOS. It details what data was found, where it was found, and how it was acquired for each application. Based on the findings, the work allowed for the construction of a tool capable of …
Saros: A Social-Aware Opportunistic Forwarding Simulator, Soumaia Al Ayyat
Saros: A Social-Aware Opportunistic Forwarding Simulator, Soumaia Al Ayyat
Papers, Posters, and Presentations
Many applications are being developed to leverage the popularity of mobile opportunistic networks. However, building adaptive testbeds can be costly and challenging. This challenge motivates the need for effective opportunistic network simulators to provide a variety of opportunistic environment setups, and evaluate proposed applications and protocols with a comprehensive set of metrics. This paper presents SAROS, a simulator of opportunistic networking environments with a variety of interest distributions, power consumption distributions, imported real traces, and social network integration. The simulator provides a wide variety of evaluation metrics that are not offered by comparable simulators. Finally, SAROS also implements several opportunistic …
A Work System Front End For Object-Oriented Analysis And Design, Steven Alter, Narasimha Bolloju
A Work System Front End For Object-Oriented Analysis And Design, Steven Alter, Narasimha Bolloju
Business Analytics and Information Systems
This paper proposes that basic ideas from the work system theory (WST) and the work system method (WSM) might serve as a front end to object-oriented analysis and design (OOAD), thereby providing a path from business-oriented descriptions to formal, technical specifications. After describing the background motivation and summarizing work system concepts, the paper uses a hiring system example to show how two tools from WSM can be used as a front end for OOAD, in effect, a step before creating use case diagrams and other types of Unified Modeling Language (UML) artifacts. Potential benefits of this approach stem from a …
3d Immersive Visualization: Expanding Human Sensation, Megan Davis, Francisco Gonzalez, Connor Waters
3d Immersive Visualization: Expanding Human Sensation, Megan Davis, Francisco Gonzalez, Connor Waters
Capstone Design Expo Posters
Unmet Need: The constant push for better and more interactive data visualization aids: the Oculus Rift replaced a two-dimensional fixed monitor with head tracking and a three-dimensional virtual space to explore; the Novint Falcon replaces two-dimensional pointing tools with a haptic sensor with force feedback and three degrees of axial freedom.
Deliverables: A demonstration of the technologies involved, in the form of an Oculus- and Falconenabled physical simulation of a room containing several objects that can be handled and manipulated in three dimensions.
Constraints: The hardware is expensive and difficult to acquire, and it requires a beefy computer to run. …
Data Network Visualization, Marcangelo Dilinila, Carl Miranda, Chase Keech
Data Network Visualization, Marcangelo Dilinila, Carl Miranda, Chase Keech
Capstone Design Expo Posters
Data visualization is an essential component of any data analysis. A visual image can aid in more in-depth analysis of any researched data. Although there are data visualization products that already exist on the market, such as Gephi, yEd Graph editor, and OmniGraffle, they are platform-dependent and can be difficult for novice users to install and get started. Data Network Visualization eliminates these weaknesses by being fully accessible through the web, while having a less cluttered user interface. This allows a user to take advantage of a variety of visualization tools without the need to download a program.
To achieve …
Cryptocurrency: Proof Of Purchase, Adam Johnson, Robert Breckenridge, Kara Lucord
Cryptocurrency: Proof Of Purchase, Adam Johnson, Robert Breckenridge, Kara Lucord
Capstone Design Expo Posters
The original purpose of this project was to research the capabilities of a relatively new cryptocurrency platform known as Ethereum. Extensive research brought to light Ethereum’s wide range of developmental capabilities and shifted our focus to the consideration of how the features that Ethereum offers can be used to improve some of the flaws within the world of cryptocurrency. Some cryptocurrency users find these systems useful, because it gives them a means of anonymity. This makes it pretty easy to launder money, make illegal purchases, and double spend. Our solution solves all of these issues, by tying a digital currency …
Swummary: Self-Documenting Code, Keith Herbert, John Goldhamer, Dylan Ilvento
Swummary: Self-Documenting Code, Keith Herbert, John Goldhamer, Dylan Ilvento
Capstone Design Expo Posters
Using Natural Language Summaries of Program Elements to Improve Code Search
There are countless people that are intimidated by reading computer programs, potentially driving away future engineers. Even current software developers, when moving from project to project, face downtime due to acclimating themselves with a new, poorly commented code base. Our project, which we call Swummary, strives to eliminate these problems by providing succinct natural language summaries of source code.
We were tasked with developing a functioning prototype of a natural language source code summarizer, based on the frameworks SrcML and Software Word Usage Model (SWUM), as well as the …
Will Wade’S Team Camp: An Online Registration Service For Will Wade’S Basketball Team Camp At Vcu, William Slattum, Melissa Nierle
Will Wade’S Team Camp: An Online Registration Service For Will Wade’S Basketball Team Camp At Vcu, William Slattum, Melissa Nierle
Capstone Design Expo Posters
Virginia Commonwealth University(VCU) has made a name for its self on the national stage of NCAA Men’s Basketball. Success on the court has brought attention to the many programs VCU has to offer. One of these popular programs is Will Wade’s summer basketball camp. Teams come from all over the Atlantic region to attend the daylong team camp. With such wide-spread interest in the camp and about 50 teams signing up to participate annually and growing, how can VCU Athletics best handle and keep all of the information organized? The project deliverable was an online system that both registers teams …
Tatami: A Productive Work-Based Social Media, Jacob Kreiner, Jacob Holcombe, Minh Nguyen
Tatami: A Productive Work-Based Social Media, Jacob Kreiner, Jacob Holcombe, Minh Nguyen
Capstone Design Expo Posters
Tatami is a collaborative social media app created by Ippon Technologies that focuses on workflow and communication in an industry setting. Ippon wanted a product that allows members of a company to maximize productivity, and have a communal message board that shows what is going on in the company currently. Functionality of this product would allow a user to create an account, set up and edit their profile and be able to post messages to a workplace timeline. For a more specific and personal timeline we need users to be able to create and subscribe to groups and trends corresponding …
Application Intrusion Detection: Security For Cloud Deployments, Justin Murphy, Nick Harrison, John Taylor
Application Intrusion Detection: Security For Cloud Deployments, Justin Murphy, Nick Harrison, John Taylor
Capstone Design Expo Posters
As servers move to the cloud, sources for security analysis become more limited. Security teams must make the most of the resources available to them. Our project attempts to fulfill this need by providing a template-based application to analyze and detect security events in logs that are available in cloud environments. We focus on authentication logs, but analysis modules can be added to flag anomalies in any log.
The deliverables include log analysis, including successive repeated failures, location-based anomalies, and excessive failed login attempts across multiple accounts. To present our findings we output the results to a web interface for …
Hybrid Call Center: Amc Technology Llc, Tejas Trivedi, Joshua Stephens, Daniel Kim
Hybrid Call Center: Amc Technology Llc, Tejas Trivedi, Joshua Stephens, Daniel Kim
Capstone Design Expo Posters
AMC Technology wanted to add voice over IP (VoIP) functionality to Salesforce.com (Customer Relationship Management system). As it is currently, Salesforce.com does not have voice functionality, in that you cannot place or receive calls using Salesforce. Adding voice functionality to Salesforce is incredibly useful because it eliminates the need for hardware phones and allows for a more modern and efficient approach to calling for companies that have/rely upon call centers, such as customers of AMC Technology whose products connect CTIs (Computer Telephony Interface) and CRMs. We used a voice service called Twilio to provide functionality with Salesforce. AMC Technology wanted …
Restful Api Framework: Golang Proof Of Concept, Gerard Briones, David Igou, Aaron Throckmorton
Restful Api Framework: Golang Proof Of Concept, Gerard Briones, David Igou, Aaron Throckmorton
Capstone Design Expo Posters
Capital One has embarked on a journey of exposing useful services as RESTful APIs that can be utilized seamlessly by applications and clients. The purpose of this project was to develop an API framework that can be easily molded and deployed to reinforce this endeavor, standardizing the access and use of these services for every developer. This framework was built with a modern programming language, Golang, and excels in performance, scalability, and efficiency. A working prototype and proof of concept serve as the deliverables for this project, with notable constraints in the type of architecture (REST) used for the framework …
Welcome To Willowtree: Come Take A Closer Look, Shahim-Abdul Satar, Kent White, Ayesha Zafar
Welcome To Willowtree: Come Take A Closer Look, Shahim-Abdul Satar, Kent White, Ayesha Zafar
Capstone Design Expo Posters
The demand for more workers in tech related fields has given students the opportunity of choosing between multiple job offers and students can now be more deliberate about the jobs that they accept. Because of this employers also need to set themselves apart from other companies. Many companies do this is by sending out brochures, PDFs, and other information that may be outdated by the time it goes out. Our solution to this problem was to make an application which would provide relevant data to the user as well as provide insight into the company. The end result is a …
Per-Pixel Calibration For Rgb-Depth Natural 3d Reconstruction On Gpu, Sen Li
Per-Pixel Calibration For Rgb-Depth Natural 3d Reconstruction On Gpu, Sen Li
Theses and Dissertations--Electrical and Computer Engineering
Ever since the Kinect brought low-cost depth cameras into consumer market, great interest has been invigorated into Red-Green-Blue-Depth (RGBD) sensors. Without calibration, a RGBD camera’s horizontal and vertical field of view (FoV) could help generate 3D reconstruction in camera space naturally on graphics processing unit (GPU), which however is badly deformed by the lens distortions and imperfect depth resolution (depth distortion). The camera’s calibration based on a pinhole-camera model and a high-order distortion removal model requires a lot of calculations in the fragment shader. In order to get rid of both the lens distortion and the depth distortion …
Robot Fish Do Not Need Sentience, Antonio Chella
Robot Fish Do Not Need Sentience, Antonio Chella
Animal Sentience
The target article by Key (2016) discusses the thesis that fish cannot feel pain because of the lack of the necessary neural structure. This commentary suggests the possibility that fish do not need conscious neural processing by taking into account recent results from biomimetic robotics. State-of-the-art biomimetic robot fish are based on a tight interaction between the body and the environment and are typically controlled by behavior-based architectures. Therefore, it can be hypothesized that cognitive architectures are not needed to control a robot fish. This is in line with the thesis proposed by Key: what biomimetic robot fish show is …
Nsu College Engineering And Computing Curriculum 2016, Nova Southeastern University
Nsu College Engineering And Computing Curriculum 2016, Nova Southeastern University
College of Engineering and Computing Course Catalogs
No abstract provided.
Kinematic Modeling Of An Automated Laser Line Scanning System, Kiran Sunil Deshmukh
Kinematic Modeling Of An Automated Laser Line Scanning System, Kiran Sunil Deshmukh
Wayne State University Theses
This research work describes the geometric coordinate transformation in an automated laser line scanning system caused by movements required for scanning a component surface. The elements of an automated laser scanning system (robot, laser line scanner, and the component coordinate system) function as a mechanical linkage to obtain a trajectory on a component surface. This methodology solves the forward kinematics, derives the component surface, and uses inverse kinematic equations to characterize the movement of the entire automated scanning system on point trajectory. To reach a point on the component, joint angles of robot have been calculated. As a result, trajectory …
Sickle Blood Cell Detection Based On Image Segmentation, Kholoud Alotaibi
Sickle Blood Cell Detection Based On Image Segmentation, Kholoud Alotaibi
Electronic Theses and Dissertations
Red blood cells have a vital role in human health. Red blood cells have a circular shape and a concave surface and exchange the gasses between the inside and outside of the body. However, at times, these normally round cells become sickle shaped, which is an indication of sickle cell disease. This paper introduces a unique approach to detect sickle blood cells in blood samples using image segmentation and shape detection. This method is based on calculating the max axis and min axis of the cell. The form factor is computed using these properties to determine whether the cell is …
Product Authentication Using Hash Chains And Printed Qr Codes, Harshith R. Keni
Product Authentication Using Hash Chains And Printed Qr Codes, Harshith R. Keni
Electronic Theses and Dissertations
This thesis explores the usage of simple printed tags for authenticating products. Printed tags are a cheap alternative to RFID and other tag based systems and do not require specialized equipment. Due to the simplistic nature of such printed codes, many security issues like tag impersonation, server impersonation, reader impersonation, replay attacks and denial of service present in RFID based solutions need to be handled differently. An algorithm that utilizes hash chains to secure such simple tags while still keeping cost low is discussed. The security characteristics of this scheme as well as other product authentication schemes that use RFID …
Data Center Load Forecast Using Dependent Mixture Model, Md Riaz Ahmed Khan
Data Center Load Forecast Using Dependent Mixture Model, Md Riaz Ahmed Khan
Electronic Theses and Dissertations
The dependency on cloud computing is increasing day by day. With the boom of data centers, the cost is also increasing, which forces industries to come up with techniques and methodologies to reduce the data center energy use. Load forecasting plays a vital role in both efficient scheduling and operating a data center as a virtual power plant. In this thesis work a stochastic method, based on dependent mixtures is developed to model the data center load and is used for day-ahead forecast. The method is validated using three data sets from National Renewable Energy Laboratory (NREL) and one other …
On The Analytical Formulation Of Excess Noise In Avalanche Photodiodes With Dead Space, Erum Jamil, Jeng Shiuh Cheong, J.P.R. David, Majeed M. Hayat
On The Analytical Formulation Of Excess Noise In Avalanche Photodiodes With Dead Space, Erum Jamil, Jeng Shiuh Cheong, J.P.R. David, Majeed M. Hayat
Electrical and Computer Engineering Faculty Research and Publications
Simple, approximate formulas are developed to calculate the mean gain and excess noise factor for avalanche photodiodes using the dead-space multiplication theory in the regime of small multiplication width and high applied electric field. The accuracy of the approximation is investigated by comparing it to the exact numerical method using recursive coupled integral equations and it is found that it works for dead spaces up to 15% of the multiplication width, which is substantial. The approximation is also tested for real materials such as GaAs, InP and Si for various multiplication widths, and the results found are accurate within ∼ …
Robust Multi-Criteria Optimal Fuzzy Control Of Continuous-Time Nonlinear Systems, Xin Wang, Edwin E. Yaz
Robust Multi-Criteria Optimal Fuzzy Control Of Continuous-Time Nonlinear Systems, Xin Wang, Edwin E. Yaz
Electrical and Computer Engineering Faculty Research and Publications
This paper presents a novel fuzzy control design of continuous-time nonlinear systems with multiple performance criteria. The purpose behind this work is to improve the traditional fuzzy controller performance to satisfy several performance criteria simultaneously to secure quadratic optimality with inherent stability property together with dissipativity type of disturbance reduction. The Takagi– Sugeno fuzzy model is used in our control system design. By solving the linear matrix inequality at each time step, the control solution can be found to satisfy the mixed performance criteria. The effectiveness of the proposed technique is demonstrated by simulation of the control of the inverted …