EARLY VIEW

Early View Articles

December 2024


 
 
Open Access
A Secure Image Cryptographic Algorithm Based on Triple Incorporated Ciphering Stages
Sura F. Yousif, Abbas Salman Hameed, and Dheyaa T. Al-Zuhairi
Pages: 1-21

Version of record online: 26 March 2024      Full Text (PDF)

DOI:10.37917/ijeee.20.2.1

Lately, image encryption has stand out as a highly urgent demand to provide high security for digital images against use and unauthorized distribution. A lot of existing researches use chaotic systems, symmetric or asymmetric schemes for image encryption, but cryptosystem based on one encryption technique only, faces many challenges like weak security and low complexity. Therefore, incorporating two or more different ciphering methods yields a secure and efficient algorithm to protect image information. In this work, a new image cryptosystem is suggested by joining zigzag scan technique, RSA algorithm and chaotic systems. These three security factors introduce Triple Incorporated Ciphering stages system (TIC). Initially, the plaintext image is divided into $8\times 8$ non-overlapping blocks, then the odd blocks are isolated from the even blocks. After that, a new modified zigzag scan in two different directions is adopted for shuffling pixels in the odd and even blocks. This operation effectively enhances the shuffling degree. Next, the RSA algorithm is utilized after combining the scrambled blocks in one matrix. Finally, chaotic systems are implemented on the resultant encrypted matrix to complete the ciphering process. The chaos is implemented in two steps; confusion and diffusion. Duffing map is exploited in the confusion stage, whereas L”u system is adopted on the shuffled matrix in the diffusion stage. The simulation results show the superiority of TIC in both security and attacks robustness compared to other cryptographic algorithms. Therefore, TIC can be exploited in real-time communication systems for secure image transmission.

 
Open Access
On the Actuation Technologies of Biomedical Microrobot: A Summarized Review
Anwar Hamza Bresam, and Haider Al-Mumen
Pages: 22-32

Version of record online: 23 April 2024      Full Text (PDF)

DOI:10.37917/ijeee.20.2.2

In recent years, wireless microrobots have gotten more attention due to their huge potential in the biomedical field, especially drug delivery. Microrobots have several benefits, including small size, low weight, sensitivity, and flexibility. These characteristics have led to microscale improvements in control systems and power delivery with the development of submillimeter-sized robots. Wireless control of individual mobile microrobots has been achieved using a variety of propulsion systems, and improving the actuation and navigation of microrobots will have a significant impact. On the other hand, actuation tools must be integrated and compatible with the human body to drive these untethered microrobots along predefined paths inside biological environments. This study investigated key microrobot components, including medical applications, actuation systems, control systems, and design schemes. The efficiency of a microrobot is impacted by many factors, including the material, structure, and environment of the microrobot. Furthermore, integrating a hybrid actuation system and multimodal imaging can increase the microrobot’s navigation effect, imaging algorithms, and working environment. In addition, taking into account the human body’s moving distance, autonomous actuating technology could be used to deliver microrobots precisely and quickly to a specific position using a combination of quick approaches.

 
Open Access
Taguchi Method Based Node Performance Analysis of Generous TIT- for-TAT Cooperation of AD-HOC Networks
Noor Kareem Jumaa, Auday A.H. Mohamad, Abbas Muhammed Allawy, and Ali A. Mohammed
Pages: 33-44

Version of record online: 24 April 2024      Full Text (PDF)

DOI:10.37917/ijeee.20.2.3

Ad-Hoc networks have an adaptive architecture, temporarily configured to provide communication between wireless devices that provide network nodes. Forwarding packets from the source node to the remote destination node may require intermediate cooperative nodes (relay nodes), which may act selfishly because they are power-constrained. The nodes should exhibit cooperation even when faced with occasional selfish or non-cooperative behaviour from other nodes. Several factors affect the behaviour of nodes; those factors are the number of packets required to redirect, power consumption per node, and power constraints per node. Power constraints per node and grade of generosity. This article is based on a dynamic collaboration strategy, specifically the Generous Tit-for-Tat (GTFT), and it aims to represent an Ad-Hoc network operating with the Generous Tit-for-Tat (GTFT) cooperation strategy, measure statistics for the data, and then analyze these statistics using the Taguchi method. The transfer speed and relay node performance both have an impact on the factors that shape the network conditions and are subject to analysis using the Taguchi Method (TM). The analyzed parameters are node throughput, the amount of relay requested packets produced by a node per number of relays requested packets taken by a node, and the amount of accepted relay requested by a node per amount of relay requested by a node. A Taguchi L9 orthogonal array was used to analyze node behaviour, and the results show that the effect parameters were number of packets, power consumption, power constraint of the node, and grade of generosity. The tested parameters influence node cooperation in the following sequence: number of packets required to redirect (N) (effects on behaviour with a percent of 6.8491), power consumption per node (C) (effects on behaviour with a percent of 0.7467), power constraints per node (P) (effects on behaviour with a percent of 0.6831), and grade of generosity (ε) (effects on behaviour with a percent of 0.4530). Taguchi experiments proved that the grade of generosity (GoG) is not the influencing factor where the highest productivity level is, while the number of packets per second required to redirect also has an impact on node behaviour.

 
Open Access
An Adaptive Steganography Insertion Technique Based on Cosine Transform
Taif Alobaidi, and Wasfy Mikhael
Pages: 45-58

Version of record online: 28 April 2024      Full Text (PDF)

DOI:10.37917/ijeee.20.2.4

In the last couple decades, several successful steganography approaches have been proposed. Least Significant Bit (LSB) Insertion technique has been deployed due to its simplicity in implementation and reasonable payload capacity. The most important design parameter in LSB techniques is the embedding location selection criterion. In this work, LSB insertion technique is proposed which is based on selecting the embedding locations depending on the weights of coefficients in Cosine domain (2D DCT). The cover image is transformed to the Cosine domain (by 2D DCT) and predefined number of coefficients are selected to embed the secret message (which is in the binary form). Those weights are the outputs of an adaptive algorithm that analyses the cover image in two domains (Haar and Cosine). Coefficients, in the Cosine transform domain, with small weights are selected. The proposed approach is tested with samples from the BOSSbase, and a custom-built databases. Two metrics are utilized to show the effectiveness of the technique, namely, Root Mean Squared Error (RMSE), and Peak Signal-to-Noise Ratio (PSNR). In addition, human visual inspection of the result image is also considered. As shown in the results, the proposed approach performs better, in terms of (RMSE, and PSNR) than commonly employed truncation and energy based methods.

 
Open Access
Design and Implementation of PID Controller for the Cooling Tower’s pH Regulation Based on Particle Swarm Optimization PSO Algorithm
Basim Al-Najari, Assoc. Prof. Dr. Chong Kok Hen, Prof. Dr. Johnny Koh Siaw Paw, and Prof. Dr. Ali Fadhil Marhoon
Pages: 59-67

Version of record online: 30 April 2024      Full Text (PDF)

DOI:10.37917/ijeee.20.2.5

The PH regulation of cooling tower plant in southern fertilizers company (SCF) in Iraq is important for industry pipes protection and process continuity. According to the Mitsubishi standard, the PH of cooling water must be around (7.1 to 7.8). The deviation in PH parameter affects the pipes, such as corrosion and scale. Acidic water causes pipes to corrode, and alkaline water causes pipes to scale. The sulfuric acid solution is used for PH neutralization. The problem is that the sulfuric acid is pumped manually in the cooling tower plant every two or three hours for PH regulation. The manual operation of the sulfuric acid pump makes deviations in the PH parameter. It is very difficult to control the PH manually. To solve this problem, a PID controller for PH regulation was used. The reason for using the PID controller is that the PH response is irregular through the neutralization process. The methodology is to calculate the transfer function of the PH loop using the system identification toolbox of MATLAB, to design and implement a PID controller, to optimize the PID controller response using particle swarm optimization PSO algorithm, and to make a comparison among several tuning methods such as Ziegler Nichols (ZN) tuning method, MATLAB tuner method, and PSO algorithm tuning method. The results showed that the PSO-based PID controller tuning gives a better overshoot, less rise time, and an endurable settling time than the other tuning methods. Hence, the PH response became according to the target range. The experimental results showed that the PH regulation improved using the PSO-based PID controller tuning.

 
Open Access
Design a Power System of 1760W Based on a Twin Inverter and a Fuzzy Logic Controller
Samhar Saeed Shukir
Pages: 68-76

Version of record online: 9 June 2024      Full Text (PDF)

DOI:10.37917/ijeee.20.2.6

The increasing demand for electricity due to population expansion has led to frequent interruptions in electrical power, so there are backup power lines everywhere, especially in the sectors of education, health, banking, transportation and communications. DC sources are beginning to become widely spread in terms of low maintenance requirements, no need for refueling, and no pollutant emission in these institutions. The problems of DC systems are; losses in DC system components, and change in output voltage as loads change. This research presents a power system that generates 1760W AC power from batteries bank, the system consists of a twin inverter to reduce losses in switches and filters, and thus improving the efficiency and the power factor of the system, and fuzzy logic controllers to regulate the output voltage of the converter and inverter. Modeling and simulation in MATLAB / Simulink showed obtaining a constant load voltage with acceptable values of total harmonics distortion (THD) under different conditions of loads and batteries.

 
Open Access
Handwritten Signature Verification Method Using Convolutional Neural Network
Wijdan Yassen A. AlKarem, Eman Thabet Khalid, and Khawla. H. Ali
Pages: 77-84

Version of record online: 9 June 2024      Full Text (PDF)

DOI:10.37917/ijeee.20.2.7

Automatic signature verification methods play a significant role in providing a secure and authenticated handwritten signature in many applications, to prevent forgery problems, specifically institutions of finance, and transections of legal papers, etc. There are two types of handwritten signature verification methods: online verification (dynamic) and offline verification (static) methods. Besides, signature verification approaches can be categorized into two styles: writer dependent (WD), and writer independent (WI) styles. Offline signature verification methods demands a high representation features for the signature image. However, lots of studies have been proposed for WI offline signature verification. Yet, there is necessity to improve the overall accuracy measurements. Therefore, a proved solution in this paper is depended on deep learning via convolutional neural network (CNN) for signature verification and optimize the overall accuracy measurements. The introduced model is trained on English signature dataset. For model evaluation, the deployed model is utilized to make predictions on new data of Arabic signature dataset to classify whether the signature is real or forged. The overall obtained accuracy is 95.36% based on validation dataset.

 
Open Access
Study of Chaotic-based Audio Encryption Algorithms: A Review
Alaa Shumran and Abdul-Basset A. Al-Hussein
Pages: 85-103

Version of record online: 11 June 2024      Full Text (PDF)

DOI:10.37917/ijeee.20.2.8

Nowadays, multimedia communication has become very widespread and this requires it to be protected from attackers and transmitted securely for reliability. Encryption and decryption techniques are useful in providing effective security for speech signals to ensure that these signals are transmitted with secure data and prevent third parties or the public from reading private messages. Due to the rapid improvement in digital communications over the recent period up to the present, the security of voice data transmitted over various networks has been classified as a favored field of study in earlier years. The contributions to audio encryption are discussed in this review. This Comprehensive review mainly focuses on presenting several kinds of methods for audio encryption and decryption the analysis of these methods with their advantages and disadvantages have been investigated thoroughly. It will be classified into encryption based on traditional methods and encryption based on advanced chaotic systems. They are divided into two types, continuous-time system, and discrete-time system, and also classified based on the synchronization method and the implementation method. In the fields of information and communications security, system designers face many challenges in both cost, performance, and architecture design, Field Programmable gate arrays (FPGAs) provide an excellent balance between computational power and processing flexibility. In addition, encryption methods will be classified based on Chaos-based Pseudo Random Bit Generator, Fractional-order systems, and hybrid chaotic generator systems, which is an advantageous point for this review compared with previous ones. Audio algorithms are presented, discussed, and compared, highlighting important advantages and disadvantages. Audio signals have a large volume and a strong correlation between data samples. Therefore, if traditional cryptography systems are used to encrypt such huge data, they gain significant overhead. Standard symmetric encryption systems also have a small key-space, which makes them vulnerable to attacks. On the other hand, encryption by asymmetric algorithms is not ideal due to low processing speed and complexity. Therefore, great importance has been given to using chaotic theory to encode audio files. Therefore, when proposing an appropriate encryption method to ensure a high degree of security, the key space, which is the critical part of every encryption system, and the key sensitivity must be taken into account. The key sensitivity is related to the initial values and control variables of the chaotic system chosen as the audio encryption algorithm. In addition, the proposed algorithm should eliminate the problems of periodic windows, such as limited chaotic range and non-uniform distribution, and the quality of the recovered audio signal remains good, which confirms the convenience, reliability, and high security.

 
Open Access
An Experimental Investigation on VSI-fed Induction Motor using Xilinx ZYNQ-7000 SoC Controller
Santosh Yadav Maddu, and Dr. Nitin Ramesh Bhasme
Pages: 104-114

Version of record online: 19 June 2024      Full Text (PDF)

DOI:10.37917/ijeee.20.2.9

In medium voltage and high-power drive applications, pulse width modulation (PWM) techniques are widely used to achieve effective speed control of AC motors. In real-time, an industrial drive system requires reduced hardware complexity and low computation time. The reliability of the AC drive can be improved with the FPGA (field programmable gate array) hardware equipped with digital controllers. To improve the performance of AC drives, a new FPGA-based Wavect real-time prototype controller (Xilinx ZYNQ-7000 SoC) is used to verify the effectiveness of the controller. These advanced controllers are capable of reducing computation time and enhancing the drive performance in real-time applications. The comparative performance analysis is carried out for the most commonly used voltage source inverter (VSI)-based PWM techniques such as sinusoidal pulse width modulation (SPWM) and space vector pulse width modulation (SVPWM) for three-phase, two-level inverters. The comparative study shows the SVPWM technique utilizes DC bus voltage more effectively and produces less harmonic distortion in terms of higher output voltage, flexible control of output frequency, and reduced harmonic distortion at output voltage for motor control applications. The simulation and hardware results are verified and validated by using MATLAB/Simulink software and FPGA-based Wavect real-time controller respectively.

 
Open Access
Epileptic detection based on deep learning: A review
Ola M. Assim and Ahlam F. Mahmood
Pages: 115-126

Version of record online: 19 June 2024      Full Text (PDF)

DOI:10.37917/ijeee.20.2.10

Epilepsy, a neurological disorder characterized by recurring seizures, necessitates early and precise detection for effective management. Deep learning techniques have emerged as powerful tools for analyzing complex medical data, specifically electroencephalogram (EEG) signals, advancing epileptic detection. This review comprehensively presents cutting-edge methodologies in deep learning-based epileptic detection systems. Beginning with an overview of epilepsy’s fundamental concepts and their implications for individuals and healthcare are present. This review then delves into deep learning principles and their application in processing EEG signals. Diverse research papers to know the architectures—convolutional neural networks, recurrent neural networks, and hybrid models—are investigated, emphasizing their strengths and limitations in detecting epilepsy. Preprocessing techniques for improving EEG data quality and reliability, such as noise reduction, artifact removal, and feature extraction, are discussed. Present performance evaluation metrics in epileptic detection, such as accuracy, sensitivity, specificity, and area under the curve, are provided. This review anticipates future directions by highlighting challenges such as dataset size and diversity, model interpretability, and integration with clinical decision support systems. Finally, this review demonstrates how deep learning can improve the precision, efficiency, and accessibility of early epileptic diagnosis. This advancement allows for more timely interventions and personalized treatment plans, potentially revolutionizing epilepsy management.

 
Open Access
A Dataset for Kinship Estimation from Image of Hand Using Machine Learning
Sarah Ibrahim Fathi and Mazin H. Aziz
Pages: 127-136

Version of record online: 19 June 2024      Full Text (PDF)

DOI:10.37917/ijeee.20.2.11

Kinship (Familial relationships) detection is crucial in many fields and has applications in biometric security, adoption, forensic investigations, and more. It is also essential during wars and natural disasters like earthquakes since it may aid in reunion, missing person searches, establishing emergency contacts, and providing psychological support. The most common method of determining kinship is DNA analysis which is highly accurate. Another approach, which is noninvasive, uses facial photos with computer vision and machine learning algorithms for kinship estimation. Each part of the Human -body has its own embedded information that can be extracted and adopted for identification, verification, or classification of that person. Kinship recognition is based on finding traits that are shared by every family. We investigate the use of hand geometry for kinship detection, which is a new approach. Because of the available hand image Datasets do not contain kinship ground truth; therefore, we created our own dataset. This paper describes the tools, methodology, and details of the collected MKH, which stands for the Mosul Kinship Hand, images dataset. The images of MKH dataset were collected using a mobile phone camera with a suitable setup and consisted of 648 images for 81 individuals from 14 families (8 hand situations per person). This paper also presents the use of this dataset in kinship prediction using machine learning. Google MdiaPipe was used for hand detection, segmentation, and geometrical key points finding. Handcraft feature extraction was used to extract 43 distinctive geometrical features from each image. A neural network classifier was designed and trained to predict kinship, yielding about 93% prediction accuracy. The results of this novel approach demonstrated that the hand possesses biometric characteristics that may be used to establish kinship, and that the suggested method is a promising way as a kinship indicator.

 
Open Access
Medical Communication Systems Utilizing Optical Nanoantenna and Microstrip Technology
Munaf Fathi Badr, Ibrahim A. Murdas, and Ahmed Aldhahab
Pages: 137-153

Version of record online: 26 June 2024      Full Text (PDF)

DOI:10.37917/ijeee.20.2.12

Many technical approaches were implemented in the antenna manufacturing process to maintain the desired miniaturization of the size of the antenna model which can be employed in various applied systems such as medical communication systems. Furthermore, over the past several years, nanotechnology science has rapidly grown in a wide variety of applications, which has given rise to novel ideas in the design of antennas based on nanoscale merits, leading to the use of antennae as an essential linkage between the human body and the different apparatus of the medical communication system. Some medical applications dealt with different antenna configurations, such as microstrip patch antenna or optical nanoantenna in conjugate with sensing elements, controlling units, and monitoring instruments to maintain a specified healthcare system. This study summarizes and presents a brief review of the recent applications of antennas in different medical communication systems involving highlights, and drawbacks with explores recommended issues related to using antennas in medical treatment.