Iraqi Journal for Electrical and Electronic Engineering
Login
Iraqi Journal for Electrical and Electronic Engineering
  • Home
  • Articles & Issues
    • Latest Issue
    • All Issues
  • Authors
    • Submit Manuscript
    • Guide for Authors
    • Authorship
    • Article Processing Charges (APC)
    • Proofreading Service
  • Reviewers
    • Guide for Reviewers
    • Become a Reviewer
  • Policies
    • Publication Ethics
    • Plagiarism
    • Allegations of Misconduct
    • Appeals and Complaints
    • Corrections and Withdrawals
    • Copyright Policy
    • Open Access
    • Archiving Policy
  • About
    • About Journal
    • Aims and Scope
    • Editorial Team
    • Journal Insights
    • Peer Review Process
    • Abstracting and indexing
    • Announcements
    • Contact

Search Results for Mohammed H. Ahmed

Article
Encrypted Vehicular Communication Using Wireless Controller Area Network

Mohammed Al-Qaraghuli, Saadaldeen Rashid Ahmed Ahmed, Muhammad Ilyas

Pages: 17-24

PDF Full Text
Abstract

In this paper, we focus on ensuring encrypted vehicular communication using wireless controller area network performance at high node densities, by means of Dedicated Short-Range Communication (DSRC) algorithms. We analyses the effect of the vehicular communication parameters, message-rate, data-rate, transmission power and carrier sensing threshold, on the application performance. After a state-of-the-art analysis, we propose a data-rate DSRC algorithm. Simulation studies show that DSRC performs better than other decentralized vehicular communication algorithms for a wide range of application requirements and densities. Vehicular communication plays one of the most important roles for future autonomous vehicle. We have systematically investigated the impact of vehicular communication using the MATLAB application platform and achieved an accuracy of 93.74% after encrypting all the communications between the vehicles and securing them by applying the encryption on V2V communication in comparison with the existing system of Sensor Networks which stands at 92.97%. The transmission time for the encryption is 165 seconds while the rate of encryption is as low as 120 Mbps for the proposed awareness range of vehicles to vehicle using DSRC algorithm in Wireless-Controller Area Network for communication. Experimental results show that our proposed method performs 3% better than the recently developed algorithms.

Article
Analysis of Permanent Magnet Material Influence on Eddy Current Braking Efficiency

Ahmed M. Salman, Jamal A.-K. Mohammed, Farag M. Mohammed

Pages: 220-225

PDF Full Text
Abstract

Traditional friction brakes can generate problems such as high braking temperature and pressure, cracking, and wear, leading to braking failure and user damage. Eddy current brake systems (contactless magnetic brakes) are one method used in motion applications. They are wear-free, less temperature-sensitive, quick, easy, and less susceptible to wheel lock, resulting in less brake failure due to the absence of physical contact between the magnet and disc. Important factors that can affect the performance of the braking system are the type of materials manufactured for the permanent magnets. This paper examines the performance of the permanent magnetic eddy current braking (PMECB) system. Different kinds of permanent magnets are proposed in this system to create eddy currents, which provide braking for the braking system is simulated using FEA software to demonstrate the efficiency of braking in terms of force production, energy dissipation, and overall performance findings demonstrated that permanent magnets consisting of neodymium, iron, and boron consistently provided the maximum braking effectiveness. The lowest efficiency is found in ferrite, which has the second-lowest efficiency behind samarium cobalt. This is because ferrite has a weaker magnetic field. Because of this, the PMECBS based on NdFeB magnets has higher power dissipation values, particularly at higher speeds.

Article
Second-Order Statistical Methods GLCM for Authentication Systems

Mohammed A. Taha, Hanaa M. Ahmed

Pages: 88-93

PDF Full Text
Abstract

For many uses, biometric systems have gained considerable attention. Iris identification was One of the most powerful sophisticated biometrical techniques for effective and confident authentication. The current iris identification system offers accurate and reliable results based on near-infrared light (NIR) images when images are taken in a restricted area with fixed- distance user cooperation. However, for the color eye images obtained under visible wavelength (VW) without collaboration among the users, the efficiency of iris recognition degrades because of noise such as eye blurring images, eye lashing, occlusion, and reflection. This work aims to use the Gray-Level Co-occurrence Matrix (GLCM) to retrieve the iris's characteristics in both NIR iris images and visible spectrum. GLCM is second-order Statistical-Based Methods for Texture Analysis. The GLCM- based extraction technology was applied after the preprocessing method to extract the pure iris region's characteristics. The Energy, Entropy, Correlation, Homogeneity, and Contrast collection of second-order statistical features are determined from the generated co-occurrence matrix, Stored as a vector for numerical features. This approach is used and evaluated on the CASIA v1and ITTD v1 databases as NIR iris image and UBIRIS v1 as a color image. The results showed a high accuracy rate (99.2 %) on CASIA v1, (99.4) on ITTD v1, and (87%) on UBIRIS v1 evaluated by comparing to the other methods.

Article
Improving the Dynamic Response of Half-Car Model using Modified PID Controller

Mustafa Mohammed Matrood, Ameen Ahmed Nassar

Pages: 54-61

PDF Full Text
Abstract

This paper focuses on the vibration suppression of a half-car model by using a modified PID controller. Mostly, car vibrations could result from some road disturbances, such as bumps or potholes transmitted to a car body. The proposed controller consists of three main components as in the case of the conventional PID controller which are (Proportional, Integral, and Derivative) but the difference is in the positions of these components in the control loop system. Initially, a linear half-car suspension system is modeled in two forms passive and active, the activation process occurred using a controlled hydraulic actuator. Thereafter, the two systems have been simulated using MATLAB/Simulink software in order to demonstrate the dynamic response. A comparison between conventional and modified PID controllers has been carried out. The resulting dynamic response of the half-car model obtained from the simulation process was improved when using a modified PID controller compared with the conventional PID controller. Moreover, the efficiency and performance of the half-car model suspension have been significantly enhanced by using the proposed controller. Thus, achieving high vehicle stability and ride comfort.

Article
Digital Marketing Data Classification by Using Machine Learning Algorithms

Noor Saud Abd, Oqbah Salim Atiyah, Mohammed Taher Ahmed, Ali Bakhit

Pages: 245-256

PDF Full Text
Abstract

Early in the 20th century, as a result of technological advancements, the importance of digital marketing significantly increased as the necessity for digital customer experience, promotion, and distribution emerged. Since the year 1988, in the case when the term ”Digital Marketing” first appeared, the business sector has undergone drastic growth, moving from small startups to massive corporations on a global scale. The marketer must navigate a chaotic environment caused by the vast volume of generated data. Decision-makers must contend with the fact that user data is dynamic and changes every day. Smart applications must be used within enterprises to better evaluate, classify, enhance, and target audiences. Customers who are tech-savvy are pushing businesses to make bigger financial investments and use cutting-edge technologies. It was only natural that marketing and trade could be one of the areas to move to such development, which helps to move to the speed of spread, advertisements, along with other things to facilitate things for reaching and winning customers. In this study, we utilized machine learning (ML) algorithms (Decision tree (DT), K-Nearest Neighbor (KNN), CatBoost, and Random Forest (RF) (for classifying data in customers to move to development. Improve the ability to forecast customer behavior so one can gain more business from them more quickly and easily. With the use of the aforementioned dataset, the suggested system was put to the test. The results show that the system can accurately predict if a customer will buy something or not; the random forest (RF) had an accuracy of 0.97, DT had an accuracy of 0. 95, KNN had an accuracy of 0. 91, while the CatBoost algorithm had the execution time 15.04 of seconds, and gave the best result of highest f1 score and accuracy (0.91, 0. 98) respectively. Finally, the study’s future goals involve being created a web page, thereby helping many banking institutions with speed and forecast accuracy. Using more techniques of feature selection in conjunction with the marketing dataset to improve diagnosis.

Article
Detection of Lumbar Spine Stenosis in MRI Spinal Imaging

Mohammed A. Abed, Z. T.Al-Qaysi, Aws Q.Hamdi, Salwa K.Abdulateef, M. A.Ahmed, Mahmood M. Salih

Pages: 86-95

PDF Full Text
Abstract

Lumbar spine stenosis (LSS) is a common reason for low back pain, which refers to anatomical spinal canal stenosis. It often causes pressure on the nerve elements due to the surrounding soft tissue and bone. Due to the huge number of spinal injuries, manual diagnosis of lumbar spine stenosis by radiologists is tedious or time-consuming. Therefore, Deep learning techniques have become a more helpful tool to overcome this problem. For this purpose, this study employed the YOLO-v5 to develop an LSS detection model on a dataset of lumbar spine MRI scans from 153 patients with symptomatic low back pain. The dataset was filtered to include 84 mid-sagittal images using annotation techniques. The detection model is utilized to classify the intervertebral disc (IVD) condition as either bulging or normal. The results obtained showed that the model achieved an accuracy exceeding 88% in detecting and classifying the lumbar spine vertebra. The developed models showed that they are effective for lumbar intervertebral disc classification.

Article
A Robust Hybrid Multi-Scale Approach to Detect Copy-Move Forgery in Digital Image

Manaf Mohammed Ali Alhaidery, Israa Abdulkadhim Jabbar Al Ali, Noura Jumaah Ahmed Alqaysi

Pages: 281-288

PDF Full Text
Abstract

With the development of cyber security and multimedia forensics, digital image manipulation has recently been recognized as one of the major challenges in forensic image analysis. Therefore, selecting an image area and then copying and pasting it into the same image is the hardest process in passive image forgery. This act violates privacy and secrecy of authenticity of digital image. The attacker exploits the available tools of editing image program to make the fake image similar to the original one. This paper presents a proposed fast and efficient passive Copy-move forgery detection scheme. Hessian- Affine and Harris-Affine detectors, and Shift Invariant Feature Transform (SIFT) descriptor, are employed in the proposed scheme. These detectors provide sufficient key points for detecting the duplicated regions in the case of small or invisible regions. The experimental results show that the proposed scheme is invariant against simple and hard attacks like uniform or non-uniform transformation. The proposed scheme was evaluated using standard data sets (GRIP, MICC 220, and F8 Multi). Resulted True Positive Rate (TPR) was 0.98 and False Positive Rate (FPR) was 0.035. Thus, the scheme is effective and providing valuable results compared to recent passive image authentication schemes.

Article
Modeling and Control of Torsional Vibration in Rotating System Using Dual Loop Controllers

Mustafa Mohammed Matrood, Ameen Ahmed Nassar

Pages: 11-15

PDF Full Text
Abstract

A torsional rotating system is considered for the investigation of passive vibration control using dual loop controllers Proportional-Integral-Derivative (PID) with derivative (D) gain and Proportional – Derivative (PD) with Integral (I) controllers. The controllers are used as low pass filters. Simulation of the models using Matlab-Simulink have been built in this work for torsional vibration control. A comparison between the two controllers with uncontrolled system have been carried out. Results show that the PD – I control is the best method which gives better stability response than the PID – D control.

Article
Adaptive Multi Objective Chicken Swarm Optimization for Solving Nonlinear Stream Cryptosystem

Mohammed H. Ahmed, Asaad N. Hashim, Khalid A. Hussein

Pages: 254-267

PDF Full Text
Abstract

Nonlinear stream ciphers have become a viable alternative to traditional cryptosystems in response to the growing need for secure communication. These ciphers generate a keystream via feedback mechanisms and nonlinear functions, which are then utilized for encryption. Geffe generator system is one of the most keystream generators. Also, these systems have many benefits, like being fast, flexible, and able to create unpredictable and non-repeating keystreams, these systems are susceptible to cryptanalysis attacks, which have the potential to compromise their security. This paper presents the first study of applying chicken swarm optimization (CSO) algorithm in the field of cryptanalysis based on cipher only attack. The standard CSO algorithm and an adaptive multi points CSO (AMPCSO) algorithm are proposed to cryptanalysis nonlinear stream cipher based on Geffe keystream generator. Firstly, the traditional CSO is used to reveal the secret initial values of the Geffe generator. Secondly, an adaptive multi points chicken swarm optimization (AMPCSO) has been proposed to enhance the traditional CSO algorithm to attack Geffe generator systems. The AMPCSO is a new idea to advance the CSO search abilities and improve the foraging behavior of hens and chicks by allowing hens to be influenced by other individuals within the same or different groups and affected by the best individual in the population and enable chicks to learn from four reference points rather than learn from their respective mothers only. Lastly, a new criterion is used to estimate the value of fitness by utilizing a multi-objective fitness function (MOFF), which is grounded on Pareto dominance. The experimental results showed that the CSO and AMPCSO are very effective tools in terms of accuracy, information required, and CPU times when applied to the analysis of nonlinear stream cipher. The AMPCSO required a few characters from ciphertext to attack systems with total LFSRs length up to 59 bits with an appropriate CPU time.

Article
A Hybrid Lung Cancer Model for Diagnosis and Stage Classification from Computed Tomography Images

Abdalbasit Mohammed Qadir, Peshraw Ahmed Abdalla, Dana Faiq Abd

Pages: 266-274

PDF Full Text
Abstract

Detecting pulmonary cancers at early stages is difficult but crucial for patient survival. Therefore, it is essential to develop an intelligent, autonomous, and accurate lung cancer detection system that shows great reliability compared to previous systems and research. In this study, we have developed an innovative lung cancer detection system known as the Hybrid Lung Cancer Stage Classifier and Diagnosis Model (Hybrid-LCSCDM). This system simplifies the complex task of diagnosing lung cancer by categorizing patients into three classes: normal, benign, and malignant, by analyzing computed tomography (CT) scans using a two-part approach: First, feature extraction is conducted using a pre-trained model called VGG-16 for detecting key features in lung CT scans indicative of cancer. Second, these features are then classified using a machine learning technique called XGBoost, which sorts the scans into three categories. A dataset, IQ-OTH/NCCD - Lung Cancer, is used to train and evaluate the proposed model to show its effectiveness. The dataset consists of the three aforementioned classes containing 1190 images. Our suggested strategy achieved an overall accuracy of 98.54%, while the classification precision among the three classes was 98.63%. Considering the accuracy, recall, and precision as well as the F1-score evaluation metrics, the results indicated that when using solely computed tomography scans, the proposed (Hybrid-LCSCDM) model outperforms all previously published models.

Article
Nonlinear Physiological Model of Insulin-Glucose Regulation System in Type 1 Diabetes Mellitus

Ahmed Mohammed Ali, Fadhil Rahma Tahir

Pages: 78-88

PDF Full Text
Abstract

Mathematical modeling is very effective method to investigate interaction between insulin and glucose. In this paper, a new mathematical model for insulin-glucose regulation system is introduced based on well-known Lokta-Volterra model. Chaos is a common property in complex biological systems in the previous studies. The results here are in accordance with previous ones and indicating that insulin-glucose regulating system has many dynamics in different situations. The overall result of this paper may be helpful for better understanding of diabetes mellitus regulation system including diseases such as hyperinsulinemia and Type1 DM.

1 - 11 of 11 items

Search Parameters

×

The submission system is temporarily under maintenance. Please send your manuscripts to

Go to Editorial Manager
Journal Logo
Iraqi Journal for Electrical and Electronic Engineering

College of Engineering, University of Basrah

  • Copyright Policy
  • Terms & Conditions
  • Privacy Policy
  • Accessibility
  • Cookie Settings
Licensing & Open Access

CC BY 4.0 Logo Licensed under CC-BY-4.0

This journal provides immediate open access to its content.

Editorial Manager Logo Elsevier Logo

Peer-review powered by Elsevier’s Editorial Manager®

Copyright © 2026 College of Engineering, University of Basrah, its licensors, and contributors. All rights reserved, including those for text and data mining, AI training, and similar technologies. For all open access content, the relevant licensing terms apply.