Iraqi Journal for Electrical and Electronic Engineering
Login
Iraqi Journal for Electrical and Electronic Engineering
  • Home
  • Articles & Issues
    • Latest Issue
    • All Issues
  • Authors
    • Submit Manuscript
    • Guide for Authors
    • Authorship
    • Article Processing Charges (APC)
    • Proofreading Service
  • Reviewers
    • Guide for Reviewers
    • Become a Reviewer
  • About
    • About Journal
    • Aims and Scope
    • Editorial Team
    • Journal Insights
    • Peer Review Process
    • Publication Ethics
    • Plagiarism
    • Allegations of Misconduct
    • Appeals and Complaints
    • Corrections and Withdrawals
    • Open Access
    • Archiving Policy
    • Abstracting and indexing
    • Announcements
    • Contact

Search Results for Noor Kareem Jumaa

Article
Survey: Internet of Thing Using FPGA

Noor Kareem Jumaa

Pages: 38-45

PDF Full Text
Abstract

Everything in its way to be computerized and most of the objects are coming to be smart in present days. Modern Internet of Thing (IoT) allows these objects to be on the network by using IoT platforms. IoT is a smart information society that consists of smart devices; these devices can communicate with each other without human's intervention. IoT systems require flexible platforms. Through the use of Field Programmable Gate Array (FPGA), IoT devices can interface with the outside world easily with low power consumption, low latency, and best determinism. FPGAs provide System on Chip (SoC) technique due to FPGAs scalability which enables the designer to implement and integrate large number of hardware clocks at single chip. FPGA can be deemed as a special purpose reprogrammable processor since it can process signals at its input pins, manipulate them, and give off signals on the output pins. In this paper, using FPGA for IoT is the limelight.

Article
Digital Image Encryption using AES and Random Number Generator

Noor Kareem Jumaa

Pages: 80-89

PDF Full Text
Abstract

In nowadays world of rapid evolution of exchanging digital data, data protection is required to protect data from the unauthorized parities. With the widely use of digital images of diverse fields, it is important to conserve the confidentiality of image’s data form any without authorization access. In this paper the problem of secret key exchanging with the communicated parities had been solved by using a random number generator which based on Linear Feedback Shift Register (LFSR). The encryption/decryption is based on Advance Encryption Standard (AES) with the random key generator. Also, in this paper, both grayscale and colored RGB images have been encrypted/decrypted. The functionality of proposed system of this paper, is concerned with three features: First feature, is dealing with the obstetrics of truly random and secure encryption key while the second one deals with encrypting the plain or secret image using AES algorithm and the third concern is the extraction the original image by decrypting the encrypted or cipher one. “Mean Square Error (MSE)”, “Peak Signal to Noise Ratio (PSNR)”, “Normalized Correlation (NK)”, and “Normalized Absolute Error (NAE)” are measured for both (original-encrypted) images and (original-decrypted) image in order to study and analyze the performance of the proposed system according to image quality features.

Article
IoT Based Gas Leakage Detection and Alarming System using Blynk platforms

Noor Kareem Jumaa, Younus Mohammed Abdulkhaleq, Muntadher Asaad Nadhim, Tariq Aziz Abbas

Pages: 64-70

PDF Full Text
Abstract

Gas or liquefied petroleum gas (LPG) is a chemical substance resultant from petroleum and could be dangerous in industrial places or those that deal with this substance. Gas leakage causes many health issues. So, to prevent such catastrophes and in order to maintain a clean air environment, the workspace atmosphere should be frequently monitored and controlled. The proposed monitoring gas leakage detector system is based on Internet of Things (IoT) technology. NodeMCU ESP8266 Wi-Fi is used to be the microcontroller for the whole system. The combustible gas sensor (MQ2) is used in order to detect the presence of methane (CH4) and carbon monoxide gas (CO). MQ2 sensor will detect the concentration of the gas according to the voltage output of the sensor and the ESP8266 will send the data reading from the gas sensor to Blynk IoT platform over an IOS phone; data visualization is done using Thingspeak IoT Platform. Besides, a fan will immediately work upon the leakage occurs along with an alarming buzzer.

Article
Real Time Sticky Bomb Detection System Based on Compass Device and Arduino Board

Sameer Hameed Majeed, Noor Kareem Jumaa, Auday A.H. Mohamad

Pages: 46-52

PDF Full Text
Abstract

This paper presents a new strategy of sticky bomb detection. The detection strategy is based on measuring the magnetic field around the targeted car using compass device. A compass measure the earth gravitation of the car as (x,y,z) coordination , a threshold value of magnetic fields around the targeted car are recorded. If a difference is detected with any (x,y,z) coordination, an alert SMS message is sent to the car's owner. The detection system presented in this paper has been implemented based on Arduino board. The alarm signal is a Short Message Service (SMS) through Global System for Mobile Communication (GSM) module. The proposed method can gives the people of unstable countries a chance to discover whether their cars have been trapped with an IED bomb or their car still safe.

Article
Taguchi Method Based Node Performance Analysis of Generous TIT- for-TAT Cooperation of AD-HOC Networks

Noor Kareem Jumaa, Auday A.H. Mohamad, Abbas Muhammed Allawy, Ali A. Mohammed

Pages: 33-44

PDF Full Text
Abstract

Ad-Hoc networks have an adaptive architecture, temporarily configured to provide communication between wireless devices that provide network nodes. Forwarding packets from the source node to the remote destination node may require intermediate cooperative nodes (relay nodes), which may act selfishly because they are power-constrained. The nodes should exhibit cooperation even when faced with occasional selfish or non-cooperative behaviour from other nodes. Several factors affect the behaviour of nodes; those factors are the number of packets required to redirect, power consumption per node, and power constraints per node. Power constraints per node and grade of generosity. This article is based on a dynamic collaboration strategy, specifically the Generous Tit-for-Tat (GTFT), and it aims to represent an Ad-Hoc network operating with the Generous Tit-for-Tat (GTFT) cooperation strategy, measure statistics for the data, and then analyze these statistics using the Taguchi method. The transfer speed and relay node performance both have an impact on the factors that shape the network conditions and are subject to analysis using the Taguchi Method (TM). The analyzed parameters are node throughput, the amount of relay requested packets produced by a node per number of relays requested packets taken by a node, and the amount of accepted relay requested by a node per amount of relay requested by a node. A Taguchi L9 orthogonal array was used to analyze node behaviour, and the results show that the effect parameters were number of packets, power consumption, power constraint of the node, and grade of generosity. The tested parameters influence node cooperation in the following sequence: number of packets required to redirect (N) (effects on behaviour with a percent of 6.8491), power consumption per node (C) (effects on behaviour with a percent of 0.7467), power constraints per node (P) (effects on behaviour with a percent of 0.6831), and grade of generosity (ε) (effects on behaviour with a percent of 0.4530). Taguchi experiments proved that the grade of generosity (GoG) is not the influencing factor where the highest productivity level is, while the number of packets per second required to redirect also has an impact on node behaviour.

1 - 5 of 5 items

Search Parameters

Journal Logo
Iraqi Journal for Electrical and Electronic Engineering

College of Engineering, University of Basrah

  • Copyright Policy
  • Terms & Conditions
  • Privacy Policy
  • Accessibility
  • Cookie Settings
Licensing & Open Access

CC BY 4.0 Logo Licensed under CC-BY-4.0

This journal provides immediate open access to its content.

Editorial Manager Logo Elsevier Logo

Peer-review powered by Elsevier’s Editorial Manager®

Copyright © 2025 College of Engineering, University of Basrah. All rights reserved, including those for text and data mining, AI training, and similar technologies.