Iraqi Journal for Electrical and Electronic Engineering
Login
Iraqi Journal for Electrical and Electronic Engineering
  • Home
  • Articles & Issues
    • Latest Issue
    • All Issues
  • Authors
    • Submit Manuscript
    • Guide for Authors
    • Authorship
    • Article Processing Charges (APC)
    • Proofreading Service
  • Reviewers
    • Guide for Reviewers
    • Become a Reviewer
  • About
    • About Journal
    • Aims and Scope
    • Editorial Team
    • Journal Insights
    • Peer Review Process
    • Publication Ethics
    • Plagiarism
    • Allegations of Misconduct
    • Appeals and Complaints
    • Corrections and Withdrawals
    • Open Access
    • Archiving Policy
    • Abstracting and indexing
    • Announcements
    • Contact

Search Results for algorithm

Article
Enhancing Packet Reliability in Wireless Multimedia Sensor Networks using a Proposed Distributed Dynamic Cooperative Protocol (DDCP) Routing Algorithm

Hanadi Al-Jabry, Hamid Ali Abed Al-Asadi

Pages: 158-168

PDF Full Text
Abstract

Wireless Multimedia Sensor Networks (WMSNs) are being extensively utilized in critical applications such as envi- ronmental monitoring, surveillance, and healthcare, where the reliable transmission of packets is indispensable for seamless network operation. To address this requirement, this work presents a pioneering Distributed Dynamic Coop- eration Protocol (DDCP) routing algorithm. The DDCP algorithm aims to enhance packet reliability in WMSNs by prioritizing reliable packet delivery, improving packet delivery rates, minimizing end-to-end delay, and optimizing energy consumption. To evaluate its performance, the proposed algorithm is compared against traditional routing protocols like Ad hoc On-Demand Distance Vector (AODV) and Dynamic Source Routing (DSR), as well as proactive routing protocols such as Optimized Link State Routing (OLSR). By dynamically adjusting the transmission range and selecting optimal paths through cooperative interactions with neighboring nodes, the DDCP algorithm offers effective solutions. Extensive simulations and experiments conducted on a wireless multimedia sensor node testbed demonstrate the superior performance of the DDCP routing algorithm compared to AODV, DSR, and OLSR, in terms of packet delivery rate, end-to-end delay, and energy efficiency. The comprehensive evaluation of the DDCP algorithm against multiple routing protocols provides valuable insights into its effectiveness and efficiency in improving packet reliability within WMSNs. Furthermore, the scalability and applicability of the proposed DDCP algorithm for large-scale wireless multimedia sensor networks are confirmed. In summary, the DDCP algorithm exhibits significant potential to enhance the performance of WMSNs, making it a suitable choice for a wide range of applications that demand robust and reliable data transmission.

Article
Enhanced Bundle-based Particle Collision Algorithm for Adaptive Resource Optimization Allocation in OFDMA Systems

Haider M. AlSabbagh, Mohammed Khalid Ibrahim

Pages: 21-32

PDF Full Text
Abstract

The necessity for an efficient algorithm for resource allocation is highly urgent because of increased demand for utilizing the available spectrum of the wireless communication systems. This paper proposes an Enhanced Bundle-based Particle Collision Algorithm (EB-PCA) to get the optimal or near optimal values. It applied to the Orthogonal Frequency Division Multiple Access (OFDMA) to evaluate allocations for the power and subcarrier. The analyses take into consideration the power, subcarrier allocations constrain, channel and noise distributions, as well as the distance between user's equipment and the base station. Four main cases are simulated and analyzed under specific operation scenarios to meet the standard specifications of different advanced communication systems. The sum rate results are compared to that achieved with employing another exist algorithm, Bat Pack Algorithm (BPA). The achieved results show that the proposed EB-PAC for OFDMA system is an efficient algorithm in terms of estimating the optimal or near optimal values for both subcarrier and power allocation.

Article
Path Planning and Obstacles Avoidance in Dynamic Workspace Using Polygon Shape Tangents Algorithm

Duaa Ahmed Ramadhan, Auday Al-Mayyahi, Mofeed Turky Rashid

Pages: 136-145

PDF Full Text
Abstract

This paper presents the design of a path planning system in an environment that contains a set of static and dynamic polygon obstacles localized randomly. In this paper, an algorithm so-called (Polygon shape tangents algorithm) is proposed to move a mobile robot from a source point to a destination point with no collision with surrounding obstacles using the visibility binary tree algorithm. The methodology of this algorithm is based on predicting the steps of a robot trajectory from the source to the destination point. The polygon shapes tangent algorithm is compared with the virtual circles' tangents algorithm for different numbers of static and dynamic polygon obstacles for the time of arrival and the length of the path to the target. The obtained result shows that the used algorithm has better performance than the other algorithms and gets less time of arrival and shortest path with free collision.

Article
Novel Optimization Algorithm Inspired by Camel Traveling Behavior

Mohammed Khalid Ibrahim, Ramzy Salim Ali

Pages: 167-177

PDF Full Text
Abstract

This article presents a novel optimization algorithm inspired by camel traveling behavior that called Camel algorithm (CA). Camel is one of the extraordinary animals with many distinguish characters that allow it to withstand the severer desert environment. The Camel algorithm used to find the optimal solution for several different benchmark test functions. The results of CA and the results of GA and PSO algorithms are experimentally compared. The results indicate that the promising search ability of camel algorithm is useful, produce good results and outperform the others for different test functions.

Article
Efficient Path Planning in Medical Environments: Integrating Genetic Algorithm and Probabilistic Roadmap (GA-PRM) for Autonomous Robotics

Sarah Sabeeh, Israa S. Al-Furati

Pages: 243-258

PDF Full Text
Abstract

Path-planning is a crucial part of robotics, helping robots move through challenging places all by themselves. In this paper, we introduce an innovative approach to robot path-planning, a crucial aspect of robotics. This technique combines the power of Genetic Algorithm (GA) and Probabilistic Roadmap (PRM) to enhance efficiency and reliability. Our method takes into account challenges caused by moving obstacles, making it skilled at navigating complex environments. Through merging GA’s exploration abilities with PRM’s global planning strengths, our GA-PRM algorithm improves computational efficiency and finds optimal paths. To validate our approach, we conducted rigorous evaluations against well-known algorithms including A*, RRT, Genetic Algorithm, and PRM in simulated environments. The results were remarkable, with our GA-PRM algorithm outperforming existing methods, achieving an average path length of 25.6235 units and an average computational time of 0.6881 seconds, demonstrating its speed and effectiveness. Additionally, the paths generated were notably smoother, with an average value of 0.3133. These findings highlight the potential of the GA-PRM algorithm in real-world applications, especially in crucial sectors like healthcare, where efficient path-planning is essential. This research contributes significantly to the field of path-planning and offers valuable insights for the future design of autonomous robotic systems.

Article
A New Algorithm Based on Pitting Corrosion for Engineering Design Optimization Problems

Hussien A. Al-mtory, Falih M. Alnahwi, Ramzy S. Ali

Pages: 190-206

PDF Full Text
Abstract

This paper presents a new optimization algorithm called corrosion diffusion optimization algorithm (CDOA). The proposed algorithm is based on the diffusion behavior of the pitting corrosion on the metal surface. CDOA utilizes the oxidation and reduction electrochemical reductions as well as the mathematical model of Gibbs free energy in its searching for the optimal solution of a certain problem. Unlike other algorithms, CDOA has the advantage of dispensing any parameter that need to be set for improving the convergence toward the optimal solution. The superiority of the proposed algorithm over the others is highlighted by applying them on some unimodal and multimodal benchmark functions. The results show that CDOA has better performance than the other algorithms in solving the unimodal equations regardless the dimension of the variable. On the other hand, CDOA provides the best multimodal optimization solution for dimensions less than or equal to (5, 10, 15, up to 20) but it fails in solving this type of equations for variable dimensions larger than 20. Moreover, the algorithm is also applied on two engineering application problems, namely the PID controller and the cantilever beam to accentuate its high performance in solving the engineering problems. The proposed algorithm results in minimized values for the settling time, rise time, and overshoot for the PID controller. Where the rise time, settling time, and maximum overshoot are reduced in the second order system to 0.0099, 0.0175 and 0.005 sec., in the fourth order system to 0.0129, 0.0129 and 0 sec, in the fifth order system to 0.2339, 0.7756 and 0, in the fourth system which contains time delays to 1.5683, 2.7102 and 1.80 E-4 sec., and in the simple mass-damper system to 0.403, 0.628 and 0 sec., respectively. In addition, it provides the best fitness function for the cantilever beam problem compared with some other well-known algorithms.

Article
An Improved Technique Based on Firefly Algorithm to Estimate the Parameters of the Photovoltaic Model

Issa Ahmed Abed

Pages: 137-145

PDF Full Text
Abstract

This paper present a method to enhance the firefly algorithm by coupling with a local search. The constructed technique is applied to identify the solar parameters model where the method has been proved its ability to obtain the photovoltaic parameters model. Standard firefly algorithm (FA), electromagnetism-like (EM) algorithm, and electromagnetism-like without local (EMW) search algorithm all are compared with the suggested method to test its capability to solve this model.

Article
Two Dimensional Path Planning with Static Polygon Obstacles Avoidance

Duaa Ahmed Ramadhan, Abdulmuttalib T. Rashid, Osama T. Rashid

Pages: 65-72

PDF Full Text
Abstract

This paper presents the designing of path planning system in an environment contains a set of static polygon obstacles localized and distributed randomly by using differential drive mobile robot. In this paper the designed algorithm (two dimensional path planning algorithm) is proposed in order of investigate the path planning of mobile robot with free collision using the visibility binary tree algorithm. The suggested algorithm is compared with the virtual circles tangents algorithm in the time of arrival and the longest of the path to the target. The aim of this paper is to get an algorithm has better performance than the other algorithms and get less time of arrival and shortest path with free collision.

Article
Adaptive OFDMA Resource Allocation using Modified Multi-Dimension Genetic Algorithm

Mohammed Khalid Ibrahim, Haider M. AlSabbagh

Pages: 103-113

PDF Full Text
Abstract

A considerable work has been conducted to cope with orthogonal frequency division multiple access (OFDMA) resource allocation with using different algorithms and methods. However, most of the available studies deal with optimizing the system for one or two parameters with simple practical condition/constraints. This paper presents analyses and simulation of dynamic OFDMA resource allocation implementation with Modified Multi-Dimension Genetic Algorithm (MDGA) which is an extension for the standard algorithm. MDGA models the resource allocation problem to find the optimal or near optimal solution for both subcarrier and power allocation for OFDMA. It takes into account the power and subcarrier constrains, channel and noise distributions, distance between user's equipment (UE) and base stations (BS), user priority weight – to approximate the most effective parameters that encounter in OFDMA systems. In the same time multi dimension genetic algorithm is used to allow exploring the solution space of resource allocation problem effectively with its different evolutionary operators: multi dimension crossover, multi dimension mutation. Four important cases are addressed and analyzed for resource allocation of OFDMA system under specific operation scenarios to meet the standard specifications for different advanced communication systems. The obtained results demonstrate that MDGA is an effective algorithm in finding the optimal or near optimal solution for both of subcarrier and power allocation of OFDMA resource allocation.

Article
Two Algorithms For Static Polygon Shape Formation Control

Bayadir A. Issa, Abdulmuttalib T. Rashid

Pages: 53-58

PDF Full Text
Abstract

This paper provides a two algorithms for designing robust formation control of multiple robots called Leader- Neighbor algorithm and Neighbor-Leader algorithm in unknown environment. The main function of the robot group is to use the RP lidar sensor attached to each robot to form a static geometric polygon. The algorithms consist of two phases implemented to investigate the formation of polygon shape. In the leading- neighbor algorithm, the first stage is the leader alignment and the adjacent alignment is the second stage. The first step uses the information gathered by the main RP Lidar sensor to determine and compute the direction of each adjacent robot. The adjacent RP Lidar sensors are used to align the adjacent robots of the leader by transferring these adjacent robots to the leader. By performing this stage, the neighboring robots will be far from the leader. The second stage uses the information gathered by adjacent RP sensors to reposition the robots so that the distance between them is equal. On the other hand, in the neighbor-leader algorithm, the adjacent robots are rearranged in a regular distribution by moving in a circular path around the leader, with equal angles between each of the two neighbor robots. A new distribution will be generated in this paper by using one leader and four adjacent robots to approve the suggested leader neighbor algorithm and neighbor-leader algorithm .

Article
Mobile Robot Navigation with Obstacles Avoidance by Witch of Agnesi Algorithm with Minimum Power

Bayadir A. Issa, Hayder D. Almukhtar, Qabeela Q. Thabit, Mofeed T. Rashid

Pages: 199-209

PDF Full Text
Abstract

Obstacle avoidance in mobile robot path planning represents an exciting field of robotics systems. There are numerous algorithms available, each with its own set of features. In this paper a Witch of Agnesi curve algorithm is proposed to prevent a collision by the mobile robot’s orientation beyond the obstacles which represents an important problem in path planning, further, to achieve a minimum arrival time by following the shortest path which leads to minimizing power loss. The proposed approach considers the mobile robot’s platform equipped with the LIDAR 360o sensor to detect obstacle positions in any environment of the mobile robot. Obstacles detected in the sensing range of the mobile robot are dealt with by using the Witch of Agnesi curve algorithm, this establishes the obstacle’s apparent vertices’ virtual minimum bounding circle with minimum error. Several Scenarios are implemented and considered based on the identification of obstacles in the mobile robot environment. The proposed system has been simulated by the V-REP platform by designing several scenarios that emulate the behavior of the robot during the path planning model. The simulation and experimental results show the optimal performance of the mobile robot during navigation is obtained as compared to the other methods with minimum power loss and also with minimum error. It’s given 96.3 percent in terms of the average of the total path while the Bezier algorithm gave 94.67 percent. While in experimental results the proposed algorithm gave 93.45 and the Bezier algorithm gave 92.19 percent.

Article
Reactive Power Optimization with Chaotic Firefly Algorithm and Particle Swarm Optimization in A Distribution Subsystem Network

Hamza Yapıcı Eregli Vocational School, Nurettin Çetinkaya

Pages: 71-78

PDF Full Text
Abstract

In this paper the minimization of power losses in a real distribution network have been described by solving reactive power optimization problem. The optimization has been performed and tested on Konya Eregli Distribution Network in Turkey, a section of Turkish electric distribution network managed by MEDAŞ (Meram Electricity Distribution Corporation). The network contains about 9 feeders, 1323 buses (including 0.4 kV, 15.8 kV and 31.5 kV buses) and 1311 transformers. This paper prefers a new Chaotic Firefly Algorithm (CFA) and Particle Swarm Optimization (PSO) for the power loss minimization in a real distribution network. The reactive power optimization problem is concluded with minimum active power losses by the optimal value of reactive power. The formulation contains detailed constraints including voltage limits and capacitor boundary. The simulation has been carried out with real data and results have been compared with Simulated Annealing (SA), standard Genetic Algorithm (SGA) and standard Firefly Algorithm (FA). The proposed method has been found the better results than the other algorithms.

Article
Design Tunable Robust Controllers for Unmanned Aerial Vehicle Based on Particle Swarm Optimization Algorithm

Baqir Nasser Abdul- Samed 1, Ammar A. Aldair

Pages: 89-100

PDF Full Text
Abstract

PID controller is the most popular controller in many applications because of many advantages such as its high efficiency, low cost, and simple structure. But the main challenge is how the user can find the optimal values for its parameters. There are many intelligent methods are proposed to find the optimal values for the PID parameters, like neural networks, genetic algorithm, Ant colony and so on. In this work, the PID controllers are used in three different layers for generating suitable control signals for controlling the position of the UAV (x,y and z), the orientation of UAV (θ, Ø and ψ) and for the motors of the quadrotor to make it more stable and efficient for doing its mission. The particle swarm optimization (PSO) algorithm is proposed in this work. The PSO algorithm is applied to tune the parameters of proposed PID controllers for the three layers to optimize the performances of the controlled system with and without existences of disturbance to show how the designed controller will be robust. The proposed controllers are used to control UAV, and the MATLAB 2018b is used to simulate the controlled system. The simulation results show that, the proposed controllers structure for the quadrotor improve the performance of the UAV and enhance its stability.

Article
Analysis of Scalability and Sensitivity for Chaotic Sine Cosine Algorithms

Dunia S. Tahir, Ramzy S. Ali

Pages: 139-154

PDF Full Text
Abstract

Chaotic Sine-Cosine Algorithms (CSCAs) are new metaheuristic optimization algorithms. However, Chaotic Sine-Cosine Algorithm (CSCAs) are able to manipulate the problems in the standard Sine-Cosine Algorithm (SCA) like, slow convergence rate and falling into local solutions. This manipulation is done by changing the random parameters in the standard Sine-Cosine Algorithm (SCA) with the chaotic sequences. To verify the ability of the Chaotic Sine-Cosine Algorithms (CSCAs) for solving problems with large scale problems. The behaviors of the Chaotic Sine-Cosine Algorithms (CSCAs) were studied under different dimensions 10, 30, 100, and 200. The results show the high quality solutions and the superiority of all Chaotic Sine-Cosine Algorithms (CSCAs) on the standard SCA algorithm for all selecting dimensions. Additionally, different initial values of the chaotic maps are used to study the sensitivity of Chaotic Sine-Cosine Algorithms (CSCAs). The sensitivity test reveals that the initial value 0.7 is the best option for all Chaotic Sine-Cosine Algorithms (CSCAs).

Article
A Novel Quantum-Behaved Future Search Algorithm for the Detection and Location of Faults in Underground Power Cables Using ANN

Hamzah Abdulkhaleq Naji, Rashid Ali Fayadh, Ammar Hussein Mutlag

Pages: 226-244

PDF Full Text
Abstract

This article introduces a novel Quantum-inspired Future Search Algorithm (QFSA), an innovative amalgamation of the classical Future Search Algorithm (FSA) and principles of quantum mechanics. The QFSA was formulated to enhance both exploration and exploitation capabilities, aiming to pinpoint the optimal solution more effectively. A rigorous evaluation was conducted using seven distinct benchmark functions, and the results were juxtaposed with five renowned algorithms from existing literature. Quantitatively, the QFSA outperformed its counterparts in a majority of the tested scenarios, indicating its superior efficiency and reliability. In the subsequent phase, the utility of QFSA was explored in the realm of fault detection in underground power cables. An Artificial Neural Network (ANN) was devised to identify and categorize faults in these cables. By integrating QFSA with ANN, a hybrid model, QFSA-ANN, was developed to optimize the network’s structure. The dataset, curated from MATLAB simulations, comprised diverse fault types at varying distances. The ANN structure had two primary units: one for fault location and another for detection. These units were fed with nine input parameters, including phase- currents and voltages, current and voltage values from zero sequences, and voltage angles from negative sequences. The optimal architecture of the ANN was determined by varying the number of neurons in the first and second hidden layers and fine-tuning the learning rate. To assert the efficacy of the QFSA-ANN model, it was tested under multiple fault conditions. A comparative analysis with established methods in the literature further accentuated its robustness in terms of fault detection and location accuracy. this research not only augments the field of search algorithms with QFSA but also showcases its practical application in enhancing fault detection in power distribution systems. Quantitative metrics, detailed in the main article, solidify the claim of QFSA-ANN’s superiority over conventional methods.

Article
A Light Weight Multi-Objective Task Offloading Optimization for Vehicular Fog Computing

Sura Khairy Abdullah, Adnan Jumaa Jabir

Pages: 66-75

PDF Full Text
Abstract

Most Internet of Vehicles (IoV) applications are delay-sensitive and require resources for data storage and tasks processing, which is very difficult to afford by vehicles. Such tasks are often offloaded to more powerful entities, like cloud and fog servers. Fog computing is decentralized infrastructure located between data source and cloud, supplies several benefits that make it a non-frivolous extension of the cloud. The high volume data which is generated by vehicles’ sensors and also the limited computation capabilities of vehicles have imposed several challenges on VANETs systems. Therefore, VANETs is integrated with fog computing to form a paradigm namely Vehicular Fog Computing (VFC) which provide low-latency services to mobile vehicles. Several studies have tackled the task offloading problem in the VFC field. However, recent studies have not carefully addressed the transmission path to the destination node and did not consider the energy consumption of vehicles. This paper aims to optimize the task offloading process in the VFC system in terms of latency and energy objectives under deadline constraint by adopting a Multi-Objective Evolutionary Algorithm (MOEA). Road Side Units (RSUs) x-Vehicles Mutli- Objective Computation offloading method (RxV-MOC) is proposed, where an elite of vehicles are utilized as fog nodes for tasks execution and all vehicles in the system are utilized for tasks transmission. The well-known Dijkstra's algorithm is adopted to find the minimum path between each two nodes. The simulation results show that the RxV-MOC has reduced significantly the energy consumption and latency for the VFC system in comparison with First-Fit algorithm, Best-Fit algorithm, and the MOC method.

Article
Robotics Path Planning Algorithms using Low-Cost IR Sensor

Israa Sabri A. AL-Forati, Abdulmuttalib T. Rashid

Pages: 44-52

PDF Full Text
Abstract

A robot is a smart machine that can help people in their daily lives and keep everyone safe. the three general sequences to accomplish any robot task is mapping the environment, the localization, and the navigation (path planning with obstacle avoidance). Since the goal of the robot is to reach its target without colliding, the most important and challenging task of the mobile robot is the navigation. In this paper, the robot navigation problem is solved by proposed two algorithms using low-cost IR receiver sensors arranged as an array, and a robot has been equipped with one IR transmitter. Firstly, the shortest orientation algorithm is proposed, the robot direction is corrected at each step of movement depending on the angle calculation. secondly, an Active orientation algorithm is presented to solve the weakness in the preceding algorithm. A chain of the active sensors in the environment within the sensing range of the virtual path is activated to be scan through the robot movement. In each algorithm, the initial position of the robot is detected using the modified binary search algorithm, various stages are used to avoid obstacles through suitable equations focusing on finding the shortest and the safer path of the robot. Simulation results with multi-resolution environment explained the efficiency of the algorithms, they are compatible with the designed environment, it provides safe movements (without hitting obstacles) and a good system control performance. A Comparison table is also provided.

Article
NNMF with Speaker Clustering in a Uniform Filter-Bank for Blind Speech Separation

Ruaa N. Ismael, Hasan M. Kadhim

Pages: 111-121

PDF Full Text
Abstract

This study proposes a blind speech separation algorithm that employs a single-channel technique. The algorithm’s input signal is a segment of a mixture of speech for two speakers. At first, filter bank analysis transforms the input from time to time-frequency domain (spectrogram). Number of sub-bands for the filter is 257. Non-Negative Matrix Factorization (NNMF) factorizes each sub-band output into 28 sub-signals. A binary mask separates each sub-signal into two groups; one group belongs to the first speaker and the other to the second speaker. The binary mask separates each sub-signal of the (257×28) 7196 sub-speech signals. That separation cannot identify the speaker. Identification of the sub-signal speaker for each sub-signal is achieved by speaker clustering algorithms. Since speaker clustering cannot process without speaker segmentation, the standard windowed-overlap frames have been used to partition the speech. The speaker clustering process fetches the extracted phase angle from the spectrogram (of the mixture speech) and merges it into the spectrogram (of the recovered speech). Filter bank synthesizes these signals to produce a full-band speech signal for each speaker. Subjective tests denote that the algorithm results are accepted. Objectively, the researchers experimented with 66 mixture chats (6 females and 6 males) to test the algorithm. The average of the SIR test is 11.1 dB, SDR is 1.7 dB, and SAR is 2.8 dB.

Article
Practical Implementation of an Indoor Robot Localization and Identification System using an Array of Anchor Nodes

Israa Sabri A. AL-Forati, Abdulmuttalib T. Rashid

Pages: 9-16

PDF Full Text
Abstract

This paper proposes a low-cost Light Emitting Diodes (LED) system with a novel arrangement that allows an indoor multi- robot localization. The proposed system uses only a matrix of low-cost LED installed uniformly on the ground of an environment and low-cost Light Dependent Resistor (LDR), each equipped on bottom of the robot for detection. The matrix of LEDs which are driven by a modified binary search algorithm are used as active beacons. The robot localizes itself based on the signals it receives from a group of neighbor LEDs. The minimum bounded circle algorithm is used to draw a virtual circle from the information collected from the neighbor LEDs and the center of this circle represents the robot’s location. The propose system is practically implemented on an environment with (16*16) matrix of LEDs. The experimental results show good performance in the localization process.

Article
Comparison of Complex-Valued Independent Component Analysis Algorithms for EEG Data

Ali Al-Saegh

Pages: 1-12

PDF Full Text
Abstract

Independent Component Analysis (ICA) has been successfully applied to a variety of problems, from speaker identification and image processing to functional magnetic resonance imaging (fMRI) of the brain. In particular, it has been applied to analyze EEG data in order to estimate the sources form the measurements. However, it soon became clear that for EEG signals the solutions found by ICA often depends on the particular ICA algorithm, and that the solutions may not always have a physiologically plausible interpretation. Therefore, nowadays many researchers are using ICA largely for artifact detection and removal from EEG, but not for the actual analysis of signals from cortical sources. However, a recent modification of an ICA algorithm has been applied successfully to EEG signals from the resting state. The key idea was to perform a particular preprocessing and then apply a complex- valued ICA algorithm. In this paper, we consider multiple complex-valued ICA algorithms and compare their performance on real-world resting state EEG data. Such a comparison is problematic because the way of mixing the original sources (the “ground truth”) is not known. We address this by developing proper measures to compare the results from multiple algorithms. The comparisons consider the ability of an algorithm to find interesting independent sources, i.e. those related to brain activity and not to artifact activity. The performance of locating a dipole for each separated independent component is considered in the comparison as well. Our results suggest that when using complex-valued ICA algorithms on preprocessed signals the resting state EEG activity can be analyzed in terms of physiological properties. This reestablishes the suitability of ICA for EEG analysis beyond the detection and removal of artifacts with real-valued ICA applied to the signals in the time-domain.

Article
Damping of Power Systems Oscillations by using Genetic Algorithm-Based Optimal Controller Damping of Power Systems Oscillations by using Genetic Algorithm-Based Optimal Controller

Akram F. Bati

Pages: 50-55

PDF Full Text
Abstract

In this paper, the power system stabilizer (PSS) and Thyristor controlled phase shifter(TCPS) interaction is investigated . The objective of this work is to study and design a controller capable of doing the task of damping in less economical control effort, and to globally link all controllers of national network in an optimal manner , toward smarter grids . This can be well done if a specific coordination between PSS and FACTS devices , is accomplished . Firstly, A genetic algorithm-based controller is used. Genetic Algorithm (GA) is utilized to search for optimum controller parameter settings that optimize a given eigenvalue based objective function. Secondly, an optimal pole shifting, based on modern control theory for multi-input multi-output systems, is used. It requires solving first order or second order linear matrix Lyapunov equation for shifting dominant poles to much better location that guaranteed less overshoot and less settling time of system transient response following a disturbance.

Article
Fair and Balance Demand Response application in Distribution Networks

Ibrahim H. Al-Kharsan, Ali.F. Marhoon, Jawad Radhi Mahmood

Pages: 139-151

PDF Full Text
Abstract

The unprogrammed penetration for the loads in the distribution networks make it work in an unbalancing situation that leads to unstable operation for those networks. the instability coming from the imbalance can cause many serious problems like the inefficient use of the feeders and the heat increased in the distribution transformers. The demands response can be regarded as a modern solution for the problem by offering a program to decreasing the consumption behavior for the program's participators in exchange for financial incentives in specific studied duration according to a direct order from the utility. The paper uses a new suggested algorithm to satisfy the direct load control demand response strategy that can be used in solving the unbalancing problem in distribution networks. The algorithm procedure has been simulated in MATLAB 2018 to real data collected from the smart meters that have been installed recently in Baghdad. The simulation results of applying the proposed algorithm on different cases of unbalancing showed that it is efficient in curing the unbalancing issue based on using the demand response strategy.

Article
A Secure Image Cryptographic Algorithm Based on Triple Incorporated Ciphering Stages

Sura F. Yousif, Abbas Salman Hameed, Dheyaa T. Al-Zuhairi

Pages: 1-21

PDF Full Text
Abstract

Lately, image encryption has stand out as a highly urgent demand to provide high security for digital images against use and unauthorized distribution. A lot of existing researches use chaotic systems, symmetric or asymmetric schemes for image encryption, but cryptosystem based on one encryption technique only, faces many challenges like weak security and low complexity. Therefore, incorporating two or more different ciphering methods yields a secure and efficient algorithm to protect image information. In this work, a new image cryptosystem is suggested by joining zigzag scan technique, RSA algorithm and chaotic systems. These three security factors introduce Triple Incorporated Ciphering stages system (TIC). Initially, the plaintext image is divided into 8 × 8 non-overlapping blocks, then the odd blocks are isolated from the even blocks. After that, a new modified zigzag scan in two different directions is adopted for shuffling pixels in the odd and even blocks. This operation effectively enhances the shuffling degree. Next, the RSA algorithm is utilized after combining the scrambled blocks in one matrix. Finally, chaotic systems are implemented on the resultant encrypted matrix to complete the ciphering process. The chaos is implemented in two steps; confusion and diffusion. Duffing map is exploited in the confusion stage, whereas L¨u system is adopted on the shuffled matrix in the diffusion stage. The simulation results show the superiority of TIC in both security and attacks robustness compared to other cryptographic algorithms. Therefore, TIC can be exploited in real-time communication systems for secure image transmission.

Article
Arabic Text Cryptanalysis Using Genetic Algorithm

Rokaia Shalal Habeeb

Pages: 161-166

PDF Full Text
Abstract

In this paper a Genetic Algorithm (GA) is proposed to attack an Arabic encrypted text by Vigenere cipher. The frequency of occurrence of Arabic letters has been calculated by using the text of the holy book of Quran, since it has rich language features compared to many other books. The algorithm is tested to find the key letters for different ciphertext sizes and key lengths. The results shows 100% correct letters retrieved from medium size ciphertext and short key length, while 90% of the ciphertext is retrieved from long ciphertext and medium key length, and 82% of the ciphertext is retrieved from long ciphertext and long key.

Article
The Effect of Sample Size on the Interpolation Algorithm of Frequency Estimation

Husam Hammood, Ameer H Ali, Nabil Jalil Aklo

Pages: 156-161

PDF Full Text
Abstract

Fast and accurate frequency estimation is essential in various engineering applications, including control systems, communications, and resonance sensing systems. This study investigates the effect of sample size on the interpolation algorithm of frequency estimation. In order to enhance the accuracy of frequency estimation and performance, we describe a novel method that provides a number of approaches for calculating and defending the sample size for of the window function designs, whereas, the correct choice of the type and the size of the window function makes it possible to reduce the error. Computer simulation using Matlab / Simulink environment is performed to investigate the proposed procedure’s performance and feasibility. This study performs the comparison of the interpolation algorithm of frequency estimation strategies that can be applied to improve the accuracy of the frequency estimation. Simulation results shown that the proposed strategy with the Parzen and Flat-top gave remarkable change in the maximum error of frequency estimation. They perform better than the conventional windows at a sample size equal to 64 samples, where the maximum error of frequency estimation is 2.13e-2 , and 2.15e-2 for Parzen and Flat-top windows, respectively. Moreover, the efficiency and performance of the Nuttall window also perform better than other windows, where the maximum error is 7.76×10-5 at a sample size equal to 8192. The analysis of simulation result showed that when using the proposed strategy to improve the accuracy of the frequency estimation, it is first essential to evaluate what is the maximum number of samples that can be obtained, how many spectral lines should be used in the calculations, and only after that choose a suitable window.

Article
An Imperialist Competitive Algorithm for Sitting and Sizing of Distributed Generation in Radial Distribution Network to Improve Reliability and Losses Reduction

Mahdi Mozaffari Legha, Farzaneh Ostovar

Pages: 58-65

PDF Full Text
Abstract

Distributed Generation (DG) can help in reducing the cost of electricity to the costumer, relieve network congestion and provide environmentally friendly energy close to load centers. Its capacity is also scalable and it provides voltage support at distribution level. Hence, DG placement and penetration level is an important problem for both the utility and DG owner. The Optimal Power Flow (OPF) has been widely used for both the operation and planning of a power system. The OPF is also suited for deregulated environment. Four different objective functions are considered in this study: (1) Improvement voltage profile (2) minimization of active power loss (3) maximum capacity of conductors (4) maximization of reliability level. The site and size of DG units are assumed as design variables. The results are discussed and compared with those of traditional distribution planning and also with Imperialist competitive algorithm (ICA). Key words: Distributed generation, distribution network planning, multi-objective optimization, and Imperialist competitive algorithm.

Article
Face Recognition-Based Automatic Attendance System in a Smart Classroom

Ahmad S. Lateef, Mohammed Y. Kamil

Pages: 37-47

PDF Full Text
Abstract

The smart classroom is a fully automated classroom where repetitive tasks, including attendance registration, are automatically performed. Due to recent advances in artificial intelligence, traditional attendance registration methods have become challenging. These methods require significant time and effort to complete the process. Therefore, researchers have sought alternative ways to accomplish attendance registration. These methods include identification cards, radio frequency, or biometric systems. However, all of these methods have faced challenges in safety, accuracy, effort, time, and cost. The development of digital image processing techniques, specifically face recognition technology, has enabled automated attendance registration. Face recognition technology is considered the most suitable for this process due to its ability to recognize multiple faces simultaneously. This study developed an integrated attendance registration system based on the YOLOv7 algorithm, which extracts features and recognizes students’ faces using a specially collected database of 31 students from Mustansiriyah University. A comparative study was conducted by applying the YOLOv7 algorithm, a machine learning algorithm, and a combined machine learning and deep learning algorithm. The proposed method achieved an accuracy of up to 100%. A comparison with previous studies demonstrated that the proposed method is promising and reliable for automating attendance registration.

Article
Chameleon Chaotic System-Based Audio Encryption Algorithm and FPGA Implementation

Alaa Shumran, Abdul-Basset A. Al-Hussein

Pages: 232-250

PDF Full Text
Abstract

Audio encryption has gained popularity in a variety of fields including education, banking over the phone, military, and private audio conferences. Data encryption algorithms are necessary for processing and sending sensitive information in the context of secure speech conversations. In recent years, the importance of security in any communications system has increased. To transfer data securely, a variety of methods have been used. Chaotic system-based encryption is one of the most significant encryption methods used in the field of security. Chaos-based communication is a promising application of chaos theory and nonlinear dynamics. In this research, a chaotic algorithm for the new chaotic chameleon system was proposed, studied, and implemented. The chameleon chaotic system has been preferred to be employed because it has the property of changing from self-excited (SA) to hidden-attractor (HA) which increases the complexity of the system dynamics and gives strength to the encryption algorithm. A chaotic chameleon system is one in which, depending on the parameter values, the chaotic attractor alternates between being a hidden attractor and a self-excited attractor. This is an important feature, so it is preferable to use it in cryptography compared to other types of chaotic systems. This model was first implemented using a Field Programmable Gate Array (FPGA), which is the first time it has been implemented in practical applications. The chameleon system model was implemented using MATLAB Simulink and the Xilinx System Generator model. Self-excited, hidden, and coexisting attractors are shown in the proposed system. Vivado software was used to validate the designs, and Xilinx ZedBoard Zynq-7000 FPGA was used to implement them. The dynamic behavior of the proposed chaotic system was also studied and analysis methods, including phase portrait, bifurcation diagrams, and Lyapunov exponents. Assessing the quality of the suggested method by doing analyses of many quality measures, including correlation, differential signal-to-noise ratio (SNR), entropy, histogram analysis, and spectral density plot. The numerical analyses and simulation results demonstrate how well the suggested method performs in terms of security against different types of cryptographic assaults.

Article
Enhancing Reading Advancement Using Eye Gaze Tracking

Saadaldeen Ahmed, Mustafa latif fadhil, Salwa Khalid Abdulateef

Pages: 59-64

PDF Full Text
Abstract

This research aims to understand the enhancing reading advancement using eye gaze tracking in regards to pull the increase of time interacting with such devices along. In order to realize that, user should have a good understanding of the reading process and of the eye gaze tracking systems; as well as a good understanding of the issues existing while using eye gaze tracking system for reading process. Some issues are very common, so our proposed implementation algorithm compensate these issues. To obtain the best results possible, two mains algorithm have been implemented: the baseline algorithm and the algorithm to smooth the data. The tracking error rate is calculated based on changing points and missed changing points. In [21], a previous implementation on the same data was done and the final tracking error rate value was of 126%. The tracking error rate value seems to be abnormally high but this value is actually useful as described in [21]. For this system, all the algorithms used give a final tracking error rate value of 114.6%. Three main origins of the accuracy of the eye gaze reading were normal fixation, regression, skip fixation; and accuracies are displayed by the tracking rate value obtained. The three main sources of errors are the calibration drift, the quality of the setup and the physical characteristics of the eyes. For the tests, the graphical interface uses characters with an average height of 24 pixels for the text. By considering that the subject was approximately at 60 centimeters of the tracker. The character on the screen represents an angle of ±0.88◦; which is just above the threshold of ±0.5◦ imposed by the physical characteristics of the eyeball for the advancement of reading using eye gaze tracking.

Article
An algorithm for Path planning with polygon obstacles avoidance based on the virtual circle tangents

Zahraa Y. Ibrahim, Abdulmuttalib T. Rashid, Ali F. Marhoon

Pages: 221-234

PDF Full Text
Abstract

In this paper, a new algorithm called the virtual circle tangents is introduced for mobile robot navigation in an environment with polygonal shape obstacles. The algorithm relies on representing the polygonal shape obstacles by virtual circles, and then all the possible trajectories from source to target is constructed by computing the visible tangents between the robot and the virtual circle obstacles. A new method for searching the shortest path from source to target is suggested. Two states of the simulation are suggested, the first one is the off-line state and the other is the on-line state. The introduced method is compared with two other algorithms to study its performance.

Article
Maze Maneuvering and Colored Object Tracking for Differential Drive Mobile Robot

Ammar A. Aldair, Auday Al-Mayyahi

Pages: 47-52

PDF Full Text
Abstract

In maze maneuvering, it is needed for a mobile robot to feasibly plan the shortest path from its initial posture to the desired destination in a given environment. To achieve that, the mobile robot is combined with multiple distance sensors to assist the navigation while avoiding obstructing obstacles and following the shortest path toward the target. Additionally, a vision sensor is used to detect and track colored objects. A new algorithm is proposed based on different type of utilized sensors to aid the maneuvering of differential drive mobile robot in an unknown environment. In the proposed algorithm, the robot has the ability to traverse surrounding hindrances and seek for a particular object based on its color. Six infrared sensors are used to detect any located obstacles and one color detection sensor is used to locate the colored object. The Mobile Robotics Simulation Toolbox in Matlab is used to test the proposed algorithm. Three different scenarios are studied to prove the efficiency of the proposed algorithm. The simulation results demonstrate that the mobile robot has successfully accomplished the tracking and locating of a colored object without collision with hurdles.

Article
Multilevel Permutation with Different Block Size/ Stream Cipher Image Encryption

Abbas A. Jasim, Hiba Hakim

Pages: 42-48

PDF Full Text
Abstract

In this work, a new image encryption method using a combined multilevel permutation with stream cipher is proposed. In the permutation algorithm, image is divided into blocks in each level and its blocks are rearranged by using pseudorandom permutation method. A new non linear stream cipher algorithm is also proposed that is based on combining several keys generated by Linear Feedback Shift Register (LFSR). The results shown that the proposed algorithm has a high security feature and it is efficient for image encryption. Practical tests proved that the proposed encryption algorithm is robust, provides high level of security and gives perfect reconstruction of the decrypted image.

Article
Internet of Things Based Oil Pipeline Spill Detection System Using Deep Learning and LAB Colour Algorithm

Muhammad H. Obaid, Ali H. Hamad

Pages: 137-148

PDF Full Text
Abstract

Given the role that pipelines play in transporting crude oil, which is considered the basis of the global economy and across different environments, hundreds of studies revolve around providing the necessary protection for it. Various technologies have been employed in this pursuit, differing in terms of cost, reliability, and efficiency, among other factors. Computer vision has emerged as a prominent technique in this field, albeit requiring a robust image-processing algorithm for spill detection. This study employs image segmentation techniques to enable the computer to interpret visual information and images effectively. The research focuses on detecting spills in oil pipes caused by leakage, utilizing images captured by a drone equipped with a Raspberry Pi and Pi camera. These images, along with their global positioning system (GPS) location, are transmitted to the base station using the message queuing telemetry transport Internet of Things (MQTT IoT) protocol. At the base station, deep learning techniques, specifically Holistically-Nested Edge Detection (HED) and extreme inception (Xception) networks, are employed for image processing to identify contours. The proposed algorithm can detect multiple contours in the images. To pinpoint a contour with a black color, representative of an oil spill, the CIELAB color space (LAB) algorithm effectively removes shadow effects. If a contour is detected, its area and perimeter are calculated to determine whether it exceeds a certain threshold. The effectiveness of the proposed system was tested on Iraqi oil pipeline systems, demonstrating its capability to detect spills of different sizes.

Article
Design and Implementation of Locations Matching Algorithm for Multi-Object Recognition and Localization

Abdulmuttalib T. Rashid, Wael H. Zayer, Mofeed T. Rashid

Pages: 10-21

PDF Full Text
Abstract

A new algorithm for multi-object recognition and localization is introduced in this paper. This algorithm deals with objects which have different reflectivity factors and distinguish color with respect to the other objects. Two beacons scan multi-color objects using long distance IR sensors to estimate their absolute locations. These two beacon nodes are placed at two corners of the environment. The recognition of these objects is estimated by matching the locations of each object with respect to the two beacons. A look-up table contains the distances information about different color objects is used to convert the reading of the long distance IR sensor from voltage to distance units. The locations of invisible objects are computed by using absolute locations of invisible objects method. The performance of introduced algorithm is tested with several experimental scenarios that implemented on color objects.

Article
Design and Implementation of PID Controller for the Cooling Tower’s pH Regulation Based on Particle Swarm Optimization PSO Algorithm

Basim Al-Najari, Chong Kok Hen, Johnny Koh Siaw Paw, Ali Fadhil Marhoon

Pages: 59-67

PDF Full Text
Abstract

The PH regulation of cooling tower plant in southern fertilizers company (SCF) in Iraq is important for industry pipes protection and process continuity. According to the Mitsubishi standard, the PH of cooling water must be around (7.1 to 7.8). The deviation in PH parameter affects the pipes, such as corrosion and scale. Acidic water causes pipes to corrode, and alkaline water causes pipes to scale. The sulfuric acid solution is used for PH neutralization. The problem is that the sulfuric acid is pumped manually in the cooling tower plant every two or three hours for PH regulation. The manual operation of the sulfuric acid pump makes deviations in the PH parameter. It is very difficult to control the PH manually. To solve this problem, a PID controller for PH regulation was used. The reason for using the PID controller is that the PH response is irregular through the neutralization process. The methodology is to calculate the transfer function of the PH loop using the system identification toolbox of MATLAB, to design and implement a PID controller, to optimize the PID controller response using particle swarm optimization PSO algorithm, and to make a comparison among several tuning methods such as Ziegler Nichols (ZN) tuning method, MATLAB tuner method, and PSO algorithm tuning method. The results showed that the PSO-based PID controller tuning gives a better overshoot, less rise time, and an endurable settling time than the other tuning methods. Hence, the PH response became according to the target range. The experimental results showed that the PH regulation improved using the PSO-based PID controller tuning.

Article
Combination of Optimal Conductor Selection and Capacitor Placement in Radial Distribution Systems Using PSO Method

Mahdi Mozaffari Legha, Farzaneh Ostovar, Mohammad Mozaffari Legha

Pages: 33-41

PDF Full Text
Abstract

In This paper presents an approach for optimal placement and sizing of fixed capacitor banks and also optimal conductor selection in radial distribution networks for the purpose of economic minimization of loss and enhancement of voltage. The objective function includes the cost of power losses, voltage profile, fixed capacitor banks and also type of conductor selection. Constraints include voltage limit, maximum permissible carrying current of conductors, size of available capacitors and type of conductors. The optimization problem is solved by the Imperialism Competitive algorithm method and the size and site capacitor banks and type of conductors is determined. To demonstrate the validity of the proposed algorithm, computer simulations are carried out on actual power network of Kerman city, Iran and the simulation results are presented and discussed.

Article
New Architectures and Algorithm for Optical Pattern Recognition using Joint Transform Correlation Technique

Prof. Dr. R. S. Fyath, Kh. N. Darraj

Pages: 33-50

PDF Full Text
Abstract

Recently, there is increasing interest in using joint transform correlation (JTC) technique for optical pattern recognition. In this technique, the target and reference images are jointed together in the input plane and no matched filter is required. In this paper, the JTC is investigated using simulation technique. A new discrimination decision algorithm is proposed to recognize the correlation output for different object shapes (dissimilar shapes). Also, new architectures are proposed to overcome the main problems of the conventional JTC.

Article
A Comparison of COIVD-19 Cases Classification Based on Machine Learning Approaches

Oqbah Salim Atiyah, Saadi Hamad Thalij

Pages: 139-143

PDF Full Text
Abstract

COVID-19 emerged in 2019 in china, the worldwide spread rapidly, and caused many injuries and deaths among humans. Accurate and early detection of COVID-19 can ensure the long-term survival of patients and help prohibit the spread of the epidemic. COVID-19 case classification techniques help health organizations quickly identify and treat severe cases. Algorithms of classification are one the essential matters for forecasting and making decisions to assist the diagnosis, early identification of COVID-19, and specify cases that require to intensive care unit to deliver the treatment at appropriate timing. This paper is intended to compare algorithms of classification of machine learning to diagnose COVID-19 cases and measure their performance with many metrics, and measure mislabeling (false-positive and false-negative) to specify the best algorithms for speed and accuracy diagnosis. In this paper, we focus onto classify the cases of COVID-19 using the algorithms of machine learning. we load the dataset and perform dataset preparation, pre-processing, analysis of data, selection of features, split of data, and use of classification algorithm. In the first using four classification algorithms, (Stochastic Gradient Descent, Logistic Regression, Random Forest, Naive Bayes), the outcome of algorithms accuracy respectively was 99.61%, 94.82% ,98.37%,96.57%, and the result of execution time for algorithms respectively were 0.01s, 0.7s, 0.20s, 0.04. The Stochastic Gradient Descent of mislabeling was better. Second, using four classification algorithms, (eXtreme-Gradient Boosting, Decision Tree, Support Vector Machines, K_Nearest Neighbors), the outcome of algorithms accuracy was 98.37%, 99%, 97%, 88.4%, and the result of execution time for algorithms respectively were 0.18s, 0.02s, 0.3s, 0.01s. The Decision Tree of mislabeling was better. Using machine learning helps improve allocate medical resources to maximize their utilization. Classification algorithm of clinical data for confirmed COVID-19 cases can help predict a patient's need to advance to the ICU or not need by using a global dataset of COVID-19 cases due to its accuracy and quality.

Article
Distribution Networks Reconfiguration for Power Loss Reduction and Voltage Profile Improvement Using Hybrid TLBO-BH Algorithm

Arsalan Hadaeghi, Ahmadreza Abdollahi Chirani

Pages: 12-20

PDF Full Text
Abstract

In this paper, a new method based on the combination of the Teaching-learning-based-optimization (TLBO) and Black-hole (BH) algorithm has been proposed for the reconfiguration of distribution networks in order to reduce active power losses and improve voltage profile in the presence of distributed generation sources. The proposed method is applied to the IEEE 33-bus radial distribution system. The results show that the proposed method can be a very promising potential method for solving the reconfiguration problem in distribution systems and has a significant effect on loss reduction and voltage profile improvement.

Article
Outdoor & Indoor Quadrotor Mission

Baqir Nassir Abdul-Samed, Ammar A. Aldair

Pages: 1-12

PDF Full Text
Abstract

The last few years Quadrotor became an important topic, many researches have implemented and tested concerning that topic. Quadrotor also called an unmanned Aerial Vehicle (UAV), it's highly used in many applications like security, civil applications, aid, rescue and a lot of other applications. It’s not a conventional helicopter because of small size, low cost and the ability of vertical and takeoff landing (VTOL). The models kept an eye on quadrotors were presented, the advancement of this new kind of air vehicle is hindered for a very long while because of different reasons, for example, mechanical multifaceted nature, enormous size and weight, and challenges in charge particularly. Just as of late a lot of interests and endeavors have been pulled in on it; a quadrotor has even become a progressively discretionary vehicle for useful application. Quadrotor can be used in variable, different , outdoor and indoor missions; these missions should be implemented with high value of accuracy and quality. In this work two scenarios suggested for different two missions. First mission the quadrotor will be used to reach different goals in the simulated city for different places during one flight using path following algorithm. The second mission will be an indoor arrival mission, during that mission quadrotor will avoid obstacles by using only Pure pursuit algorithm (PPA). To show the benefit of using the new strategy it will compare with a victor field histogram algorithm (VFH) which is used widely in robotics for avoiding obstacles, the comparison will be in terms of reaching time and distance of reaching the goal. The Gazebo Simulator (GS) is used to visualize the movement of the quadrotor. The gazebo has another preferred position it helps to show the motion development of the quadrotor without managing the mathematical model of the quadrotor. The Robotic Operating System (ROS) is used to transfer the data between the MATLAB Simulink program and the Gazebo Simulator. The diversion results show that, the proposed mission techniques win to drive the quarter on the perfect route similarly at the limit with regards to the quadrotor to go without hitting any obstacle in the perfect way.

Article
Parameter Identification of a PMSG Using a PSO Algorithm Based on Experimental Tests

A. J. Mahdi, W. H. Tang, Q. H. Wu

Pages: 39-44

PDF Full Text
Abstract

An accurate model for a permanent magnet syn- chronous generator (PMSG) is important for the design of a high-performance PMSG control system. The performance of such control systems is influenced by PMSG parameter variations under real operation conditions. In this paper, the electrical parameters of a PMSG (the phase resistance, the phase inductance and the rotor permanent magnet (PM) flux linkage) are identified by a particle swarm optimisation (PSO) algorithm based on experimental tests. The advantages of adopting the PSO algorithm in this research include easy implementation, a high computational efficiency and stable convergence characteristics. For PMSG parameter identification, the normalised root mean square error (NRMSE) between the measured and simulated data is calculated and minimised using PSO.

Article
Recognition of Cardiac Arrhythmia using ECG Signals and Bio-inspired AWPSO Algorithms

Jyothirmai Digumarthi, V. M. Gayathri, R. Pitchai

Pages: 95-103

PDF Full Text
Abstract

Studies indicate cardiac arrhythmia is one of the leading causes of death in the world. The risk of a stroke may be reduced when an irregular and fast heart rate is diagnosed. Since it is non-invasive, electrocardiograms are often used to detect arrhythmias. Human data input may be error-prone and time-consuming because of these limitations. For early detection of heart rhythm problems, it is best to use deep learning models. In this paper, a hybrid bio-inspired algorithm has been proposed by combining whale optimization (WOA) with adaptive particle swarm optimization (APSO). The WOA is a recently developed meta-heuristic algorithm. APSO is used to increase convergence speed. When compared to conventional optimization methods, the two techniques work better together. MIT-BIH dataset has been utilized for training, testing and validating this model. The recall, accuracy, and specificity are used to measure efficiency of the proposed method. The efficiency of the proposed method is compared with state-of-art methods and produced 98.25 % of accuracy.

Article
Finite Control Set Model Predictive C urrent Control FCS-MPC B ased on C ost F unction O ptimization, with C urrent L imit C onstraints for F our- L eg VSI

Riyadh G. Omar, Rabee' H. Thejel

Pages: 43-53

PDF Full Text
Abstract

A Matlab/Simulink model for the Finite Control Set Model Predictive current Control FCS-MPC based on cost function optimization, with current limit constraints for four-leg VSI is presented in this paper, as a new control algorithm. The algorithm selects the switching states that produce minimum error between the reference currents and the predicted currents via optimization process, and apply the corresponding switching control signals to the inverter switches. The new algorithm also implements current constraints which excludes any switching state that produces currents above the desired references. Therefore, the system response is enhanced since there is no overshoots or deviations from references. Comparison is made between the Space Vector Pulse Width Modulation SVPWM and the FCS-MPC control strategies for the same load conditions. The results show the superiority of the new control strategy with observed reduction in inverter output voltage THD by 10% which makes the FCS-MPC strategy more preferable for loads that requires less harmonics distortion.

Article
Security Enhancement of Remote FPGA Devices By a Low Cost Embedded Network Processor

Qutaiba I. Ali, Sahar Lazim

Pages: 36-48

PDF Full Text
Abstract

The incredible growth of FPGA capabilities in recent years and the new included features have made them more and more attractive for numerous embedded systems. There is however an important shortcoming concerning security of data and design. Data security implies the protection of the FPGA application in the sense that the data inside the circuit and the data transferred to/from the peripheral circuits during the communication are protected. This paper suggests a new method to support the security of any FPGA platform using network processor technology. Low cost IP2022 UBICOM network processor was used as a security shield in front of any FPGA device. It was supplied with the necessary security methods such as AES ciphering engine, SHA-1, HMAC and an embedded firewall to provide confidentiality, integrity, authenticity, and packets filtering features.

Article
Hybrid RRT-A*: An Improved Path Planning Method for an Autonomous Mobile Robots

Suhaib Al-Ansarry, Salah Al-Darraji

Pages: 107-115

PDF Full Text
Abstract

Although the Basic RRT algorithm is considered a traditional search method, it has been widely used in the field of robot path planning (manipulator and mobile robot), especially in the past decade. This algorithm has many features that give it superiority over other methods. On the other hand, the Basic RRT suffers from a bad convergence rate (it takes a long time until finding the goal point), especially in environments with cluttered obstacles, or whose targets are located in narrow passages. Many studies have discussed this problem in recent years. This paper introduces an improved method called (Hybrid RRT-A*) to overcome the shortcomings of the original RRT, specifically slow convergence and cost rate. The heuristic function of A-star algorithm is combined with RRT to decrease tree expansion and guide it towards the goal with less nodes and time. Various experiments have been conducted with different environment scenarios to compare the proposed method with the Basic RRT and A-star under the same conditions, which have shown remarkable performance. The time consumed to find the path of the worst one of these scenarios is about 4.9 seconds, whereas it is 18.3 and 34 for A-star and RRT, respectively.

Article
The UKF Based Approach to Improving Attitude and Position of Quadcopter Through Autonomous and Non-Autonomous Flight

Ahmed Abdulmahdi Abdulkareem, Basil H. Jasim, Safanah Mudheher Raafat

Pages: 49-57

PDF Full Text
Abstract

The gyroscope and accelerometer are the basic sensors used by most Unmanned Aerial Vehicle (UAV) like quadcopter to control itself. In this paper, the fault detection of measured angular and linear states by gyroscope and accelerometer sensors are present. Uncertainties in measurement and physical sensors itself are the main reasons that lead to generate noise and cause the fault in measured states. Most previous solutions are process angular or linear states to improving the performance of quadcopter. Also, in most of the previous solutions, KF and EKF filters are used, which are inefficient in dealing with high nonlinearity systems such as quadcopter. The proposed algorithm is developed by the robust nonlinear filter, Unscented Kalman Filter (UKF), as an angular and linear estimation filter. Simulation results show that the proposed algorithm is efficient to decrease the effect of sensors noise and estimate accurate angular and linear states. Also, improving the stability and performance properties of the quadcopter. In addition, the new algorithm leads to increasing the range of nonlinearity movements that quadcopter can perform it.

Article
Adaptive Noise Cancellation for speech Employing Fuzzy and Neural Network

Mohammed Hussein Miry, Ali Hussein Miry, Hussain Kareem Khleaf

Pages: 94-101

PDF Full Text
Abstract

Adaptive filtering constitutes one of the core technologies in digital signal processing and finds numerous application areas in science as well as in industry. Adaptive filtering techniques are used in a wide range of applications such as noise cancellation. Noise cancellation is a common occurrence in today telecommunication systems. The LMS algorithm which is one of the most efficient criteria for determining the values of the adaptive noise cancellation coefficients are very important in communication systems, but the LMS adaptive noise cancellation suffers response degrades and slow convergence rate under low Signal-to- Noise ratio (SNR) condition. This paper presents an adaptive noise canceller algorithm based fuzzy and neural network. The major advantage of the proposed system is its ease of implementation and fast convergence. The proposed algorithm is applied to noise canceling problem of long distance communication channel. The simulation results showed that the proposed model is effectiveness.

Article
Table-Based Matching Algorithm for Localization and Orientation Estimation of Multi-Robot System

Ola A. Hasan, Abdulmuttalib T. Rashid, Ramzy S. Ali

Pages: 53-71

PDF Full Text
Abstract

In this paper, a new algorithm called table-based matching for multi-robot (node) that used for localization and orientation are suggested. The environment is provided with two distance sensors fixed on two beacons at the bottom corners of the frame. These beacons have the ability to scan the environment and estimate the location and orientation of the visible nodes and save the result in matrices which are used later to construct a visible node table. This table is used for matching with visible-robot table which is constructed from the result of each robot scanning to its neighbors with a distance sensor that rotates at 360⁰; at this point, the location and identity of all visible nodes are known. The localization and orientation of invisible robots rely on the matching of other tables obtained from the information of visible robots. Several simulations implementation are experienced on a different number of nodes to submit the performance of this introduced algorithm.

Article
A Review of Algorithms and Platforms for Offloading Decisions in Mobile Cloud Computing

Fatima Haitham Murtadha, Suhad Faisal Behadili

Pages: 97-106

PDF Full Text
Abstract

With the substantial growth of mobile applications and the emergence of cloud computing concepts, therefore mobile Cloud Computing (MCC) has been introduced as a potential mobile service technology. Mobile has limited resources, battery life, network bandwidth, storage, and processor, avoid mobile limitations by sending heavy computation to the cloud to get better performance in a short time, the operation of sending data, and get the result of computation call offloading. In this paper, a survey about offloading types is discussed that takes care of many issues such as offloading algorithms, platforms, metrics (that are used with this algorithm and its equations), mobile cloud architecture, and the advantages of using the mobile cloud. The trade-off between local execution of tasks on end-devices and remote execution on the cloud server for minimizing delay time and energy saving. In the form of a multi-objective optimization problem with a focus on reducing overall system power consumption and task execution latency, meta-heuristic algorithms are required to solve this problem which is considered as NP-hardness when the number of tasks is high. To get minimum cost (time and energy) apply partial offloading on specific jobs containing a number of tasks represented in sequences of zeros and ones for example (100111010), when each bit represents a task. The zeros mean the task will be executed in the cloud and the ones mean the task will be executed locally. The decision of processing tasks locally or remotely is important to balance resource utilization. The calculation of task completion time and energy consumption for each task determines which task from the whole job will be executed remotely (been offloaded) and which task will be executed locally. Calculate the total cost (time and energy) for the whole job and determine the minimum total cost. An optimization method based on metaheuristic methods is required to find the best solution. The genetic algorithm is suggested as a metaheuristic Algorithm for future work.

Article
Optimal Conductor Selection in Radial Distribution Systems for Productivity Improvement Using Genetic Algorithm

Mahdi Mozaffari Legha, Hassan Javaheri, Mohammad Mozaffari Legha

Pages: 29-35

PDF Full Text
Abstract

Development of distribution systems result in higher system losses and poor voltage regulation. Consequently, an efficient and effective distribution system has become more urgent and important. Hence proper selection of conductors in the distribution system is important as it determines the current density and the resistance of the line. This paper examines the use of different evolutionary algorithms, genetic algorithm (GA), to optimal branch conductor selection in planning radial distribution systems with the objective to minimize the overall cost of annual energy losses and depreciation on the cost of conductors and reliability in order to improve productivity. Furthermore, The Backward-Forward sweep iterative method was adopted to solve the radial load flow analysis. Simulations are carried out on 69-bus radial distribution network using GA approach in order to show the accuracy as well as the efficiency of the proposed solution technique.

Article
Design and Implementation of Line Follower Arduino Mobile Robot Using Matlab Simulink Toolbox

Mazin Majid Abdulnabi Alwan, Anwar Abdulrazzaq Green, Abdulazez Safaa Noori, Ammar A. Aldair

Pages: 11-16

PDF Full Text
Abstract

The main problem of line follower robot is how to make the mobile robot follows a desired path (which is a line drawn on the floor) smoothly and accurately in shortest time. In this paper, the design and implementation of a complex line follower mission is presented by using Matlab Simulink toolbox. The motion of mobile robot on the complex path is simulated by using the Robot Simulator which is programed in Matlab to design and test the performance of the proposed line follower algorithm and the designed PID controller. Due to the complexity of selection the parameters of PID controller, the Particle Swarm Optimization (PSO) algorithm are used to select and tune the parameters of designed PID controller. Five Infrared Ray (IR) sensors are used to collect the information about the location of mobile robot with respect to the desired path (black line). Depending on the collected information, the steering angle of the mobile robot will be controlled to maintain the robot on the desired path by controlling the speed of actuators (two DC motors). The obtained simulation results show that, the motion of mobile robot is still stable even the complex maneuver is performed. The hardware design of the robot system is perform by using the Arduino Mobile Robot (AMR). The Simulink Support Package for Arduino and control system toolbox are used to program the AMR. The practical results show that the performances of real mobile robot are exactly the same of the performances of simulated mobile robot.

Article
RP Lidar Sensor for Multi-Robot Localization using Leader Follower Algorithm

Bayadir A. Issa, Abdulmuttalib T. Rashid

Pages: 21-32

PDF Full Text
Abstract

In this paper, a new technique for multi-robot localization in an unknown environment, called the leader-follower localization algorithm is presented. The framework utilized here is one robot that goes about as a leader and different robots are considered as followers distributed randomly in the environment. Every robot equipped with RP lidar sensors to scan the environment and gather information about every robot. This information utilized by the leader to distinguish and confine every robot in the environment. The issue of not noticeable robots is solved by contrasting their distances with the leader. Moreover, the equivalent distance robot issue is unraveled by utilizing the permutation algorithm. Several simulation scenarios with different positions and orientations are implemented on (3- 7) robots to show the performance of the introduced technique.

Article
Securing a Web-Based Hospital Management System Using a Combination of AES and HMAC

Alaa B. Baban, Safa A. Hameed

Pages: 93-99

PDF Full Text
Abstract

The demand for a secured web storage system is increasing daily for its reliability which ensures data privacy and confidentiality. The proposed paper aims to find the most secure ways to maintain integrity and protect privacy and security in healthcare management systems. The Advanced Encryption Standard (AES) algorithm is used to encrypt data transferred by providing a means to check the integrity of information transmitted and make it more immune to cyberattack techniques, this was implemented by using Keyed-Hash Message Authentication Code (HMAC) and Secured Hash Algorithm-256 (SHA-256). The risk of exposure to attackers can be avoided by using honeypot systems combined with Intrusion detection systems (IDSs) as a firewall system is not effective against such attacks alone. The experimental results evaluate the proposed security health information management system by comparing the performance of the encryption algorithm based on encryption time, memory and CPU usage, and entropy for different plaintext lengths. In addition, it can be seen that when changing the AES key size, more memory and time are required the longer the key size is used. The 128 bits AES key is therefore advised if the system must operate in hard real-time.

Article
Intelligent Control of Vibration Energy Harvesting System

Nizar N. Almajdy, Rabee’ H. Thejel, Ramzi S. Ali

Pages: 39-48

PDF Full Text
Abstract

The Intelligent Control of Vibration Energy Harvesting system is presented in this paper. The harvesting systems use a me- chanical vibration to generate electrical energy in a suitable form for use. Proportional-Integrated-derivative controller and Fuzzy Logic controller have been suggested; their parameters are optimized using a new heuristic algorithm, the Camel Trav- eling Algorithm(CTA). The proposed circuit Simulink model was constructed in Matlab facilities, and the model was tested under various operating conditions. The results of the simulation using the CTA was compared with two other methods.

Article
Centralized approach for multi-node localization and identification

Ola A. Hasan, Ramzy S. Ali, Abdulmuttalib T. Rashid

Pages: 178-187

PDF Full Text
Abstract

A new algorithm for the localization and identification of multi-node systems has been introduced in this paper; this algorithm is based on the idea of using a beacon provided with a distance sensor and IR sensor to calculate the location and to know the identity of each visible node during scanning. Furthermore, the beacon is fixed at middle of the frame bottom edge for a better vision of nodes. Any detected node will start to communicate with the neighboring nodes by using the IR sensors distributed on its perimeter; that information will be used later for the localization of invisible nodes. The performance of this algorithm is shown by the implementation of several simulations .

Article
Iraqi License Plate Detection and Segmentation based on Deep Learning

Ghida Yousif Abbass, Ali Fadhil Marhoon

Pages: 102-107

PDF Full Text
Abstract

Nowadays, the trend has become to utilize Artificial Intelligence techniques to replace the human's mind in problem solving. Vehicle License Plate Recognition (VLPR) is one of these problems in which the computer outperforms the human being in terms of processing speed and accuracy of results. The emergence of deep learning techniques enhances and simplifies this task. This work emphasis on detecting the Iraqi License Plates based on SSD Deep Learning Algorithm. Then Segmenting the plate using horizontal and vertical shredding. Finally, the K-Nearest Neighbors (KNN) algorithm utilized to specify the type of car. The proposed system evaluated by using a group of 500 different Iraqi Vehicles. The successful results show that 98% regarding the plate detection, and 96% for segmenting operation.

Article
Designing robust Mixed H /H PID Controllers based Intelligent Genetic Algorithm

Ramzy S. Ali Al-Waily, Ali Abdullah K. Al-Thuwainy

Pages: 25-34

PDF Full Text
Abstract

It's not easy to implement the mixed / optimal controller for high order system, since in the conventional mixed / optimal feedback the order of the controller is much than that of the plant. This difficulty had been solved by using the structured specified PID controller. The merit of PID controllers comes from its simple structure, and can meets the industry processes. Also it have some kind of robustness. Even that it's hard to PID to cope the complex control problems such as the uncertainty and the disturbance effects. The present ideas suggests combining some of model control theories with the PID controller to achieve the complicated control problems. One of these ideas is presented in this paper by tuning the PID parameters to achieve the mixed / optimal performance by using Intelligent Genetic Algorithm (IGA). A simple modification is added to IGA in this paper to speed up the optimization search process. Two MIMO example are used during investigation in this paper. Each one of them has different control problem.

Article
Hybrid and Invisible Digital Image Watermarking Technique Using IWT-DCT and Hopfield Neural Network

Ayoub Taheri

Pages: 18-24

PDF Full Text
Abstract

According to the characteristic of HVS (Human Visual System) and the association memory ability of neural network, an adaptive image watermarking algorithm based on neural network is proposed invisible image watermarking is secret embedding scheme for hiding of secret image into cover image file and the purpose of invisible watermarking is copyrights protection. Wavelet transformation-based image watermarking techniques provide better robustness for statistical attacks in comparison to Discrete Cosine Transform domain-based image watermarking. The joined method of IWT (Integer Wavelet Transform) and DCT (Discrete Cosine Transform) gives benefits of the two procedures. The IWT have impediment of portion misfortune in embedding which increments mean square estimate as SIM and results diminishing PSNR. The capacity of drawing in is improved by pretreatment and re-treatment of image scrambling and Hopfield neural network. The proposed algorithm presents hybrid integer wavelet transform and discrete cosine transform based watermarking technique to obtain increased imperceptibility and robustness compared to IWT-DCT based watermarking technique. The proposed watermarking technique reduces the fractional loss compared to DWT based watermarking.

Article
Encrypted Vehicular Communication Using Wireless Controller Area Network

Mohammed Al-Qaraghuli, Saadaldeen Rashid Ahmed Ahmed, Muhammad Ilyas

Pages: 17-24

PDF Full Text
Abstract

In this paper, we focus on ensuring encrypted vehicular communication using wireless controller area network performance at high node densities, by means of Dedicated Short-Range Communication (DSRC) algorithms. We analyses the effect of the vehicular communication parameters, message-rate, data-rate, transmission power and carrier sensing threshold, on the application performance. After a state-of-the-art analysis, we propose a data-rate DSRC algorithm. Simulation studies show that DSRC performs better than other decentralized vehicular communication algorithms for a wide range of application requirements and densities. Vehicular communication plays one of the most important roles for future autonomous vehicle. We have systematically investigated the impact of vehicular communication using the MATLAB application platform and achieved an accuracy of 93.74% after encrypting all the communications between the vehicles and securing them by applying the encryption on V2V communication in comparison with the existing system of Sensor Networks which stands at 92.97%. The transmission time for the encryption is 165 seconds while the rate of encryption is as low as 120 Mbps for the proposed awareness range of vehicles to vehicle using DSRC algorithm in Wireless-Controller Area Network for communication. Experimental results show that our proposed method performs 3% better than the recently developed algorithms.

Article
Stochastic Local Search Algorithms for Feature Selection: A Review

Hayder Naser Khraibet Al-Behadili

Pages: 1-10

PDF Full Text
Abstract

In today’s world, the data generated by many applications are increasing drastically, and finding an optimal subset of features from the data has become a crucial task. The main objective of this review is to analyze and comprehend different stochastic local search algorithms to find an optimal feature subset. Simulated annealing, tabu search, genetic programming, genetic algorithm, particle swarm optimization, artificial bee colony, grey wolf optimization, and bat algorithm, which have been used in feature selection, are discussed. This review also highlights the filter and wrapper approaches for feature selection. Furthermore, this review highlights the main components of stochastic local search algorithms, categorizes these algorithms in accordance with the type, and discusses the promising research directions for such algorithms in future research of feature selection.

Article
Design and Simulation of Reduced Switch 31-Level Multilevel Inverter Topology for PV Application

Abdulhasan F. Abdulhasan, Fatimah F. Jaber, Yousif Abdulwahab Kheerallah

Pages: 178-188

PDF Full Text
Abstract

This paper presents a design of a low cost, low loss 31-level multilevel inverter (MLI) topology with a reduce the number of switches and power electronic devices. The increase in the levels of MLI leads to limiting the THD to the desired value. The 31-level output voltage is created using four PV sources with a specific ratio. The SPWM is used to control the gating signals for the switches of MLI. The PV system is integrated into the MLI using a boost converter to maximize the power capacity of the solar cells and the Incremental Conductance (IC) algorithm is employed for maximum power point tracking (MPPT) of the PV system. Simulation results of 31-level MLI indicate the THD of voltage and current waveforms are 3.73% within an acceptable range of IEEE standards.

Article
Parallel Search Using Probabilistic DNA Sticker Model to Cryptanyze One Time Pad Polyalphabetic Cipher

Basim Sahar Yaseen

Pages: 104-110

PDF Full Text
Abstract

Nowadays, it is difficult to imagine a powerful algorithm of cryptography that can continue cryptanalyzing and attacking without the use of unconventional techniques. Although some of the substitution algorithms are old, such as Vigen`ere, Alberti, and Trithemius ciphers, they are considered powerful and cannot be broken. In this paper we produce the novelty algorithm, by using of biological computation as an unconventional search tool combined with an uninhibited analysis method is the vertical probabilistic model, that makes attacking and analyzing these ciphers possible and very easy to transform the problem from a complex to a linear one, which is a novelty achievement. The letters of the encoded message are processed in the form of segments of equal length, to report the available hardware components. Each letter codon represents a region of the memory strand, and the letters calculated for it are symbolized within the probabilistic model so that each pair has a triple encoding: the first is given as a memory strand encoding and the others are its complement in the sticker encoding; These encodings differ from one region to another. The solution space is calculated and then the parallel search process begins. Some memory complexities are excluded even though they are within the solution paths formed, because the natural language does not contain its sequences. The precision of the solution and the time consuming of access to it depend on the length of the processed text, and the precision of the solution is often inversely proportional to the speed of access to it. As an average of the time spent to reach the solution, a text with a length of 200 cipher characters needs approximately 15 minutes to give 98% of the correct components of the specific hardware. The aim of the paper is to transform OTP substitution analysis from a NP problem to a O(nm) problem, which makes it easier to find solutions to it easily with the available capabilities and to develop methods that are harnessed to attack difficult and powerful ciphers that differ in class and type from the OTP polyalphabetic substitution ciphers.

Article
Fuzzy-Neural Petri Net Distributed Control System Using Hybrid Wireless Sensor Network and CAN Fieldbus

Ali A. Abed, Abduladhem A. Ali, Nauman Aslam Computer Science & Digital Techniques, Northumbria Univ. nauman.aslam@northumbria.ac.uk, Ali F. Marhoon

Pages: 54-70

PDF Full Text
Abstract

The reluctance of industry to allow wireless paths to be incorporated in process control loops has limited the potential applications and benefits of wireless systems. The challenge is to maintain the performance of a control loop, which is degraded by slow data rates and delays in a wireless path. To overcome these challenges, this paper presents an application–level design for a wireless sensor/actuator network (WSAN) based on the “automated architecture”. The resulting WSAN system is used in the developing of a wireless distributed control system (WDCS). The implementation of our wireless system involves the building of a wireless sensor network (WSN) for data acquisition and controller area network (CAN) protocol fieldbus system for plant actuation. The sensor/actuator system is controlled by an intelligent digital control algorithm that involves a controller developed with velocity PID- like Fuzzy Neural Petri Net (FNPN) system. This control system satisfies two important real-time requirements: bumpless transfer and anti-windup, which are needed when manual/auto operating aspect is adopted in the system. The intelligent controller is learned by a learning algorithm based on back-propagation. The concept of petri net is used in the development of FNN to get a correlation between the error at the input of the controller and the number of rules of the fuzzy-neural controller leading to a reduction in the number of active rules. The resultant controller is called robust fuzzy neural petri net (RFNPN) controller which is created as a software model developed with MATLAB. The developed concepts were evaluated through simulations as well validated by real-time experiments that used a plant system with a water bath to satisfy a temperature control. The effect of disturbance is also studied to prove the system's robustness.

Article
Optical Parallel Quaternary Signed Digit Multiplier For Large Scale Two-Dimensional Array Using Digit-Decomposition Plane Representation

Alaa A. W. Al-Saffar

Pages: 21-32

PDF Full Text
Abstract

An optical parallel quaternary signed digit (QSD) two-dimensional array multiplier based on digit-decomposition (DDP) representation and duplication-shifting-superimposing algorithm is proposed in this paper. The multiplication operation is done in three steps; one for partial products generation and the other two steps perform accumulation to find the DDP planes of the final result array. QSD multiplication and addition rules are used to obtain a newly derived equations which are suitable for easy optical implementation using basic optical tools. Finally, simulation results are presented to validate the successful of the multiplication operation.

Article
New Energy Efficient Routing Protocol in Wireless Sensor Networks Using Firefly Algorithm

Safaa Khudair Leabi

Pages: 1-7

PDF Full Text
Abstract

Energy constraint has become the major challenge for designing wireless sensor networks. Network lifetime is considered as the most substantial metric in these networks. Routing technique is one of the best choices for maintaining network lifetime. This paper demonstrates implementation of new methodology of routing in WSN using firefly swarm intelligence. Energy consumption is the dominant issue in wireless sensor networks routing. For network cutoff avoidance while maximize net lifetime energy exhaustion must be balanced. Balancing energy consumption is the key feature for rising nets lifetime of WSNs. This routing technique involves determination of optimal route from node toward sink to make energy exhaustion balance in network and in the same time maximize network throughput and lifetime. The proposed technique show that it is better than other some routing techniques like Dijkstra routing, Fuzzy routing, and ant colony (ACO) routing technique. Results demonstrate that the proposed routing technique has beat the three routing techniques in throughput and extend net lifetime.

Article
Reliability & Sensitivity Analysis of IKR Regional power Network.

Asso Raouf Majeed

Pages: 163-168

PDF Full Text
Abstract

This paper presents a developed algorithm for reliability sensitivity analysis of engineering networks. Reliability Modeling is proposed for the Iraqi Kurdistan Regional Power Network (IKRPN) using Symbolic Reliability function of the model. The written Pascal code for the developed algorithm finds efficiently path sets and cut sets of the model. Reliability and Unreliability indices are found. The sensitivity of these indices are found with respect to the variation of the network’s elements reliabilities

Article
Chaos Algorithm versus Traditional and Optimal Approaches for Regulating Line Frequency of Steam Power System

Ahmed A. AbdElhafez, Ali M. Yosuf

Pages: 120-126

PDF Full Text
Abstract

Load Frequency Control (LFC) is a basic control strategy for proper operation of the power system. It ensures the ability of each generator in regulating its output power in such way to maintain system frequency and tie-line power of the interconnected system at prescribed levels. This article introduces comprehensive comparative study between Chaos Optimization Algorithm (COA) and optimal control approaches, such as Linear Quadratic Regulator (LQR), and Optimal Pole Shifting (OPS) regarding the tuning of LFC controller. The comparison is extended to the control approaches that result in zero steady-state frequency error such as Proportional Integral (PI) and Proportional Integral Derivative (PID) controllers. Ziegler-Nicholas method is widely adopted for tuning such controllers. The article then compares between PI and PID controllers tuned via Ziegler-Nicholas and COA. The optimal control approaches as LQR and OPS have the characteristic of steady-state error. Moreover, they require the access for full state variables. This limits their applicability. Whereas, Ziegler-Nicholas PI and PID controllers have relatively long settling time and high overshoot. The controllers tuned via COA remedy the defects of optimal and zero steady-state controllers. The performance adequacy of the proposed controllers is assessed for different operating scenarios. Matlab and its dynamic platform, Simulink, are used for stimulating the system under concern and the investigated control techniques. The simulation results revealed that COA results in the smallest settling time and overshoot compared with traditional controllers and zero steady-state error controllers. In the overshoot, COA produces around 80% less than LQR and 98.5% less than OPS, while in the settling time, COA produces around 81% less than LQR and 95% less than OPS. Moreover, COA produces the lowest steady-state frequency error. For Ziegler-Nicholas controllers, COA produces around 53% less in the overshoot and 42% less in the settling time.

Article
Optimal Selection of Conductors in Ghaleganj Radial Distribution Systems

Mahdi Mozaffarilegha, Ehsan Moghbeli Damaneh

Pages: 212-218

PDF Full Text
Abstract

Selection of the best type and most suitable size of conductors is essential for designing and optimizing the distribution network. In this paper, an effective method has been proposed for proper selection and incorporation of conductors in the feed part of a radial electricity distribution network considering the depreciation effect of conductors. Increasing the usability of the electric energy of the power grid for the subscribers has been considered per load increment regarding the development of the country. Optimal selection and reconstruction of conductors in the power distribution radio network have been performed through a smart method for minimizing the costs related to annual losses and investment for renovation of lines by imperialist competitive algorithm (ICA) to improve the productivity of the power distribution network. Backward/forward sweep load flow method has been used to solve the load flow problem in the power distribution networks. The mentioned optimization method has been tested on DAZ feeder in Ghaleganj town as test.

Article
A Self Learning Fuzzy Logic Controller for Ship Steering System

Ammar A. Aldair

Pages: 25-34

PDF Full Text
Abstract

A self learning fuzzy logic controller for ship steering systems is proposed in this paper. Due to the high nonlinearity of ship steering system, the performances of traditional control algorithms are not satisfactory in fact. An intelligent control system is designed for controlling the direction heading of ships to improve the high e ffi ciency of transportation, the convenience of manoeuvring ships, and the safety of navigation. The design of fuzzy controllers is usually performed in an ad hoc manner where it is hard to justify the choice of some fuzzy control parameters such as the parameters of membership function. In this paper, self tuning algorithm is used to adjust the parameters of fuzzy controller. Simulation results show that the efficiency of proposed algorithm to design a fuzzy controller for ship steering system.

Article
Polygon Shape Formation for Multi-Mobile Robots in a Global Knowledge Environment

Abdulmuttalib T. Rashid, Abduladhem A. Ali, Mattia Frasca DIEEI

Pages: 76-88

PDF Full Text
Abstract

In coordination of a group of mobile robots in a real environment, the formation is an important task. Multi- mobile robot formations in global knowledge environments are achieved using small robots with small hardware capabilities. To perform formation, localization, orientation, path planning and obstacle and collision avoidance should be accomplished. Finally, several static and dynamic strategies for polygon shape formation are implemented. For these formations minimizing the energy spent by the robots or the time for achieving the task, have been investigated. These strategies have better efficiency in completing the formation, since they use the cluster matching algorithm instead of the triangulation algorithm.

Article
Optimal Assimilation of Distributed Generation in Radial Power Distribution System Using Hybrid Approach

S K B Pradeepkumar CH, Sakthidasan A, Sundar R, Senthil Kumar M, Rajakumar P, Baburao P

Pages: 134-144

PDF Full Text
Abstract

The performance of power distribution systems (PDS) has improved greatly in recent times ever since the distributed generation (DG) unit was incorporated in PDS. DG integration effectively cuts down the line power losses (PL) and strengthens the bus voltages (BV) provided the size and place are optimized. Accordingly, in the present work, a hybrid optimization technique is implemented for incorporating a single DG unit into radial PDS. The proposed hybrid method is formed by integrating the active power loss sensitivity (APLS) index and whale optimization meta-heuristic algorithm. The ideal place and size for DG are optimized to minimize total real power losses (TLP) and enhance bus voltages (BV). The applicability of the proposed hybrid technique is analyzed for Type I and Type III DG installation in a balanced IEEE 33-bus and 69-bus radial PDS. Optimal inclusion of type I and III DG in a 33-bus radial test system cut down TLP by 51.85% and 70.02% respectively. Likewise, optimal placement of type I and III DG reduced TLP by 65.18%, and 90.40%, respectively for 69-bus radial PDS. The impact of DG installation on the performance of radial PDS has been analyzed and a comparative study is also presented to examine the sovereignty of the proposed hybrid method. The comparative study report outlined that the proposed hybrid method can be a better choice for solving DG optimization in radial PDS.

Article
Optimal Learning Controller Design Using Particle Swarm Optimization: Applied to CSI System

Khulood Moosa Omran, Abdul-Basset A. Al- Hussein, Basil Hani Jassim

Pages: 104-112

PDF Full Text
Abstract

In this article, a PD-type iterative learning control algorithm (ILC) is proposed to a nonlinear time-varying system for cases of measurement disturbances and the initial state errors. The proposed control approach uses a simple structure and has an easy implementation. The iterative learning controller was utilized to control a constant current source inverter (CSI) with pulse width modulation (PWM); subsequently the output current trajectory converged the sinusoidal reference signal and provided constant switching frequency. The learning controller's parameters were tuned using particle swarm optimization approach to get best optimal control for the system output. The tracking error limit is achieved using the convergence exploration. The proposed learning control scheme was robust against the error in initial conditions and disturbances which outcome from the system modeling inaccuracies and uncertainties. It could correct the distortion of the inverter output current waveform with less computation and less complexity. The proposed algorithm was proved mathematically and through computer simulation. The proposed optimal learning method demonstrated good performances.

Article
A Content-Based Image Retrieval Method By Exploiting Cluster Shapes

Hanan Al-Jubouri, Hongbo Du

Pages: 90-102

PDF Full Text
Abstract

Content-Based Image Retrieval (CBIR) is an automatic process of retrieving images that are the most similar to a query image based on their visual content such as colour and texture features. However, CBIR faces the technical challenge known as the semantic gap between high level conceptual meaning and the low-level image based features. This paper presents a new method that addresses the semantic gap issue by exploiting cluster shapes. The method first extracts local colours and textures using Discrete Cosine Transform (DCT) coefficients. The Expectation-Maximization Gaussian Mixture Model (EM/GMM) clustering algorithm is then applied to the local feature vectors to obtain clusters of various shapes. To compare dissimilarity between two images, the method uses a dissimilarity measure based on the principle of Kullback-Leibler divergence to compare pair-wise dissimilarity of cluster shapes. The paper further investigates two respective scenarios when the number of clusters is fixed and adaptively determined according to cluster quality. Experiments are conducted on publicly available WANG and Caltech6 databases. The results demonstrate that the proposed retrieval mechanism based on cluster shapes increases the image discrimination, and when the number of clusters is fixed to a large number, the precision of image retrieval is better than that when the relatively small number of clusters is adaptively determined.

Article
Ant Colony Algorithm (ACO) Applied for Tuning PI of Shunt Active Power Filter (SAPF)

Raheel Jawad, Rawaa Jawad, Zahraa Salman

Pages: 204-211

PDF Full Text
Abstract

In the present-day decade, the world has regarded an expansion in the use of non-linear loads. These a lot draw harmonic non- sinusoidal currents and voltages in the connection factor with the utility and distribute them with the useful resource of the overall performance of it. The propagation of these currents and voltages into the grids have an effect on the electricity constructions in addition to the one of various client equipment. As a result, the electrical strength notable has come to be critical trouble for each client and distributor of electrical power. Active electrical electricity filters have been proposed as environment splendid gear for electrical power pinnacle notch enchantment and reactive electrical strength compensation. Active Power Filters (APFs) have Flipped out to be a possible wish in mitigating the harmonics and reactive electrical electricity compensation in single-phase and three-phase AC electrical energy networks with Non-Linear Loads (NLLs). Conventionally, this paper applied Ant Colony Algorithm (ACO) for tuning PI and reduce Total Harmonic Distortion (THD). The result show reduces THD at 2.33%.

Article
Power Transformer Protection by Using Fuzzy Logic

Ahmed Abdulkader Aziz, Abduladhem Abdulkareem Ali, Abbas H. Abbas

Pages: 1-11

PDF Full Text
Abstract

Power transformer protective relay should block the tripping during magnetizing inrush and rapidly operate the tripping during internal faults. Recently, the frequency environment of power system has been made more complicated and the quantity of 2nd frequency component in inrush state has been decreased because of the improvement of core steel. And then, traditional approaches will likely be maloperated in the case of magnetizing inrush with low second harmonic component and internal faults with high second harmonic component. This paper proposes a new relaying algorithm to enhance the fault detection sensitivities of conventional techniques by using a fuzzy logic approach. The proposed fuzzy-based relaying algorithm consists of flux-differential current derivative curve, harmonic restraint, and percentage differential characteristic curve. The proposed relaying was tested with MATLAB simulation software and showed a fast and accurate trip operation.

Article
Classification Algorithms for Determining Handwritten Digit

Hayder Naser Khraibet AL-Behadili

Pages: 96-102

PDF Full Text
Abstract

Data-intensive science is a critical science paradigm that interferes with all other sciences. Data mining (DM) is a powerful and useful technology with wide potential users focusing on important meaningful patterns and discovers a new knowledge from a collected dataset. Any predictive task in DM uses some attribute to classify an unknown class. Classification algorithms are a class of prominent mathematical techniques in DM. Constructing a model is the core aspect of such algorithms. However, their performance highly depends on the algorithm behavior upon manipulating data. Focusing on binarazaition as an approach for preprocessing, this paper analysis and evaluates different classification algorithms when construct a model based on accuracy in the classification task. The Mixed National Institute of Standards and Technology (MNIST) handwritten digits dataset provided by Yann LeCun has been used in evaluation. The paper focuses on machine learning approaches for handwritten digits detection. Machine learning establishes classification methods, such as K-Nearest Neighbor(KNN), Decision Tree (DT), and Neural Networks (NN). Results showed that the knowledge-based method, i.e. NN algorithm, is more accurate in determining the digits as it reduces the error rate. The implication of this evaluation is providing essential insights for computer scientists and practitioners for choosing the suitable DM technique that fit with their data.

Article
An ABC Optimized Adaptive Fuzzy Sliding Mode Control Strategy for Full Vehicle Active Suspension System

Atheel K. Abdul Zahra, Turki Y. Abdalla

Pages: 151-165

PDF Full Text
Abstract

This work presents a Fuzzy based adaptive Sliding Mode Control scheme to deal with control problem of full vehicle active suspension system and take into consideration the nonlinearities of the spring and damper, unmodeled dynamics as well as the external disturbances. The control law of fuzzy based adaptive Sliding Mode Control scheme will update the parameters of fuzzy sliding mode control by using the stability analysis of Lyapunov criteria such that the convergence in finite time and the stability of the closed loop are ensured. The proposed control scheme consists of four similar subsystems used for the four sides of the vehicle. The sub control scheme contains two loops, the outer loop is built using sliding mode controller with fuzzy estimator to approximate and estimate the unknown parameters in the system. In the inner loop, a controller of type Fractional Order PID (FOPID) is utilized to create the required actuator force. All parameters in the four sub control schemes are optimized utilizing Artificial Bee Colony (ABC) algorithm in order to improve the performance. The results indicate the effectiveness and good achievement of the proposed controller in providing the best ability to limit the vibration with good robustness properties in comparison with passive suspension system and using sliding mode control method. The controlled suspension system shows excellent results when it was tested with and without typical breaking and bending torques.

Article
Emotion Recognition Based on Mining Sub-Graphs of Facial Components

Suhaila N. Mohammed, Alia K. Abdul Hassan

Pages: 39-48

PDF Full Text
Abstract

Facial emotion recognition finds many real applications in the daily life like human robot interaction, eLearning, healthcare, customer services etc. The task of facial emotion recognition is not easy due to the difficulty in determining the effective feature set that can recognize the emotion conveyed within the facial expression accurately. Graph mining techniques are exploited in this paper to solve facial emotion recognition problem. After determining positions of facial landmarks in face region, twelve different graphs are constructed using four facial components to serve as a source for sub-graphs mining stage using gSpan algorithm. In each group, the discriminative set of sub-graphs are selected and fed to Deep Belief Network (DBN) for classification purpose. The results obtained from the different groups are then fused using Naïve Bayes classifier to make the final decision regards the emotion class. Different tests were performed using Surrey Audio-Visual Expressed Emotion (SAVEE) database and the achieved results showed that the system gives the desired accuracy (100%) when fusion decisions of the facial groups. The achieved result outperforms state-of-the-art results on the same database.

Article
Study of Chaotic-based Audio Encryption Algorithms: A Review

Alaa Shumran, Abdul-Basset A. Al-Hussein

Pages: 85-103

PDF Full Text
Abstract

Nowadays, multimedia communication has become very widespread and this requires it to be protected from attackers and transmitted securely for reliability. Encryption and decryption techniques are useful in providing effective security for speech signals to ensure that these signals are transmitted with secure data and prevent third parties or the public from reading private messages. Due to the rapid improvement in digital communications over the recent period up to the present, the security of voice data transmitted over various networks has been classified as a favored field of study in earlier years. The contributions to audio encryption are discussed in this review. This Comprehensive review mainly focuses on presenting several kinds of methods for audio encryption and decryption the analysis of these methods with their advantages and disadvantages have been investigated thoroughly. It will be classified into encryption based on traditional methods and encryption based on advanced chaotic systems. They are divided into two types, continuous-time system, and discrete-time system, and also classified based on the synchronization method and the implementation method. In the fields of information and communications security, system designers face many challenges in both cost, performance, and architecture design, Field Programmable gate arrays (FPGAs) provide an excellent balance between computational power and processing flexibility. In addition, encryption methods will be classified based on Chaos-based Pseudo Random Bit Generator, Fractional-order systems, and hybrid chaotic generator systems, which is an advantageous point for this review compared with previous ones. Audio algorithms are presented, discussed, and compared, highlighting important advantages and disadvantages. Audio signals have a large volume and a strong correlation between data samples. Therefore, if traditional cryptography systems are used to encrypt such huge data, they gain significant overhead. Standard symmetric encryption systems also have a small key-space, which makes them vulnerable to attacks. On the other hand, encryption by asymmetric algorithms is not ideal due to low processing speed and complexity. Therefore, great importance has been given to using chaotic theory to encode audio files. Therefore, when proposing an appropriate encryption method to ensure a high degree of security, the key space, which is the critical part of every encryption system, and the key sensitivity must be taken into account. The key sensitivity is related to the initial values and control variables of the chaotic system chosen as the audio encryption algorithm. In addition, the proposed algorithm should eliminate the problems of periodic windows, such as limited chaotic range and non-uniform distribution, and the quality of the recovered audio signal remains good, which confirms the convenience, reliability, and high security.

Article
Restoration of Noisy Blurred Images Using MFPIA and Discrete Wavelet Transform

Dunia S. Tahir

Pages: 1-15

PDF Full Text
Abstract

In this paper, image deblurring and denoising are presented. The used images were blurred either with Gaussian or motion blur and corrupted either by Gaussian noise or by salt & pepper noise. In our algorithm, the modified fixed-phase iterative algorithm (MFPIA) is used to reduce the blur. Then a discrete wavelet transform is used to divide the image into two parts. The first part represents the approximation coefficients. While the second part represents the detail coefficients, that a noise is removed by using the BayesShrink wavelet thresholding method.

Article
Autonomous Navigation of Mobile Robot Based on Flood Fill Algorithm

Ayad Mohammed Jabbar

Pages: 79-84

PDF Full Text
Abstract

The autonomous navigation of robots is an important area of research. It can intelligently navigate itself from source to target within an environment without human interaction. Recently, algorithms and techniques have been made and developed to improve the performance of robots. It’s more effective and has high precision tasks than before. This work proposed to solve a maze using a Flood fill algorithm based on real time camera monitoring the movement on its environment. Live video streaming sends an obtained data to be processed by the server. The server sends back the information to the robot via wireless radio. The robot works as a client device moves from point to point depends on server information. Using camera in this work allows voiding great time that needs it to indicate the route by the robot.

Article
Optimized Sliding Mode Control of Three-Phase Four-Switch Inverter BLDC Motor Drive Using LFD Algorithm

Quasy S. Kadhim, Abbas H. Abbas, Mohammed M. Ezzaldean

Pages: 129-139

PDF Full Text
Abstract

This paper presents a low-cost Brushless DC (BLDC) motor drive system with fewer switches. BLDC motors are widely utilized in variable speed drives and industrial applications due to their high efficiency, high power factor, high torque, low maintenance, and ease of control. The proposed control strategy for robust speed control is dependent on two feedback signals which are speed sensor loop which is regulated by Sliding Mode Controller (SMC) and current sensor loop which is regulated by Proportional-Integral (PI) for boosting the drive system adaptability. In this work, the BLDC motor is driven by a four-switch three-phase inverter emulating a three-phase six switch inverter, to reduce switching losses with a low complex control strategy. In order to reach a robust performance of the proposed control strategy, the Lévy Flight Distribution (LFD) technique is used to tune the gains of PI and SMC parameters. The Integral Time Absolute Error (ITAE) is used as a fitness function. The simulation results show the SMC with LFD technique has superiority over conventional SMC and optimization PI controller in terms of fast-tracking to the desired value, reduction speed error to the zero value, and low overshoot under sudden change conditions.

Article
Speed Control of BLDC Motor Based on Recurrent Wavelet Neural Network

Adel A. Obed, Ameer L. Saleh

Pages: 118-129

PDF Full Text
Abstract

In recent years, artificial intelligence techniques such as wavelet neural network have been applied to control the speed of the BLDC motor drive. The BLDC motor is a multivariable and nonlinear system due to variations in stator resistance and moment of inertia. Therefore, it is not easy to obtain a good performance by applying conventional PID controller. The Recurrent Wavelet Neural Network (RWNN) is proposed, in this paper, with PID controller in parallel to produce a modified controller called RWNN-PID controller, which combines the capability of the artificial neural networks for learning from the BLDC motor drive and the capability of wavelet decomposition for identification and control of dynamic system and also having the ability of self-learning and self-adapting. The proposed controller is applied for controlling the speed of BLDC motor which provides a better performance than using conventional controllers with a wide range of speed. The parameters of the proposed controller are optimized using Particle Swarm Optimization (PSO) algorithm. The BLDC motor drive with RWNN-PID controller through simulation results proves a better in the performance and stability compared with using conventional PID and classical WNN-PID controllers.

Article
A Study of the Optimal Allocation of Shunt Capacitor Based on Modified Loss Sensitivity Algorithm

Warid Sayel Warid, Emad Allawi Mohsin

Pages: 56-61

PDF Full Text
Abstract

Minimization of active power losses is one of the essential aims for any electric utility, due to its importance in improvement of system properties towards minimum production cost and to support increase load requirement. In this paper we have studied the possibility of reducing the value of real power losses for (IEEE-14- Bus bar) global system transmission lines by choosing the best location to install shunt capacitor depending on new algorithm for calculate the optimal allocation, which considering the value of real power losses derivative with injection reactive power as an indicator of the ability of reducing losses at load buses. The results show the validity of this method for application in electric power transmission lines.

Article
LabVIEW Venus Flytrap ANFIS Inverse Control System for Microwave Heating Cavity

Wasan A. Wali, Atheel K. Abdul Zahra, Hanady S. Ahmed

Pages: 189-198

PDF Full Text
Abstract

Growing interests in nature-inspired computing and bio-inspired optimization techniques have led to powerful tools for solving learning problems and analyzing large datasets. Several methods have been utilized to create superior performance-based optimization algorithms. However, certain applications, like nonlinear real-time, are difficult to explain using accurate mathematical models. Such large-scale combination and highly nonlinear modeling problems are solved by usage of soft computing techniques. So, in this paper, the researchers have tried to incorporate one of the most advanced plant algorithms known as Venus Flytrap Plant algorithm(VFO) along with soft-computing techniques and, to be specific, the ANFIS inverse model-Adaptive Neural Fuzzy Inference System for controlling the real-time temperature of a microwave cavity that heats oil. The MATLAB was integrated successfully with the LabVIEW platform. Wide ranges of input and output variables were experimented with. Problems were encountered due to heating system conditions like reflected power, variations in oil temperature, and oil inlet absorption and cavity temperatures affecting the oil temperature, besides the temperature’s effect on viscosity. The LabVIEW design followed and the results figure in the performance of the VFO- Inverse ANFIS controller.

Article
Indoor Low Cost Assistive Device using 2D SLAM Based on LiDAR for Visually Impaired People

Heba Hakim, Ali Fadhil

Pages: 115-121

PDF Full Text
Abstract

Many assistive devices have been developed for visually impaired (VI) person in recent years which solve the problems that face VI person in his/her daily moving. Most of researches try to solve the obstacle avoidance or navigation problem, and others focus on assisting VI person to recognize the objects in his/her surrounding environment. However, a few of them integrate both navigation and recognition capabilities in their system. According to above needs, an assistive device is presented in this paper that achieves both capabilities to aid the VI person to (1) navigate safely from his/her current location (pose) to a desired destination in unknown environment, and (2) recognize his/her surrounding objects. The proposed system consists of the low cost sensors Neato XV-11 LiDAR, ultrasonic sensor, Raspberry pi camera (CameraPi), which are hold on a white cane. Hector SLAM based on 2D LiDAR is used to construct a 2D-map of unfamiliar environment. While A* path planning algorithm generates an optimal path on the given 2D hector map. Moreover, the temporary obstacles in front of VI person are detected by an ultrasonic sensor. The recognition system based on Convolution Neural Networks (CNN) technique is implemented in this work to predict object class besides enhance the navigation system. The interaction between the VI person and an assistive system is done by audio module (speech recognition and speech synthesis). The proposed system performance has been evaluated on various real-time experiments conducted in indoor scenarios, showing the efficiency of the proposed system.

Article
An Adaptive Steganography Insertion Technique Based on Cosine Transform

Taif Alobaidi, Wasfy Mikhael

Pages: 45-58

PDF Full Text
Abstract

In the last couple decades, several successful steganography approaches have been proposed. Least Significant Bit (LSB) Insertion technique has been deployed due to its simplicity in implementation and reasonable payload capacity. The most important design parameter in LSB techniques is the embedding location selection criterion. In this work, LSB insertion technique is proposed which is based on selecting the embedding locations depending on the weights of coefficients in Cosine domain (2D DCT). The cover image is transformed to the Cosine domain (by 2D DCT) and predefined number of coefficients are selected to embed the secret message (which is in the binary form). Those weights are the outputs of an adaptive algorithm that analyses the cover image in two domains (Haar and Cosine). Coefficients, in the Cosine transform domain, with small weights are selected. The proposed approach is tested with samples from the BOSSbase, and a custom-built databases. Two metrics are utilized to show the effectiveness of the technique, namely, Root Mean Squared Error (RMSE), and Peak Signal-to-Noise Ratio (PSNR). In addition, human visual inspection of the result image is also considered. As shown in the results, the proposed approach performs better, in terms of (RMSE, and PSNR) than commonly employed truncation and energy based methods.

Article
Vehicle Remote Support and Surveillance System

Ahmed J. Abid, Ramzy S. Ali, Rafah A. Saheb

Pages: 55-63

PDF Full Text
Abstract

the proposed design offers a complete solution to support and surveillance vehicles remotely. The offered algorithm allows a monitoring center to track vehicles; diagnoses fault remotely, control the traffic and control CO emission. The system is programmed to scan the on-board diagnostic OBD periodically or based on request to check if there are any faults and read all the available sensors, then make an early fault prediction based on the sensor readings, an experience with the vehicle type and fault history. It is so useful for people who are not familiar with fault diagnosis as well as the maintenance center. The system offers tracking the vehicle remotely, which protects it against theft and warn the driver if it exceeds the speed limit according to its location. Finally, it allows the user to report any traffic congestion and allow s a vehicle navigator to be up to date with the traffic condition based on the other system’s user feedback.

Article
Securing Wireless Sensor Network (WSN) Using Embedded Intrusion Detection Systems

Qutaiba I. Ali* Sahar Lazim Enaam Fathi

Pages: 54-64

PDF Full Text
Abstract

This paper focuses on designing distributed wireless sensor network gateways armed with Intrusion Detection System (IDS). The main contribution of this work is the attempt to insert IDS functionality into the gateway node (UBICOM IP2022 network processor chip) itself. This was achieved by building a light weight signature based IDS based on the famous open source SNORT IDS. Regarding gateway nodes, as they have limited processing and energy constrains, the addition of further tasks (the IDS program) may affects seriously on its performance, so that, the current design takes these constrains into consideration as a priority and use a special protocol to achieve this goal. In order to optimize the performance of the gateway nodes, some of the preprocessing tasks were offloaded from the gateway nodes to a suggested classification and processing server and a new searching algorithm was suggested. Different measures were taken to validate the design procedure and a detailed simulation model was built to discover the behavior of the system in different environments.

Article
Neural Network-Based Adaptive Control of Robotic Manipulator: Application to a Three Links Cylindrical Robot

Abdul-Basset A. AL-Hussein

Pages: 114-122

PDF Full Text
Abstract

A composite PD and sliding mode neural network (NN)-based adaptive controller, for robotic manipulator trajectory tracking, is presented in this paper. The designed neural networks are exploited to approximate the robotics dynamics nonlinearities, and compensate its effect and this will enhance the performance of the filtered error based PD and sliding mode controller. Lyapunov theorem has been used to prove the stability of the system and the tracking error boundedness. The augmented Lyapunov function is used to derive the NN weights learning law. To reduce the effect of breaching the NN learning law excitation condition due to external disturbances and measurement noise; a modified learning law is suggested based on e-modification algorithm. The controller effectiveness is demonstrated through computer simulation of cylindrical robot manipulator.

Article
Image Hiding Using Variable Length Least Significant Bits Embedding

Abbas A. Jasim

Pages: 15-0

PDF Full Text
Abstract

In this work a new hiding system is proposed. It is based on Least Significant Bits (LSB) embedding of secrete image into another cover image. The proposed hiding algorithm embeds the secrete image bits in the least significant bits of the cover image pixels such that the number of secrete image bits that are embedded in least significant bits of cover image pixel is variable and determined randomly. Such cover image pixel may contain no secrete information bit, one bit, two bits , or three bits according to the pseudo random number generator that generates integer numbers randomly between 0 and 3. The resulting image (the cover image within which the secret image is hidden) is called stego_image. Stego_image is closely related to the cover image and does not show any details of the secret information. It ensures that the eavedroppers will not have any suspicion that message bits are hidden in the image. The proposed system achieves perfect reconstruction of the secret message.

Article
Series and Parallel Arc Fault Detection in Electrical Buildings Based on Discrete Wavelet Theory

Elaf Abed Saeed, Khalid M. Abdulhassan, Osama Y. K. Al-Atbee

Pages: 94-101

PDF Full Text
Abstract

Electrical issues such as old wires and faulty connections are the most common causes of arc faults. Arc faults cause electrical fires by generating high temperatures and discharging molten metal. Every year, such fires cause a considerable deal of destruction and loss. This paper proposes a new method for detecting residential series and parallel arc faults. A simulation model for the arc is employed to simulate the arc faults in series and parallel circuits. The fault features are then retrieved using a signal processing approach called Discrete Wavelet Transform (DWT) designed in MATLAB/Simulink based on the fault detection algorithm. Then db2 and one level were found appropriate mother and level of wavelet transform for extracting arc-fault features. MATLAB Simulink was used to build and simulate the arc-fault model.

Article
A Study on Pre-processing Algorithms for Metal Parts Inspection

Haider Sh. Hashim, Anton Satria Prabuwono, Siti Norul Huda Sheikh Abdullah

Pages: 1-4

PDF Full Text
Abstract

Pre-processing is very useful in a variety of situations since it helps to suppress information that is not related to the exact image processing or analysis task. Mathematical morphology is used for analysis, understanding and image processing. It is an influential method in the geometric morphological analysis and image understanding. It has befallen a new theory in the digital image processing domain. Edges detection and noise reduction are a crucial and very important pre-processing step. The classical edge detection methods and filtering are less accurate in detecting complex edge and filtering various types of noise. This paper proposed some useful mathematic morphological techniques to detect edge and to filter noise in metal parts image. The experimental result showed that the proposed algorithm helps to increase accuracy of metal parts inspection system.

Article
Building A Control Unit of A Series-Parallel Hybrid Electric Vehicle by Using A Nonlinear Model Predictive Control (NMPC) Strategy

Maher Al-Flehawee, Auday Al-Mayyahi

Pages: 93-102

PDF Full Text
Abstract

Hybrid electric vehicles have received considerable attention because of their ability to improve fuel consumption compared to conventional vehicles. In this paper, a series-parallel hybrid electric vehicle is used because they combine the advantages of the other two configurations. In this paper, the control unit for a series-parallel hybrid electric vehicle is implemented using a Nonlinear Model Predictive Control (NMPC) strategy. The NMPC strategy needs to create a vehicle energy management optimization problem, which consists of the cost function and its constraints. The cost function describes the required control objectives, which are to improve fuel consumption and obtain a good dynamic response to the required speed while maintaining a stable value of the state of charge (SOC) for batteries. While the cost function is subject to the physical constraints and the mathematical prediction model that evaluate vehicle's behavior based on the current vehicle measurements. The optimization problem is solved at each sampling step using the (SQP) algorithm to obtain the optimum operating points of the vehicle's energy converters, which are represented by the torque of the vehicle components.

Article
Region-Based Fractional Wavelet Transform Using Post Processing Artifact Reduction

Jassim M. Abdul-Jabbar, Alyaa Q. Ahmed Taqi

Pages: 45-53

PDF Full Text
Abstract

Wavelet-based algorithms are increasingly used in the source coding of remote sensing, satellite and other geospatial imagery. At the same time, wavelet-based coding applications are also increased in robust communication and network transmission of images. Although wireless multimedia sensors are widely used to deliver multimedia content due to the availability of inexpensive CMOS cameras, their computational and memory resources are still typically very limited. It is known that allowing a low-cost camera sensor node with limited RAM size to perform a multi-level wavelet transform, will in return limit the size of the acquired image. Recently, fractional wavelet filter technique became an interesting solution to reduce communication energy and wireless bandwidth, for resource-constrained devices (e.g. digital cameras). The reduction in the required memory in these fractional wavelet transforms is achieved at the expense of the image quality. In this paper, an adaptive fractional artifacts reduction approach is proposed for efficient filtering operations according to the desired compromise between the effectiveness of artifact reduction and algorithm simplicity using some local image features to reduce boundaries artifacts caused by fractional wavelet. Applying such technique on different types of images with different sizes using CDF 9/7 wavelet filters results in a good performance.

Article
Understanding Power Gating Mechanism Based on Workload Classification of Modern Heterogeneous Many-Core Mobile Platform in the Dark Silicon Era

Haider Alrudainy, Ali K. Marzook, Muaad Hussein, Rishad Shafik

Pages: 275-283

PDF Full Text
Abstract

The rapid progress in mobile computing necessitates energy efficient solutions to support substantially diverse and complex workloads. Heterogeneous many core platforms are progressively being adopted in contemporary embedded implementations for high performance at low power cost estimations. These implementations experience diverse workloads that offer drastic opportunities to improve energy efficiency. In this paper, we propose a novel per core power gating (PCPG) approach based on workload classifications (WLC) for drastic energy cost minimization in the dark silicon era. Core of our paradigm is to use an integrated sleep mode management based on workloads classification indicated by the performance counters. A number of real applications benchmark (PARSEC) are adopted as a practical example of diverse workloads, including memory- and CPU-intensive ones. In this paper, these applications are exercised on Samsung Exynos 5422 heterogeneous many core system showing up to 37% to 110% energy efficient when compared with our most recent published work, and ondemand governor, respectively. Furthermore, we illustrate low-complexity and low-cost runtime per core power gating algorithm that consistently maximize IPS/Watt at all state space.

Article
Human Activity and Gesture Recognition Based on WiFi Using Deep Convolutional Neural Networks

Sokienah K. Jawad, Musaab Alaziz

Pages: 110-116

PDF Full Text
Abstract

WiFi-based human activity and gesture recognition explore the interaction between the human hand or body movements and the reflected WiFi signals to identify various activities. This type of recognition has received much attention in recent years since it does not require wearing special sensors or installing cameras. This paper aims to investigate human activity and gesture recognition schemes that use Channel State Information (CSI) provided by WiFi devices. To achieve high accuracy in the measurement, deep learning models such as AlexNet, VGG 19, and SqueezeNet were used for classification and extracting features automatically. Firstly, outliers are removed from the amplitude of each CSI stream during the preprocessing stage by using the Hampel identifier algorithm. Next, the RGB images are created for each activity to feed as input to Deep Convolutional Neural Networks. After that, data augmentation is implemented to reduce the overfitting problems in deep learning models. Finally, the proposed method is evaluated on a publicly available dataset called WiAR, which contains 10 volunteers, each of whom executes 16 activities. The experiment results demonstrate that AlexNet, VGG19, and SqueezeNet all have high recognition accuracy of 99.17 %, 96.25%, and 100 %, respectively.

Article
Hover Control for Helicopter Using Neural Network-Based Model Reference Adaptive Controller

Abdul-Basset A. Al-Hussein

Pages: 67-72

PDF Full Text
Abstract

Unmanned aerial vehicles (UAV), have enormous important application in many fields. Quanser three degree of freedom (3-DOF) helicopter is a benchmark laboratory model for testing and validating the validity of various flight control algorithms. The elevation control of a 3-DOF helicopter is a complex task due to system nonlinearity, uncertainty and strong coupling dynamical model. In this paper, an RBF neural network model reference adaptive controller has been used, employing the grate approximation capability of the neural network to match the unknown and nonlinearity in order to build a strong MRAC adaptive control algorithm. The control law and stable neural network updating law are determined using Lyapunov theory.

Article
Automatic Storage and Retrieval System using the Optimal Path Algorithm

Hanan M. Hameed, Abdulmuttalib Turky Rashid, Kharia A. Al Amry

Pages: 125-133

PDF Full Text
Abstract

The demand for application of mobile robots in performing boring and extensive tasks are increasing rapidly due to unavailability of human workforce. Navigation by humans within the warehouse is one among such repetitive and exhaustive task. Autonomous navigation of mobile robots for picking and dropping the shelves within the warehouse will save time and money for the warehousing business. Proposing an optimization model for automated storage and retrieval systems by the goals of its planning is investigated to minimize travel time in multi-robot systems. This paper deals with designing a system for storing and retrieving a group of materials within an environment arranged in rows and columns. Its intersections represent storage locations. The title of any subject is indicated by the row number and the column in it. A method was proposed to store and retrieve a set of requests (materials) using a number of robots as well as one receiving and delivery port. Several simulation results are tested to show this improvement in length of path and time of arrival.

Article
EEG Motor-Imagery BCI System Based on Maximum Overlap Discrete Wavelet Transform (MODWT) and Machine learning algorithm

Samaa S. Abdulwahab, Hussain K. Khleaf, Manal H. Jassim

Pages: 38-45

PDF Full Text
Abstract

The ability of the human brain to communicate with its environment has become a reality through the use of a Brain-Computer Interface (BCI)-based mechanism. Electroencephalography (EEG) has gained popularity as a non-invasive way of brain connection. Traditionally, the devices were used in clinical settings to detect various brain diseases. However, as technology advances, companies such as Emotiv and NeuroSky are developing low-cost, easily portable EEG-based consumer-grade devices that can be used in various application domains such as gaming, education. This article discusses the parts in which the EEG has been applied and how it has proven beneficial for those with severe motor disorders, rehabilitation, and as a form of communicating with the outside world. This article examines the use of the SVM, k-NN, and decision tree algorithms to classify EEG signals. To minimize the complexity of the data, maximum overlap discrete wavelet transform (MODWT) is used to extract EEG features. The mean inside each window sample is calculated using the Sliding Window Technique. The vector machine (SVM), k-Nearest Neighbor, and optimize decision tree load the feature vectors.

1 - 100 of 138 items 1 2 > >> 

Search Parameters

Journal Logo
Iraqi Journal for Electrical and Electronic Engineering

College of Engineering, University of Basrah

  • Copyright Policy
  • Terms & Conditions
  • Privacy Policy
  • Accessibility
  • Cookie Settings
Licensing & Open Access

CC BY 4.0 Logo Licensed under CC-BY-4.0

This journal provides immediate open access to its content.

Editorial Manager Logo Elsevier Logo

Peer-review powered by Elsevier’s Editorial Manager®

Copyright © 2025 College of Engineering, University of Basrah. All rights reserved, including those for text and data mining, AI training, and similar technologies.