Iraqi Journal for Electrical and Electronic Engineering
Login
Iraqi Journal for Electrical and Electronic Engineering
  • Home
  • Articles & Issues
    • Latest Issue
    • All Issues
  • Authors
    • Submit Manuscript
    • Guide for Authors
    • Authorship
    • Article Processing Charges (APC)
    • Proofreading Service
  • Reviewers
    • Guide for Reviewers
    • Become a Reviewer
  • About
    • About Journal
    • Aims and Scope
    • Editorial Team
    • Journal Insights
    • Peer Review Process
    • Publication Ethics
    • Plagiarism
    • Allegations of Misconduct
    • Appeals and Complaints
    • Corrections and Withdrawals
    • Open Access
    • Archiving Policy
    • Abstracting and indexing
    • Announcements
    • Contact

Search Results for architecture

Article
A New Hardware Architecture for Fuzzy Logic System Acceleration

Aumalhuda Gani Abood, Mohammed A. Jodha, Majid A. Alwan

Pages: 188-197

PDF Full Text
Abstract

In this work, a new architecture is designed for fuzzy logic system. The proposed architecture is implemented on field programed gate array (FPGA). The hardware designed fuzzy systemimproves the excution speed with very high speed up factor using low cost availble kits such as FPGA. The implementation of the proposed architecture uses very low amount of logic elements and logic array blocks as proven when implementing the proposed architucture on FPGA.

Article
A Multiplier-less Implementation of Two-Dimensional Circular-Support Wavelet Transform on FPGA

Jassim M. Abdul-Jabbar, Zahraa Talal Abede, Akram A. Dawood

Pages: 16-28

PDF Full Text
Abstract

In this paper, a two-dimensional (2-D) circular-support wavelet transform (2-D CSWT) is presented. 2-D CSWT is a new geometrical image transform, which can efficiently represent images using 2-D circular spectral split schemes (circularly- decomposed frequency subspaces). 2-D all-pass functions and lattice structure are used to produce 1-level circular symmetric 2-D discrete wavelet transform with approximate linear phase 2-D filters. The classical one-dimensional (1-D) analysis Haar filter bank branches H 0 (z) and H 1 (z) which work as low-pass and high-pass filters, respectively are transformed into their 2-D counterparts H 0 (z 1 ,z 2 ) and H 1 (z 1 ,z 2 ) by applying a circular-support version of the digital spectral transformation (DST). The designed 2-D wavelet filter bank is realized in a separable architecture. The proposed architecture is simulated using Matlab program to measure the deflection ratio (DR) of the high frequency coefficient to evaluate its performance and compare it with the performance of the classical 2-D wavelet architecture. The correlation factor between the input and reconstructed images is also calculated for both architectures. The FPGA (Spartan-3E) Kit is used to implement the resulting architecture in a multiplier-less manner and to calculate the die area and the critical path or maximum frequency of operation. The achieved multiplier-less implementation takes a very small area from FPGA Kit (the die area in 3-level wavelet decomposition takes 300 slices with 7% occupation ratio only at a maximum frequency of 198.447 MHz).

Article
Simulation & Performance Study of Wireless Sensor Network (WSN) Using MATLAB

Qutaiba Ibrahem Ali, Akram Abdulmaowjod, Hussein Mahmood Mohammed

Pages: 112-119

PDF Full Text
Abstract

A wireless sensor network consists of spatially distributed autonomous sensors to cooperatively monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants. Different approaches have used for simulation and modeling of SN (Sensor Network) and WSN. Traditional approaches consist of various simulation tools based on different languages such as C, C++ and Java. In this paper, MATLAB (7.6) Simulink was used to build a complete WSN system. Simulation procedure includes building the hardware architecture of the transmitting nodes, modeling both the communication channel and the receiving master node architecture. Bluetooth was chosen to undertake the physical layer communication with respect to different channel parameters (i.e., Signal to Noise ratio, Attenuation and Interference). The simulation model was examined using different topologies under various conditions and numerous results were collected. This new simulation methodology proves the ability of the Simulink MATLAB to be a useful and flexible approach to study the effect of different physical layer parameters on the performance of wireless sensor networks.

Article
Reduced Area and Low Power Implementation of FFT/IFFT Processor

Shefa A. Dawwd, Suha. M. Nori

Pages: 108-119

PDF Full Text
Abstract

The Fast Fourier Transform (FFT) and Inverse FFT(IFFT) are used in most of the digital signal processing applications. Real time implementation of FFT/IFFT is required in many of these applications. In this paper, an FPGA reconfigurable fixed point implementation of FFT/IFFT is presented. A manually VHDL codes are written to model the proposed FFT/IFFT processor. Two CORDIC-based FFT/IFFT processors based on radix-2and radix-4 architecture are designed. They have one butterfly processing unit. An efficient In-place memory assignment and addressing for the shared memory of FFT/IFFT processors are proposed to reduce the complexity of memory scheme. With "in-place" strategy, the outputs of butterfly operation are stored back to the same memory location of the inputs. Because of using DIF FFT, the output was to be in reverse order. To solve this issue, we have re-use the block RAM that used for storing the input sample as reordering unit to reduce hardware cost of the proposed processor. The Spartan-3E FPGA of 500,000 gates is employed to synthesize and implement the proposed architecture. The CORDIC based processors can save 40% of power consumption as compared with Xilinx logic core architectures of system generator.

Article
Semantic Segmentation of Aerial Images Using U-Net Architecture

Sarah Kamel Hussein, Khawla Hussein Ali

Pages: 58-63

PDF Full Text
Abstract

Arial images are very high resolution. The automation for map generation and semantic segmentation of aerial images are challenging problems in semantic segmentation. The semantic segmentation process does not give us precise details of the remote sensing images due to the low resolution of the aerial images. Hence, we propose an algorithm U-Net Architecture to solve this problem. It is classified into two paths. The compression path (also called: the encoder) is the first path and is used to capture the image's context. The encoder is just a convolutional and maximal pooling layer stack. The symmetric expanding path (also called: the decoder) is the second path, which is used to enable exact localization by transposed convolutions. This task is commonly referred to as dense prediction, which is completely connected to each other and also with the former neurons which gives rise to dense layers. Thus it is an end-to-end fully convolutional network (FCN), i.e. it only contains convolutional layers and does not contain any dense layer because of which it can accept images of any size. The performance of the model will be evaluated by improving the image using the proposed method U-NET and obtaining an improved image by measuring the accuracy compared with the value of accuracy with previous methods.

Article
Brain MRI Images Segmentation Based on U-Net Architecture

Assalah Zaki Atiyah, Khawla Hussein Ali

Pages: 21-27

PDF Full Text
Abstract

Brain tumors are collections of abnormal tissues within the brain. The regular function of the brain may be affected as it grows within the region of the skull. Brain tumors are critical for improving treatment options and patient survival rates to prevent and treat them. The diagnosis of cancer utilizing manual approaches for numerous magnetic resonance imaging (MRI) images is the most complex and time-consuming task. Brain tumor segmentation must be carried out automatically. A proposed strategy for brain tumor segmentation is developed in this paper. For this purpose, images are segmented based on region-based and edge-based. Brain tumor segmentation 2020 (BraTS2020) dataset is utilized in this study. A comparative analysis of the segmentation of images using the edge-based and region-based approach with U-Net with ResNet50 encoder, architecture is performed. The edge-based segmentation model performed better in all performance metrics compared to the region-based segmentation model and the edge-based model achieved the dice loss score of 0. 008768, IoU score of 0. 7542, f1 score of 0. 9870, the accuracy of 0. 9935, the precision of 0. 9852, recall of 0. 9888, and specificity of 0. 9951.

Article
An Enhanced Deployment Approach of Adaptive Equalizer for Multipath Fading Channels

Haider Al-Kanan

Pages: 264-273

PDF Full Text
Abstract

Inter-symbol interference (ISI) exhibits major distortion effect often appears in digital storage and wireless communica- tion channels. The traditional decision feedback equalizer (DFE) is an efficient approach of mitigating the ISI effect using appropriate digital filter to subtract the ISI. However, the error propagation in DFE is a challenging problem that degrades the equalization due to the aliasing distorted symbols in the feedback section of the traditional DFE. The aim of the proposed approach is to minimize the error propagation and improve the modeling stability by incorporating adequate components to control the training and feedback mode of DFE. The proposed enhanced DFE architecture consists of a decision and controller components which are integrated on both the transmitter and receiver sides of communication system to auto alternate the DFE operational modes between training and feedback state based on the quality of the received signal in terms of signal-to-noise ratio SNR. The modeling architecture and performance validation of the proposed DFE are implemented in MATLAB using a raised-cosine pulse filter on the transmitter side and linear time-invariant channel model with additive gaussian noise. The equalizer capability in compensating ISI is evaluated during different operational stages including the training and DFE based on different channel distortion characteristics in terms of SNR using both 0.75 and 1.5 symbol duration in unit delay fraction of FIR filter. The simulation results of eye-diagram pattern showed significant improvement in the DFE equalizer when using a lower unit delay fraction in FIR filter for better suppressing the overlay trails of ISI. Finally, the capability of the proposed approach to mitigate the ISI is improved almost double the number of symbol errors compared to the traditional DFE.

Article
Fuzzy-Neural Petri Net Distributed Control System Using Hybrid Wireless Sensor Network and CAN Fieldbus

Ali A. Abed, Abduladhem A. Ali, Nauman Aslam Computer Science & Digital Techniques, Northumbria Univ. nauman.aslam@northumbria.ac.uk, Ali F. Marhoon

Pages: 54-70

PDF Full Text
Abstract

The reluctance of industry to allow wireless paths to be incorporated in process control loops has limited the potential applications and benefits of wireless systems. The challenge is to maintain the performance of a control loop, which is degraded by slow data rates and delays in a wireless path. To overcome these challenges, this paper presents an application–level design for a wireless sensor/actuator network (WSAN) based on the “automated architecture”. The resulting WSAN system is used in the developing of a wireless distributed control system (WDCS). The implementation of our wireless system involves the building of a wireless sensor network (WSN) for data acquisition and controller area network (CAN) protocol fieldbus system for plant actuation. The sensor/actuator system is controlled by an intelligent digital control algorithm that involves a controller developed with velocity PID- like Fuzzy Neural Petri Net (FNPN) system. This control system satisfies two important real-time requirements: bumpless transfer and anti-windup, which are needed when manual/auto operating aspect is adopted in the system. The intelligent controller is learned by a learning algorithm based on back-propagation. The concept of petri net is used in the development of FNN to get a correlation between the error at the input of the controller and the number of rules of the fuzzy-neural controller leading to a reduction in the number of active rules. The resultant controller is called robust fuzzy neural petri net (RFNPN) controller which is created as a software model developed with MATLAB. The developed concepts were evaluated through simulations as well validated by real-time experiments that used a plant system with a water bath to satisfy a temperature control. The effect of disturbance is also studied to prove the system's robustness.

Article
A Novel Quantum-Behaved Future Search Algorithm for the Detection and Location of Faults in Underground Power Cables Using ANN

Hamzah Abdulkhaleq Naji, Rashid Ali Fayadh, Ammar Hussein Mutlag

Pages: 226-244

PDF Full Text
Abstract

This article introduces a novel Quantum-inspired Future Search Algorithm (QFSA), an innovative amalgamation of the classical Future Search Algorithm (FSA) and principles of quantum mechanics. The QFSA was formulated to enhance both exploration and exploitation capabilities, aiming to pinpoint the optimal solution more effectively. A rigorous evaluation was conducted using seven distinct benchmark functions, and the results were juxtaposed with five renowned algorithms from existing literature. Quantitatively, the QFSA outperformed its counterparts in a majority of the tested scenarios, indicating its superior efficiency and reliability. In the subsequent phase, the utility of QFSA was explored in the realm of fault detection in underground power cables. An Artificial Neural Network (ANN) was devised to identify and categorize faults in these cables. By integrating QFSA with ANN, a hybrid model, QFSA-ANN, was developed to optimize the network’s structure. The dataset, curated from MATLAB simulations, comprised diverse fault types at varying distances. The ANN structure had two primary units: one for fault location and another for detection. These units were fed with nine input parameters, including phase- currents and voltages, current and voltage values from zero sequences, and voltage angles from negative sequences. The optimal architecture of the ANN was determined by varying the number of neurons in the first and second hidden layers and fine-tuning the learning rate. To assert the efficacy of the QFSA-ANN model, it was tested under multiple fault conditions. A comparative analysis with established methods in the literature further accentuated its robustness in terms of fault detection and location accuracy. this research not only augments the field of search algorithms with QFSA but also showcases its practical application in enhancing fault detection in power distribution systems. Quantitative metrics, detailed in the main article, solidify the claim of QFSA-ANN’s superiority over conventional methods.

Article
A Review of Algorithms and Platforms for Offloading Decisions in Mobile Cloud Computing

Fatima Haitham Murtadha, Suhad Faisal Behadili

Pages: 97-106

PDF Full Text
Abstract

With the substantial growth of mobile applications and the emergence of cloud computing concepts, therefore mobile Cloud Computing (MCC) has been introduced as a potential mobile service technology. Mobile has limited resources, battery life, network bandwidth, storage, and processor, avoid mobile limitations by sending heavy computation to the cloud to get better performance in a short time, the operation of sending data, and get the result of computation call offloading. In this paper, a survey about offloading types is discussed that takes care of many issues such as offloading algorithms, platforms, metrics (that are used with this algorithm and its equations), mobile cloud architecture, and the advantages of using the mobile cloud. The trade-off between local execution of tasks on end-devices and remote execution on the cloud server for minimizing delay time and energy saving. In the form of a multi-objective optimization problem with a focus on reducing overall system power consumption and task execution latency, meta-heuristic algorithms are required to solve this problem which is considered as NP-hardness when the number of tasks is high. To get minimum cost (time and energy) apply partial offloading on specific jobs containing a number of tasks represented in sequences of zeros and ones for example (100111010), when each bit represents a task. The zeros mean the task will be executed in the cloud and the ones mean the task will be executed locally. The decision of processing tasks locally or remotely is important to balance resource utilization. The calculation of task completion time and energy consumption for each task determines which task from the whole job will be executed remotely (been offloaded) and which task will be executed locally. Calculate the total cost (time and energy) for the whole job and determine the minimum total cost. An optimization method based on metaheuristic methods is required to find the best solution. The genetic algorithm is suggested as a metaheuristic Algorithm for future work.

Article
A Review of Design and Modeling of Pneumatic Artificial Muscle

Wafaa Al-Mayahi, Hassanin Al-Fahaam

Pages: 122-136

PDF Full Text
Abstract

Soft robots, which are often considered safer than rigid robots when interacting with humans due to the reduced risk of injury, have found utility in various medical and industrial fields. Pneumatic artificial muscles (PAMs), one of the most widely used soft actuators, have proven their efficiency in numerous applications, including prosthetic and rehabilitation robots. PAMs are lightweight, responsive, precise, and capable of delivering a high force-to-weight ratio. Their structure comprises a flexible, inflatable membrane reinforced with fibrous twine and fitted with gas-sealing fittings. For the optimal design and integration of these into control systems, it is crucial to develop mathematical models that accurately represent their functioning mechanisms. This paper introduces a general concept of PAM’s construction, its various types, and operational mechanisms, along with its key benefits and drawbacks, and also reviews the most common modeling techniques for PAM representation. Most models are grounded in PAM architecture, aiming to calculate the actuator’s force across its full axis by correlating pressure, length, and other parameters that influence actuator strength.

Article
European Rail Traffic Management System – An Overview

Dr Sajed K Abed

Pages: 172-179

PDF Full Text
Abstract

This paper aims to give an overview of the European Rail Traffic Management System (ERTMS) which is currently being implemented in Europe and other parts of the world. It provides some background on this system, the objectives behind the development of the ERTMS, its architecture, different application levels of the ERTMS and brief information on its implementation in Europe and worldwide. The paper assumes the readers have a little or no knowledge of the ERTMS.

Article
Learning the Quadruped Robot by Reinforcement Learning (RL)

A. A. Issa, A. A. Aldair

Pages: 117-126

PDF Full Text
Abstract

In this paper, a simulation was utilized to create and test the suggested controller and to investigate the ability of a quadruped robot based on the SimScape-Multibody toolbox, with PID controllers and deep deterministic policy gradient DDPG Reinforcement learning (RL) techniques. A quadruped robot has been simulated using three different scenarios based on two methods to control its movement, namely PID and DDPG. Instead of using two links per leg, the quadruped robot was constructed with three links per leg, to maximize movement versatility. The quadruped robot-built architecture uses twelve servomotors, three per leg, and 12-PID controllers in total for each servomotor. By utilizing the SimScape-Multibody toolbox, the quadruped robot can build without needing to use the mathematical model. By varying the walking robot's carrying load, the robustness of the developed controller is investigated. Firstly, the walking robot is designed with an open loop system and the result shows that the robot falls at starting of the simulation. Secondly, auto-tuning are used to find the optimal parameter like (KP, KI and KD) of PID controllers and resulting shows the robot can walk in a straight line. Finally, DDPG reinforcement learning is proposed to generate and improve the walking motion of the quadruped robot, and the results show that the behaviour of the walking robot has been improved compared with the previous cases, Also, the results produced when RL is employed instead of PID controllers are better.

Article
Study of Chaotic-based Audio Encryption Algorithms: A Review

Alaa Shumran, Abdul-Basset A. Al-Hussein

Pages: 85-103

PDF Full Text
Abstract

Nowadays, multimedia communication has become very widespread and this requires it to be protected from attackers and transmitted securely for reliability. Encryption and decryption techniques are useful in providing effective security for speech signals to ensure that these signals are transmitted with secure data and prevent third parties or the public from reading private messages. Due to the rapid improvement in digital communications over the recent period up to the present, the security of voice data transmitted over various networks has been classified as a favored field of study in earlier years. The contributions to audio encryption are discussed in this review. This Comprehensive review mainly focuses on presenting several kinds of methods for audio encryption and decryption the analysis of these methods with their advantages and disadvantages have been investigated thoroughly. It will be classified into encryption based on traditional methods and encryption based on advanced chaotic systems. They are divided into two types, continuous-time system, and discrete-time system, and also classified based on the synchronization method and the implementation method. In the fields of information and communications security, system designers face many challenges in both cost, performance, and architecture design, Field Programmable gate arrays (FPGAs) provide an excellent balance between computational power and processing flexibility. In addition, encryption methods will be classified based on Chaos-based Pseudo Random Bit Generator, Fractional-order systems, and hybrid chaotic generator systems, which is an advantageous point for this review compared with previous ones. Audio algorithms are presented, discussed, and compared, highlighting important advantages and disadvantages. Audio signals have a large volume and a strong correlation between data samples. Therefore, if traditional cryptography systems are used to encrypt such huge data, they gain significant overhead. Standard symmetric encryption systems also have a small key-space, which makes them vulnerable to attacks. On the other hand, encryption by asymmetric algorithms is not ideal due to low processing speed and complexity. Therefore, great importance has been given to using chaotic theory to encode audio files. Therefore, when proposing an appropriate encryption method to ensure a high degree of security, the key space, which is the critical part of every encryption system, and the key sensitivity must be taken into account. The key sensitivity is related to the initial values and control variables of the chaotic system chosen as the audio encryption algorithm. In addition, the proposed algorithm should eliminate the problems of periodic windows, such as limited chaotic range and non-uniform distribution, and the quality of the recovered audio signal remains good, which confirms the convenience, reliability, and high security.

Article
HIERARCHICAL ARABIC PHONEME RECOGNITION USING MFCC ANALYSIS

INTESSAR T. HWAIDY, PROF. DR. ABDULADHEM A. ALI

Pages: 97-106

PDF Full Text
Abstract

In this paper, a hierarchical Arabic phoneme recognition system is proposed in which Mel Frequency Cepstrum Coefficients (MFCC) features is used to train the hierarchical neural networks architecture. Here, separate neural networks (subnetworks) are to be recursively trained to recognize subsets of phonemes. The overall recognition process is a combination of the outputs of these subnetworks. Experiments that explore the performance of the proposed hierarchical system in comparison to non-hierarchical (flat) baseline systems are also presented in this paper.

Article
Taguchi Method Based Node Performance Analysis of Generous TIT- for-TAT Cooperation of AD-HOC Networks

Noor Kareem Jumaa, Auday A.H. Mohamad, Abbas Muhammed Allawy, Ali A. Mohammed

Pages: 33-44

PDF Full Text
Abstract

Ad-Hoc networks have an adaptive architecture, temporarily configured to provide communication between wireless devices that provide network nodes. Forwarding packets from the source node to the remote destination node may require intermediate cooperative nodes (relay nodes), which may act selfishly because they are power-constrained. The nodes should exhibit cooperation even when faced with occasional selfish or non-cooperative behaviour from other nodes. Several factors affect the behaviour of nodes; those factors are the number of packets required to redirect, power consumption per node, and power constraints per node. Power constraints per node and grade of generosity. This article is based on a dynamic collaboration strategy, specifically the Generous Tit-for-Tat (GTFT), and it aims to represent an Ad-Hoc network operating with the Generous Tit-for-Tat (GTFT) cooperation strategy, measure statistics for the data, and then analyze these statistics using the Taguchi method. The transfer speed and relay node performance both have an impact on the factors that shape the network conditions and are subject to analysis using the Taguchi Method (TM). The analyzed parameters are node throughput, the amount of relay requested packets produced by a node per number of relays requested packets taken by a node, and the amount of accepted relay requested by a node per amount of relay requested by a node. A Taguchi L9 orthogonal array was used to analyze node behaviour, and the results show that the effect parameters were number of packets, power consumption, power constraint of the node, and grade of generosity. The tested parameters influence node cooperation in the following sequence: number of packets required to redirect (N) (effects on behaviour with a percent of 6.8491), power consumption per node (C) (effects on behaviour with a percent of 0.7467), power constraints per node (P) (effects on behaviour with a percent of 0.6831), and grade of generosity (ε) (effects on behaviour with a percent of 0.4530). Taguchi experiments proved that the grade of generosity (GoG) is not the influencing factor where the highest productivity level is, while the number of packets per second required to redirect also has an impact on node behaviour.

1 - 16 of 16 items

Search Parameters

Journal Logo
Iraqi Journal for Electrical and Electronic Engineering

College of Engineering, University of Basrah

  • Copyright Policy
  • Terms & Conditions
  • Privacy Policy
  • Accessibility
  • Cookie Settings
Licensing & Open Access

CC BY 4.0 Logo Licensed under CC-BY-4.0

This journal provides immediate open access to its content.

Editorial Manager Logo Elsevier Logo

Peer-review powered by Elsevier’s Editorial Manager®

Copyright © 2025 College of Engineering, University of Basrah. All rights reserved, including those for text and data mining, AI training, and similar technologies.