Iraqi Journal for Electrical and Electronic Engineering
Login
Iraqi Journal for Electrical and Electronic Engineering
  • Home
  • Articles & Issues
    • Latest Issue
    • All Issues
  • Authors
    • Submit Manuscript
    • Guide for Authors
    • Authorship
    • Article Processing Charges (APC)
    • Proofreading Service
  • Reviewers
    • Guide for Reviewers
    • Become a Reviewer
  • About
    • About Journal
    • Aims and Scope
    • Editorial Team
    • Journal Insights
    • Peer Review Process
    • Publication Ethics
    • Plagiarism
    • Allegations of Misconduct
    • Appeals and Complaints
    • Corrections and Withdrawals
    • Open Access
    • Archiving Policy
    • Abstracting and indexing
    • Announcements
    • Contact

Search Results for component

Article
A Biometric System for Iris Recognition Based on Fourier Descriptors and Principle Component Analysis

Muthana H. Hamd, Samah K. Ahmed

Pages: 180-187

PDF Full Text
Abstract

Iris pattern is one of the most important biological traits of humans. In last years, the iris pattern is used for human verification because of uniqueness of its texture. In this paper, biometric system based iris recognition is designed and implemented using two comparative approaches. The first approach is the Fourier descriptors, in this method the iris features have been extracted in frequency domain, where the low spectrums define the general description of iris pattern, while the high spectrums describes the fine detail. The second approach, the principle component analysis uses statistic technique to select the most important feature values by reducing its dimensionality. The biometric system is tested by applying one-to-one pattern matching procedure for 50 persons. The distance measurement method is applied for Manhattan, Euclidean, and Cosine classifiers for purpose of comparison. In all three classification methods, Fourier descriptors were always advanced principle component analysis in matching results. It satisfied 96%, 94%, and 86% correct matching against 94%, 92%, and 80% for principle component analysis using Manhattan, Euclidean, and Cosine classifiers respectively.

Article
Comparison of Complex-Valued Independent Component Analysis Algorithms for EEG Data

Ali Al-Saegh

Pages: 1-12

PDF Full Text
Abstract

Independent Component Analysis (ICA) has been successfully applied to a variety of problems, from speaker identification and image processing to functional magnetic resonance imaging (fMRI) of the brain. In particular, it has been applied to analyze EEG data in order to estimate the sources form the measurements. However, it soon became clear that for EEG signals the solutions found by ICA often depends on the particular ICA algorithm, and that the solutions may not always have a physiologically plausible interpretation. Therefore, nowadays many researchers are using ICA largely for artifact detection and removal from EEG, but not for the actual analysis of signals from cortical sources. However, a recent modification of an ICA algorithm has been applied successfully to EEG signals from the resting state. The key idea was to perform a particular preprocessing and then apply a complex- valued ICA algorithm. In this paper, we consider multiple complex-valued ICA algorithms and compare their performance on real-world resting state EEG data. Such a comparison is problematic because the way of mixing the original sources (the “ground truth”) is not known. We address this by developing proper measures to compare the results from multiple algorithms. The comparisons consider the ability of an algorithm to find interesting independent sources, i.e. those related to brain activity and not to artifact activity. The performance of locating a dipole for each separated independent component is considered in the comparison as well. Our results suggest that when using complex-valued ICA algorithms on preprocessed signals the resting state EEG activity can be analyzed in terms of physiological properties. This reestablishes the suitability of ICA for EEG analysis beyond the detection and removal of artifacts with real-valued ICA applied to the signals in the time-domain.

Article
Five-Component Load Forecast in Residential Sector Using Smart Methods

Yamama A. I. Al-Nasiri, Hussein Al-bayaty, Majid S.M. Al-Hafidh

Pages: 132-138

PDF Full Text
Abstract

The electrical load is affected by the weather conditions in many countries as well as in Iraq. The weather-sensitive electrical load is, usually, divided into two components, a weather-sensitive component, and a weather-insensitive component. The research provides a method for separating the weather-sensitive electrical load into five components. and aims to prove the efficiency of the five-component load Forecasting model. The artificial neural network was used to predict the weather-sensitive electrical load using the MATLAB R17a software. Weather data and loads were used for one year for Mosul City. The performance of the artificial neural network was evaluated using the mean squared error and the mean absolute percentage error. The results indicate the accuracy of the prediction model used, MAPE equal to 0.0402.

Article
Session to Session Transfer Learning Method Using Independent Component Analysis with Regularized Common Spatial Patterns for EEG-MI Signals

Zaineb M. Alhakeem, Ramzy S. Ali

Pages: 13-27

PDF Full Text
Abstract

Training the user in Brain-Computer Interface (BCI) systems based on brain signals that recorded using Electroencephalography Motor Imagery (EEG-MI) signal is a time-consuming process and causes tiredness to the trained subject, so transfer learning (subject to subject or session to session) is very useful methods of training that will decrease the number of recorded training trials for the target subject. To record the brain signals, channels or electrodes are used. Increasing channels could increase the classification accuracy but this solution costs a lot of money and there are no guarantees of high classification accuracy. This paper introduces a transfer learning method using only two channels and a few training trials for both feature extraction and classifier training. Our results show that the proposed method Independent Component Analysis with Regularized Common Spatial Pattern (ICA-RCSP) will produce about 70% accuracy for the session to session transfer learning using few training trails. When the proposed method used for transfer subject to subject the accuracy was lower than that for session to session but it still better than other methods.

Article
Independent Component Analysis for Separation of Speech Mixtures: A Comparison Among Thirty Algorithms

Ali Al-Saegh

Pages: 1-9

PDF Full Text
Abstract

Vast number of researches deliberated the separation of speech mixtures due to the importance of this field of research . Whereas its applications became widely used in our daily life; such as mobile conversation, video conferences, and other distant communications. These sorts of applications may suffer from what is well known the cocktail party problem. Independent component analysis (ICA) has been extensively used to overcome this problem and many ICA algorithms based on different techniques have been developed in this context. Still coming up with some suitable algorithms to separate speech mixed signals into their original ones is of great importance. Hence, this paper utilizes thirty ICA algorithms for estimating the original speech signals from mixed ones, the estimation process is carried out with the purpose of testing the robustness of the algorithms once against a different number of mixed signals and another against different lengths of mixed signals. Three criteria namely Spearman correlation coefficient, signal to interference ratio, and computational demand have been used for comparing the obtained results. The results of the comparison were sufficient to signify some algorithms which are appropriate for the separation of speech mixtures.

Article
Power Transformer Protection by Using Fuzzy Logic

Ahmed Abdulkader Aziz, Abduladhem Abdulkareem Ali, Abbas H. Abbas

Pages: 1-11

PDF Full Text
Abstract

Power transformer protective relay should block the tripping during magnetizing inrush and rapidly operate the tripping during internal faults. Recently, the frequency environment of power system has been made more complicated and the quantity of 2nd frequency component in inrush state has been decreased because of the improvement of core steel. And then, traditional approaches will likely be maloperated in the case of magnetizing inrush with low second harmonic component and internal faults with high second harmonic component. This paper proposes a new relaying algorithm to enhance the fault detection sensitivities of conventional techniques by using a fuzzy logic approach. The proposed fuzzy-based relaying algorithm consists of flux-differential current derivative curve, harmonic restraint, and percentage differential characteristic curve. The proposed relaying was tested with MATLAB simulation software and showed a fast and accurate trip operation.

Article
BRAIN MACHINE INTERFACE: ANALYSIS OF SEGMENTED EEG SIGNAL CLASSIFICATION USING SHORT-TIME PCA AND RECURRENT NEURAL NETWORKS

Hema C.R., Paulraj M.P., Nagarajan R., Sazali Yaacob, Abdul Hamid Adom

Pages: 77-85

PDF Full Text
Abstract

Brain machine interface provides a communication channel between the human brain and an external device. Brain interfaces are studied to provide rehabilitation to patients with neurodegenerative diseases; such patients loose all communication pathways except for their sensory and cognitive functions. One of the possible rehabilitation methods for these patients is to provide a brain machine interface (BMI) for communication; the BMI uses the electrical activity of the brain detected by scalp EEG electrodes. Classification of EEG signals extracted during mental tasks is a technique for designing a BMI. In this paper a BMI design using five mental tasks from two subjects were studied, a combination of two tasks is studied per subject. An Elman recurrent neural network is proposed for classification of EEG signals. Two feature extraction algorithms using overlapped and non overlapped signal segments are analyzed. Principal component analysis is used for extracting features from the EEG signal segments. Classification performance of overlapping EEG signal segments is observed to be better in terms of average classification with a range of 78.5% to 100%, while the non overlapping EEG signal segments show better classification in terms of maximum classifications.

Article
Enhancing Linear Independent Component Analysis: Comparison of Various Metaheuristic Methods

Nidaa Abdul Mohsin Abbas, Hussein Mohammed Salman

Pages: 113-122

PDF Full Text
Abstract

Various methods have been exploited in the blind source separation problems, especially in cocktail party problems. The most commonly used method is the independent component analysis (ICA). Many linear and nonlinear ICA methods, such as the radial basis functions (RBF) and self-organizing map (SOM) methods utilise neural networks and genetic algorithms as optimisation methods. For the contrast function, most of the traditional methods, especially the neural networks, use the gradient descent as an objective function for the ICA method. Most of these methods trap in local minima and consume numerous computation requirements. Three metaheuristic optimisation methods, namely particle, quantum particle, and glowworm swarm optimisation methods are introduced in this study to enhance the existing ICA methods. The proposed methods exhibit better results in separation than those in the traditional methods according to the following separation quality measurements: signal-to-noise ratio, signal-to-interference ratio, log-likelihood ratio, perceptual evaluation speech quality and computation time. These methods effectively achieved an independent identical distribution condition when the sampling frequency of the signals is 8 kHz.

Article
Face Recognition Approach Based on the Integration of Image Preprocessing, CMLABP and PCA Methods

Yaqeen S. Mezaal

Pages: 104-113

PDF Full Text
Abstract

Face recognition technique is an automatic approach for recognizing a person from digital images using mathematical interpolation as matrices for these images. It can be adopted to realize facial appearance in the situations of different poses, facial expressions, ageing and other changes. This paper presents efficient face recognition model based on the integration of image preprocessing, Co-occurrence Matrix of Local Average Binary Pattern (CMLABP) and Principle Component Analysis (PCA) methods respectively. The proposed model can be used to compare the input image with existing database images in order to display or record the citizen information such as name, surname, birth date, etc. The recognition rate of the model is better than 99%. Accordingly, the proposed face recognition system is functional for criminal investigations. Furthermore, it has been compared with other reported works in the literature using diverse databases and training images. .

Article
Energy Demand Prediction Based on Deep Learning Techniques

Sarab Shanan Swide, Ali F. Marhoon

Pages: 83-89

PDF Full Text
Abstract

The development of renewable resources and the deregulation of the market have made forecasting energy demand more critical in recent years. Advanced intelligent models are created to ensure accurate power projections for several time horizons to address new difficulties. Intelligent forecasting algorithms are a fundamental component of smart grids and a powerful tool for reducing uncertainty in order to make more cost- and energy-efficient decisions about generation scheduling, system reliability and power optimization, and profitable smart grid operations. However, since many crucial tasks of power operators, such as load dispatch, rely on short-term forecasts, prediction accuracy in forecasting algorithms is highly desired. This essay suggests a model for estimating Denmark’s power use that can precisely forecast the month’s demand. In order to identify factors that may have an impact on the pattern of a number of unique qualities in the city direct consumption of electricity. The current paper also demonstrates how to use an ensemble deep learning technique and Random forest to dramatically increase prediction accuracy. In addition to their ensemble, we showed how well the individual Random forest performed.

Article
Control of Robot Directions Based on Online Hand Gestures

Mohammed A.Tawfeeq, Ayam M. Abbass

Pages: 41-50

PDF Full Text
Abstract

The evolution of wireless communication technology increases human machine interaction capabilities especially in controlling robotic systems. This paper introduces an effective wireless system in controlling the directions of a wheeled robot based on online hand gestures. The hand gesture images are captured and processed to be recognized and classified using neural network (NN). The NN is trained using extracted features to distinguish five different gestures; accordingly it produces five different signals. These signals are transmitted to control the directions of the cited robot. The main contribution of this paper is, the technique used to recognize hand gestures is required only two features, these features can be extracted in very short time using quite easy methodology, and this makes the proposed technique so suitable for online interaction. In this methodology, the preprocessed image is partitioned column-wise into two half segments; from each half one feature is extracted. This feature represents the ratio of white to black pixels of the segment histogram. The NN showed very high accuracy in recognizing all of the proposed gesture classes. The NN output signals are transmitted to the robot microcontroller wirelessly using Bluetooth. Accordingly the microcontroller guides the robot to the desired direction. The overall system showed high performance in controlling the robot movement directions.

Article
A Simulation of AODV and GPSR Routing Protocols in VANET Based on Multimetrices

Israa A. Aljabry, Ghaida A. Al-Suhail

Pages: 66-72

PDF Full Text
Abstract

Vehicular Ad hoc Networks (VANETs), a subsection of Mobile Ad hoc Networks (MANETs), have strong future application prospects. Because topology structures are rapidly changing, determining a route that can guarantee a good Quality of Service (QoS) is a critical issue in VANETs. Routing is a critical component that must be addressed in order to utilize effective communication among vehicles. The purpose obtained from this study is to compare the AODV and GPSR performance in terms of Packet Delivery Ratio, Packet Drop Ratio, Throughput, and End-to-End Delay by applying three scenarios, the first scenario focuses on studying these protocols in terms of QoS while changing the number of vehicles at a constant speed of 40Km/h, and for the second scenario changing the speed value while keeping a constant number of vehicles which is 100, the third involves changing the communication range at a constant speed and vehicle number. This study represents a foundation for researchers to help elaborate on the strength and weaknesses of these two protocols. OMNeT++ in conjunction with SUMO is used for simulation.

Article
Mobile radio propagation path loss simulation for two districts of different buildings structures in Mosul-city

Farhad E. Mahmood

Pages: 78-82

PDF Full Text
Abstract

In this paper two theoretical models have been considered for the prediction of path loss for two different districts in Mosul city, using MATLAB 7.4 program. The Walfisch-Ikegami (W-I) model for uniform heights and similar buildings in the Karama district . The other model is Okumura-Hata (OH) model applied for irregular and dissimilar buildings in the Almajmoa'a district. The information buildings heights are obtained from the civil Eng. Depart. in Mosul university. In this paper it can be shown that The effect of distance in regular area (karama) on path loss is about 10 dB larger than irregular area (Almajmoa'a), and The effect of varying antenna height in regular area (karama) on path loss is about 7 dB greater than irregular area (Almajmoa'a) for 40 meter variation.

Article
Secure Electronic Healthcare Record based on Distributed Global Database and Schnorr Signcryption

Mohammad Fareed, Ali A Yassin

Pages: 62-69

PDF Full Text
Abstract

Preserving privacy and security plays a key role in allowing each component in the healthcare system to access control and gain privileges for services and resources. Over recent years, there have been several role-based access control and authentication schemes, but we noticed some drawbacks in target schemes such as failing to resist well-known attacks, leaking privacy-related information, and operational cost. To defeat the weakness, this paper proposes a secure electronic healthcare record scheme based on Schnorr Signcryption, crypto hash function, and Distributed Global Database (DGDB) for the healthcare system. Based on security theories and the Canetti-Krawczyk model (CK), we notice that the proposed scheme has suitable matrices such as scalability, privacy preservation, and mutual authentication. Furthermore, findings from comparisons with comparable schemes reveal that the suggested approach provides greater privacy and security characteristics than the other schemes and has enough efficiency in computational and communicational aspects.

Article
Generalized Chebyshev-like Approximation for Low-pass Filter

Hisham L. Swady

Pages: 5-8

PDF Full Text
Abstract

Analog filters constitute indispensible component of analog circuits and still playing an important part in interface with analog real world. realizing filters with odd order is preferred because of its time response . Therefore, this paper is conducted to introduce a new generalized Chebyshev – like approximation for analog filters. The analyses presented to realize the filters with odd order. This proposed novel approach offer good results in terms of flat delay and time domain response. Also, the achieved results are validated by comparison to normal Chebyshev filter via investigation several examples .

Article
Hard Constraints Explicit Model Predictive Control of an Inverted Pendulum

Haider A. F. Mohamed, Masood Askari, M. Moghavvemi

Pages: 28-32

PDF Full Text
Abstract

In this paper, explicit model predictive controller is applied to an inverted pendulum apparatus. Explicit solutions to constrained linear model predictive controller can be computed by solving multi-parametric quadratic programs. The solution is a piecewise affine function, which can be evaluated at each sample to obtain the optimal control law. The on-line computation effort is restricted to a table-lookup. This admits implementation on low cost hardware at high sampling frequencies in real-time systems with high reliability and low software complexity. This is useful for systems with limited power and CPU resources.

1 - 16 of 16 items

Search Parameters

Journal Logo
Iraqi Journal for Electrical and Electronic Engineering

College of Engineering, University of Basrah

  • Copyright Policy
  • Terms & Conditions
  • Privacy Policy
  • Accessibility
  • Cookie Settings
Licensing & Open Access

CC BY 4.0 Logo Licensed under CC-BY-4.0

This journal provides immediate open access to its content.

Editorial Manager Logo Elsevier Logo

Peer-review powered by Elsevier’s Editorial Manager®

Copyright © 2025 College of Engineering, University of Basrah. All rights reserved, including those for text and data mining, AI training, and similar technologies.