Iraqi Journal for Electrical and Electronic Engineering
Login
Iraqi Journal for Electrical and Electronic Engineering
  • Home
  • Articles & Issues
    • Latest Issue
    • All Issues
  • Authors
    • Submit Manuscript
    • Guide for Authors
    • Authorship
    • Article Processing Charges (APC)
    • Proofreading Service
  • Reviewers
    • Guide for Reviewers
    • Become a Reviewer
  • About
    • About Journal
    • Aims and Scope
    • Editorial Team
    • Journal Insights
    • Peer Review Process
    • Publication Ethics
    • Plagiarism
    • Allegations of Misconduct
    • Appeals and Complaints
    • Corrections and Withdrawals
    • Open Access
    • Archiving Policy
    • Abstracting and indexing
    • Announcements
    • Contact

Search Results for ct-scan

Article
A Secure Image Cryptographic Algorithm Based on Triple Incorporated Ciphering Stages

Sura F. Yousif, Abbas Salman Hameed, Dheyaa T. Al-Zuhairi

Pages: 1-21

PDF Full Text
Abstract

Lately, image encryption has stand out as a highly urgent demand to provide high security for digital images against use and unauthorized distribution. A lot of existing researches use chaotic systems, symmetric or asymmetric schemes for image encryption, but cryptosystem based on one encryption technique only, faces many challenges like weak security and low complexity. Therefore, incorporating two or more different ciphering methods yields a secure and efficient algorithm to protect image information. In this work, a new image cryptosystem is suggested by joining zigzag scan technique, RSA algorithm and chaotic systems. These three security factors introduce Triple Incorporated Ciphering stages system (TIC). Initially, the plaintext image is divided into 8 × 8 non-overlapping blocks, then the odd blocks are isolated from the even blocks. After that, a new modified zigzag scan in two different directions is adopted for shuffling pixels in the odd and even blocks. This operation effectively enhances the shuffling degree. Next, the RSA algorithm is utilized after combining the scrambled blocks in one matrix. Finally, chaotic systems are implemented on the resultant encrypted matrix to complete the ciphering process. The chaos is implemented in two steps; confusion and diffusion. Duffing map is exploited in the confusion stage, whereas L¨u system is adopted on the shuffled matrix in the diffusion stage. The simulation results show the superiority of TIC in both security and attacks robustness compared to other cryptographic algorithms. Therefore, TIC can be exploited in real-time communication systems for secure image transmission.

Article
Robotics Path Planning Algorithms using Low-Cost IR Sensor

Israa Sabri A. AL-Forati, Abdulmuttalib T. Rashid

Pages: 44-52

PDF Full Text
Abstract

A robot is a smart machine that can help people in their daily lives and keep everyone safe. the three general sequences to accomplish any robot task is mapping the environment, the localization, and the navigation (path planning with obstacle avoidance). Since the goal of the robot is to reach its target without colliding, the most important and challenging task of the mobile robot is the navigation. In this paper, the robot navigation problem is solved by proposed two algorithms using low-cost IR receiver sensors arranged as an array, and a robot has been equipped with one IR transmitter. Firstly, the shortest orientation algorithm is proposed, the robot direction is corrected at each step of movement depending on the angle calculation. secondly, an Active orientation algorithm is presented to solve the weakness in the preceding algorithm. A chain of the active sensors in the environment within the sensing range of the virtual path is activated to be scan through the robot movement. In each algorithm, the initial position of the robot is detected using the modified binary search algorithm, various stages are used to avoid obstacles through suitable equations focusing on finding the shortest and the safer path of the robot. Simulation results with multi-resolution environment explained the efficiency of the algorithms, they are compatible with the designed environment, it provides safe movements (without hitting obstacles) and a good system control performance. A Comparison table is also provided.

Article
RP Lidar Sensor for Multi-Robot Localization using Leader Follower Algorithm

Bayadir A. Issa, Abdulmuttalib T. Rashid

Pages: 21-32

PDF Full Text
Abstract

In this paper, a new technique for multi-robot localization in an unknown environment, called the leader-follower localization algorithm is presented. The framework utilized here is one robot that goes about as a leader and different robots are considered as followers distributed randomly in the environment. Every robot equipped with RP lidar sensors to scan the environment and gather information about every robot. This information utilized by the leader to distinguish and confine every robot in the environment. The issue of not noticeable robots is solved by contrasting their distances with the leader. Moreover, the equivalent distance robot issue is unraveled by utilizing the permutation algorithm. Several simulation scenarios with different positions and orientations are implemented on (3- 7) robots to show the performance of the introduced technique.

Article
Vehicle Remote Support and Surveillance System

Ahmed J. Abid, Ramzy S. Ali, Rafah A. Saheb

Pages: 55-63

PDF Full Text
Abstract

the proposed design offers a complete solution to support and surveillance vehicles remotely. The offered algorithm allows a monitoring center to track vehicles; diagnoses fault remotely, control the traffic and control CO emission. The system is programmed to scan the on-board diagnostic OBD periodically or based on request to check if there are any faults and read all the available sensors, then make an early fault prediction based on the sensor readings, an experience with the vehicle type and fault history. It is so useful for people who are not familiar with fault diagnosis as well as the maintenance center. The system offers tracking the vehicle remotely, which protects it against theft and warn the driver if it exceeds the speed limit according to its location. Finally, it allows the user to report any traffic congestion and allow s a vehicle navigator to be up to date with the traffic condition based on the other system’s user feedback.

Article
Table-Based Matching Algorithm for Localization and Orientation Estimation of Multi-Robot System

Ola A. Hasan, Abdulmuttalib T. Rashid, Ramzy S. Ali

Pages: 53-71

PDF Full Text
Abstract

In this paper, a new algorithm called table-based matching for multi-robot (node) that used for localization and orientation are suggested. The environment is provided with two distance sensors fixed on two beacons at the bottom corners of the frame. These beacons have the ability to scan the environment and estimate the location and orientation of the visible nodes and save the result in matrices which are used later to construct a visible node table. This table is used for matching with visible-robot table which is constructed from the result of each robot scanning to its neighbors with a distance sensor that rotates at 360⁰; at this point, the location and identity of all visible nodes are known. The localization and orientation of invisible robots rely on the matching of other tables obtained from the information of visible robots. Several simulations implementation are experienced on a different number of nodes to submit the performance of this introduced algorithm.

Article
Design and Implementation of Locations Matching Algorithm for Multi-Object Recognition and Localization

Abdulmuttalib T. Rashid, Wael H. Zayer, Mofeed T. Rashid

Pages: 10-21

PDF Full Text
Abstract

A new algorithm for multi-object recognition and localization is introduced in this paper. This algorithm deals with objects which have different reflectivity factors and distinguish color with respect to the other objects. Two beacons scan multi-color objects using long distance IR sensors to estimate their absolute locations. These two beacon nodes are placed at two corners of the environment. The recognition of these objects is estimated by matching the locations of each object with respect to the two beacons. A look-up table contains the distances information about different color objects is used to convert the reading of the long distance IR sensor from voltage to distance units. The locations of invisible objects are computed by using absolute locations of invisible objects method. The performance of introduced algorithm is tested with several experimental scenarios that implemented on color objects.

Article
A Hybrid Lung Cancer Model for Diagnosis and Stage Classification from Computed Tomography Images

Abdalbasit Mohammed Qadir, Peshraw Ahmed Abdalla, Dana Faiq Abd

Pages: 266-274

PDF Full Text
Abstract

Detecting pulmonary cancers at early stages is difficult but crucial for patient survival. Therefore, it is essential to develop an intelligent, autonomous, and accurate lung cancer detection system that shows great reliability compared to previous systems and research. In this study, we have developed an innovative lung cancer detection system known as the Hybrid Lung Cancer Stage Classifier and Diagnosis Model (Hybrid-LCSCDM). This system simplifies the complex task of diagnosing lung cancer by categorizing patients into three classes: normal, benign, and malignant, by analyzing computed tomography (CT) scans using a two-part approach: First, feature extraction is conducted using a pre-trained model called VGG-16 for detecting key features in lung CT scans indicative of cancer. Second, these features are then classified using a machine learning technique called XGBoost, which sorts the scans into three categories. A dataset, IQ-OTH/NCCD - Lung Cancer, is used to train and evaluate the proposed model to show its effectiveness. The dataset consists of the three aforementioned classes containing 1190 images. Our suggested strategy achieved an overall accuracy of 98.54%, while the classification precision among the three classes was 98.63%. Considering the accuracy, recall, and precision as well as the F1-score evaluation metrics, the results indicated that when using solely computed tomography scans, the proposed (Hybrid-LCSCDM) model outperforms all previously published models.

Article
Patients Monitoring and Data Management System for Hospitals

Shahad Abdulrahman Khuder, Sura Nawfal Abdulrazzaq

Pages: 107-116

PDF Full Text
Abstract

This work concerns creating a monitoring system for a smart hospital using Raspberry Pi to measure vital signs. The readings are continually sent to central monitoring units outside the room instead of being beside the patients, to ensure less contacting between the medical staff and patients, also the cloud is used for those who leave the hospital, as the design can track on their medical cases. Data presentation and analysis were accomplished by the LabVIEW program. A Graphical User Interface (GUI) has been created by the Virtual-Instrument (VI) of this program that offer real-time access to monitor patients’ measurements. If unhealthy states are detected, the design triggers alerts and sends SMS message to the doctor. Furthermore, the clinicians can scan a QR code (which is assigned to each patient individually) to access its real-time measurements. The system also utilizes Electrocardiography (ECG) to detect abnormalities and identify specific heart diseases based on its extracted parameters to encourage patients to seek timely medical attention, while aiding doctors in making well-informed decisions. To evaluate the system’s performance, it is tested in the hospital on many patients of different ages and diseases as well. According to the results, the accuracy measurement of SpO2 was about 98.39%, 97.7% for (heart rate) and 98.7% for body temperature. This shows that the system can offer many patients receiving health services from various facilities, and it ensures efficient data management, access control, real-time monitoring, and secure patient information aligning with healthcare standards.

1 - 8 of 8 items

Search Parameters

Journal Logo
Iraqi Journal for Electrical and Electronic Engineering

College of Engineering, University of Basrah

  • Copyright Policy
  • Terms & Conditions
  • Privacy Policy
  • Accessibility
  • Cookie Settings
Licensing & Open Access

CC BY 4.0 Logo Licensed under CC-BY-4.0

This journal provides immediate open access to its content.

Editorial Manager Logo Elsevier Logo

Peer-review powered by Elsevier’s Editorial Manager®

Copyright © 2025 College of Engineering, University of Basrah. All rights reserved, including those for text and data mining, AI training, and similar technologies.