Iraqi Journal for Electrical and Electronic Engineering
Login
Iraqi Journal for Electrical and Electronic Engineering
  • Home
  • Articles & Issues
    • Latest Issue
    • All Issues
  • Authors
    • Submit Manuscript
    • Guide for Authors
    • Authorship
    • Article Processing Charges (APC)
    • Proofreading Service
  • Reviewers
    • Guide for Reviewers
    • Become a Reviewer
  • About
    • About Journal
    • Aims and Scope
    • Editorial Team
    • Journal Insights
    • Peer Review Process
    • Publication Ethics
    • Plagiarism
    • Allegations of Misconduct
    • Appeals and Complaints
    • Corrections and Withdrawals
    • Open Access
    • Archiving Policy
    • Abstracting and indexing
    • Announcements
    • Contact

Search Results for next-location

Article
A Review of methodologies for Fault Location Techniques in Distribution Power System

Ahmed K. Abbas, Mazyed Awan Ahmed Al-Tak

Pages: 27-37

PDF Full Text
Abstract

Since recent societies become more hooked into electricity, a higher level of power supply continuity is required from power systems. The expansion of those systems makes them liable to electrical faults and several failures are raised due to totally different causes, like the lightning strike, power system element failure caused by mechanical aging as well as human mistakes. These conditions impact the stability of the power as well as lead to costly maintenance and loss of output. This article examines the latest technologies and strategies to determine the location of faults in medium voltage distribution systems. The aim is to classify and assess different strategies in order to determine the best recommended models in practice or for further improvement. Several ways to locate failures in distribution networks have therefore been established. Because faults are unpredictable, quick fault location as well as isolating are necessary to reduce the impact of faults in distribution networks as well as removing the emergency condition from the entire system. This study also includes a comprehensive evaluation of several defect location methods depending on the algorithm employed, the input, the test system, the characteristics retrieved, and the degree of complexity. In order to gain further insight into the strengths and limitations of each method and also comparative analysis is carried out. Then the main problems of the fault location methods in distribution network are briefly expounded.

Article
Mobility Prediction Based on LSTM Multi-Layer Using GPS Phone Data

Nabaa Mhalhal, Suhad Behadili

Pages: 284-292

PDF Full Text
Abstract

Precise Prediction of activity location is an essential element in numerous mobility applications and is especially necessary for the development of tailored sustainable transportation systems. Next-location prediction, which involves predicting a user’s future position based on their past movement patterns, has significant implications in various domains, including urban planning, geo-marketing, disease transmission, Performance wireless network, Recommender Systems, and many other areas. In recent years, various predictors have been suggested to tackle this issue, including state-of-the-art ones that utilize deep learning techniques. This study introduces a robust Model for predicting the future location path of a user based on their known previous locations. The study proposes the use of a Long Short-Term Memory (LSTM) prediction scheme, which is well-suited for learning from sequential data; then a fully connected neuron is employed to decrease the sparsity of the data, resulting in accurate predictions for the path of the user’s next location. The suggested strategy demonstrates superior prediction accuracy compared to a state-of-the-art method, with improvements of up to a loss error of 0.002 based on real-life datasets (Geolife). The results demonstrate that the reliability of forecasts is excellent, indicating the accuracy of the predictions.

Article
Short Circuit Faults Identification and Localization in IEEE 34 Nodes Distribution Feeder Based on the Theory of Wavelets

Sara J. Authafa, Khalid M. Abdul-Hassan

Pages: 65-79

PDF Full Text
Abstract

In this paper a radial distribution feeder protection scheme against short circuit faults is introduced. It is based on utilizing the substation measured current signals in detecting faults and obtaining useful information about their types and locations. In order to facilitate important measurement signals features extraction such that better diagnosis of faults can be achieved, the discrete wavelet transform is exploited. The captured features are then utilized in detecting, identifying the faulted phases (fault type), and fault location. In case of a fault occurrence, the detection scheme will make a decision to trip out a circuit breaker residing at the feeder mains. This decision is made based on a criteria that is set to distinguish between the various system states in a reliable and accurate manner. After that, the fault type and location are predicted making use of the cascade forward neural networks learning and generalization capabilities. Useful information about the fault location can be obtained provided that the fault distance from source, as well as whether it resides on the main feeder or on one of the laterals can be predicted. By testing the functionality of the proposed scheme, it is found that the detection of faults is done fastly and reliably from the view point of power system protection relaying requirements. It also proves to overcome the complexities provided by the feeder structure to the accuracy of the identification process of fault types and locations. All the simulations and analysis are performed utilizing MATLAB R2016b version software package.

Article
A Novel Quantum-Behaved Future Search Algorithm for the Detection and Location of Faults in Underground Power Cables Using ANN

Hamzah Abdulkhaleq Naji, Rashid Ali Fayadh, Ammar Hussein Mutlag

Pages: 226-244

PDF Full Text
Abstract

This article introduces a novel Quantum-inspired Future Search Algorithm (QFSA), an innovative amalgamation of the classical Future Search Algorithm (FSA) and principles of quantum mechanics. The QFSA was formulated to enhance both exploration and exploitation capabilities, aiming to pinpoint the optimal solution more effectively. A rigorous evaluation was conducted using seven distinct benchmark functions, and the results were juxtaposed with five renowned algorithms from existing literature. Quantitatively, the QFSA outperformed its counterparts in a majority of the tested scenarios, indicating its superior efficiency and reliability. In the subsequent phase, the utility of QFSA was explored in the realm of fault detection in underground power cables. An Artificial Neural Network (ANN) was devised to identify and categorize faults in these cables. By integrating QFSA with ANN, a hybrid model, QFSA-ANN, was developed to optimize the network’s structure. The dataset, curated from MATLAB simulations, comprised diverse fault types at varying distances. The ANN structure had two primary units: one for fault location and another for detection. These units were fed with nine input parameters, including phase- currents and voltages, current and voltage values from zero sequences, and voltage angles from negative sequences. The optimal architecture of the ANN was determined by varying the number of neurons in the first and second hidden layers and fine-tuning the learning rate. To assert the efficacy of the QFSA-ANN model, it was tested under multiple fault conditions. A comparative analysis with established methods in the literature further accentuated its robustness in terms of fault detection and location accuracy. this research not only augments the field of search algorithms with QFSA but also showcases its practical application in enhancing fault detection in power distribution systems. Quantitative metrics, detailed in the main article, solidify the claim of QFSA-ANN’s superiority over conventional methods.

Article
Table-Based Matching Algorithm for Localization and Orientation Estimation of Multi-Robot System

Ola A. Hasan, Abdulmuttalib T. Rashid, Ramzy S. Ali

Pages: 53-71

PDF Full Text
Abstract

In this paper, a new algorithm called table-based matching for multi-robot (node) that used for localization and orientation are suggested. The environment is provided with two distance sensors fixed on two beacons at the bottom corners of the frame. These beacons have the ability to scan the environment and estimate the location and orientation of the visible nodes and save the result in matrices which are used later to construct a visible node table. This table is used for matching with visible-robot table which is constructed from the result of each robot scanning to its neighbors with a distance sensor that rotates at 360⁰; at this point, the location and identity of all visible nodes are known. The localization and orientation of invisible robots rely on the matching of other tables obtained from the information of visible robots. Several simulations implementation are experienced on a different number of nodes to submit the performance of this introduced algorithm.

Article
Smart Navigation with Static Polygons and Dynamic Robots

Israa S. Al-Furati, Osama T. Rashid

Pages: 38-46

PDF Full Text
Abstract

Due to the last increase in data and information technology, the need to use robots in many life areas is increased. There is a great diversity in this field, depending on the type of task required, as the robot enters the parcels of air, land, and water. In this paper, a robot's mission designed to move things is concentrated, relying on line-tracing technology that makes it easy to track its path safely, the RFID is distributed in its approach. When the robot reads the RFID tag, it stops until it raises the load from above, the robot continues its path toward the target. When an obstacle obstructs the robot path, the robot deviates and returns after a while to its previous approach. All this technology is implemented using a new algorithm which is programmed using the visual basic program. The robot designed to transfer the stored material is used according to a site known as an identifier that is identified by the RFID value, where the robot is programmed through a microcontroller and a unique store program that determines the current location and the desired location, then is given the task for the robot to do it as required. The robot is controlled using an ATmega controller to control other parts connected to the electronic circuit, the particular infrared sensor, and ultrasound to avoid potential obstacles within the robot's path to reach the target safely. In addition to this, the robot is made up of an RFID sensor to give unique to each desired target site. Through the console, it is possible to know the link indicated by the target. The H-bridge is also used to obtain a particular command and guide the robot as needed to move freely in all directions and a DC motor which is unique for moving wheels at the desired speed, and Bluetooth for programmable and secure wireless transmission and reception with all these parts through a unique program that also uses application inventory. The robot has proven to be a great success in performing the required task through several tests that have been practically performed.

Article
Performance of Non-Orthogonal Multiple Access (NOMA) with Successive Interference Cancellation (SIC)

Ali K. Marzook, Hayder J. Mohammed, Hisham L. Swadi Roomi

Pages: 152-156

PDF Full Text
Abstract

Non-Orthogonal Multiple Access (NOMA) has been promised for fifth generation (5G) cellular wireless network that can serve multiple users at same radio resources time, frequency, and code domains with different power levels. In this paper, we present a new simulation compression between a random location of multiple users for Non-Orthogonal Multiple Access (NOMA) and Orthogonal Multiple Access (OMA) that depend on Successive Interference Cancellation (SIC) and generalized the suggested joint user pairing for NOMA and beyond cellular networks. Cell throughput and Energy Efficiency (EE) are gained are developed for all active NOMA user in suggested model. Simulation results clarify the cell throughput for NOMA gained 7 Mpbs over OMA system in two different scenarios deployed users (3 and 4). We gain an attains Energy Efficiency (EE) among the weak power users and the stronger power users.

Article
Privacy Issues in Vehicular Ad-hoc Networks: A Review

Zahra K. Farhood, Ali A. Abed, Sarah Al-Shareeda

Pages: 25-36

PDF Full Text
Abstract

Vehicle Ad-hoc Network (VANET) is a type of wireless network that enables communication between vehicles and Road Side Units (RSUs) to improve road safety, traffic efficiency, and service delivery. However, the widespread use of vehicular networks raises serious concerns about users’ privacy and security. Privacy in VANET refers to the protection of personal information and data exchanged between vehicles, RSUs, and other entities. Privacy issues in VANET include unauthorized access to location and speed information, driver and passenger identification, and vehicle tracking. To ensure privacy in VANET, various technologies such as pseudonymization, message authentication, and encryption are employed. When vehicles frequently change their identity to avoid tracking, message authentication ensures messages are received from trusted sources, and encryption is used to prevent unauthorized access to messages. Therefore, researchers have presented various schemes to improve and enhance the privacy efficiency of vehicle networks. This survey article provides an overview of privacy issues as well as an in-depth review of the current state-of-the-art pseudonym-changing tactics and methodologies proposed.

Article
A Study of the Optimal Allocation of Shunt Capacitor Based on Modified Loss Sensitivity Algorithm

Warid Sayel Warid, Emad Allawi Mohsin

Pages: 56-61

PDF Full Text
Abstract

Minimization of active power losses is one of the essential aims for any electric utility, due to its importance in improvement of system properties towards minimum production cost and to support increase load requirement. In this paper we have studied the possibility of reducing the value of real power losses for (IEEE-14- Bus bar) global system transmission lines by choosing the best location to install shunt capacitor depending on new algorithm for calculate the optimal allocation, which considering the value of real power losses derivative with injection reactive power as an indicator of the ability of reducing losses at load buses. The results show the validity of this method for application in electric power transmission lines.

Article
Indoor Low Cost Assistive Device using 2D SLAM Based on LiDAR for Visually Impaired People

Heba Hakim, Ali Fadhil

Pages: 115-121

PDF Full Text
Abstract

Many assistive devices have been developed for visually impaired (VI) person in recent years which solve the problems that face VI person in his/her daily moving. Most of researches try to solve the obstacle avoidance or navigation problem, and others focus on assisting VI person to recognize the objects in his/her surrounding environment. However, a few of them integrate both navigation and recognition capabilities in their system. According to above needs, an assistive device is presented in this paper that achieves both capabilities to aid the VI person to (1) navigate safely from his/her current location (pose) to a desired destination in unknown environment, and (2) recognize his/her surrounding objects. The proposed system consists of the low cost sensors Neato XV-11 LiDAR, ultrasonic sensor, Raspberry pi camera (CameraPi), which are hold on a white cane. Hector SLAM based on 2D LiDAR is used to construct a 2D-map of unfamiliar environment. While A* path planning algorithm generates an optimal path on the given 2D hector map. Moreover, the temporary obstacles in front of VI person are detected by an ultrasonic sensor. The recognition system based on Convolution Neural Networks (CNN) technique is implemented in this work to predict object class besides enhance the navigation system. The interaction between the VI person and an assistive system is done by audio module (speech recognition and speech synthesis). The proposed system performance has been evaluated on various real-time experiments conducted in indoor scenarios, showing the efficiency of the proposed system.

Article
Separate and Combined Effective Coding of Bit Planes of Grayscale Images

Oday Jasim Mohammed Al-Furaiji, Viktar Yurevich Tsviatkou, Baqir Jafar Sadiq

Pages: 128-137

PDF Full Text
Abstract

Currently, an approach involving a coder with a combined structure for compressing images combining several different coders, the system for connecting them to various bit planes, and the control system for these connections have not been studied. Thus, there is a need to develop a structure and study the effectiveness of a combined codec for compressing images of various types without loss in the spatial domain based on arithmetic and (Run-Length Encoding) RLE-coding algorithms. The essence of separate effective coding is to use independent coders of the same type or one coder connected to the planes alternately in order to compress the higher and lower bit planes of the image or their combinations. In this paper, the results of studying the effectiveness of using a combination of arithmetic and RLE coding for several types of images are presented. As a result of developing this structure, the effectiveness of combined coding for compressing the differences in the channels of hyperspectral images (HSI) has been established, as hyperspectral images consist of multi-spectral bands, instead of just the typical three bands (RGB) or (YCbCr) found in regular images. Where, each pixel in a hyperspectral image represents the entire spectrum of light reflected by the object or scene at that particular location.

Article
Damping of Power Systems Oscillations by using Genetic Algorithm-Based Optimal Controller Damping of Power Systems Oscillations by using Genetic Algorithm-Based Optimal Controller

Akram F. Bati

Pages: 50-55

PDF Full Text
Abstract

In this paper, the power system stabilizer (PSS) and Thyristor controlled phase shifter(TCPS) interaction is investigated . The objective of this work is to study and design a controller capable of doing the task of damping in less economical control effort, and to globally link all controllers of national network in an optimal manner , toward smarter grids . This can be well done if a specific coordination between PSS and FACTS devices , is accomplished . Firstly, A genetic algorithm-based controller is used. Genetic Algorithm (GA) is utilized to search for optimum controller parameter settings that optimize a given eigenvalue based objective function. Secondly, an optimal pole shifting, based on modern control theory for multi-input multi-output systems, is used. It requires solving first order or second order linear matrix Lyapunov equation for shifting dominant poles to much better location that guaranteed less overshoot and less settling time of system transient response following a disturbance.

Article
Centralized approach for multi-node localization and identification

Ola A. Hasan, Ramzy S. Ali, Abdulmuttalib T. Rashid

Pages: 178-187

PDF Full Text
Abstract

A new algorithm for the localization and identification of multi-node systems has been introduced in this paper; this algorithm is based on the idea of using a beacon provided with a distance sensor and IR sensor to calculate the location and to know the identity of each visible node during scanning. Furthermore, the beacon is fixed at middle of the frame bottom edge for a better vision of nodes. Any detected node will start to communicate with the neighboring nodes by using the IR sensors distributed on its perimeter; that information will be used later for the localization of invisible nodes. The performance of this algorithm is shown by the implementation of several simulations .

Article
Authentication Healthcare Scheme in WBAN

Abdullah Mohammed Rashid, Ali A. Yassin, Abdulla J. Y. Aldarwish, Aqeel A. Yaseen, Hamid Alasadi, Ammar Asaad, Alzahraa J. Mohammed

Pages: 118-127

PDF Full Text
Abstract

A wireless body area network (WBAN) connects separate sensors in many places of the human body, such as clothes, under the skin. WBAN can be used in many domains such as health care, sports, and control system. In this paper, a scheme focused on managing a patient’s health care is presented based on building a WBAN that consists of three components, biometric sensors, mobile applications related to the patient, and a remote server. An excellent scheme is proposed for the patient’s device, such as a mobile phone or a smartwatch, which can classify the signal coming from a biometric sensor into two types, normal and abnormal. In an abnormal signal, the device can carry out appropriate activities for the patient without requiring a doctor as a first case. The patient does not respond to the warning message in a critical case sometimes, and the personal device sends an alert to the patient’s family, including his/her location. The proposed scheme can preserve the privacy of the sensitive data of the patient in a protected way and can support several security features such as mutual authentication, key management, anonymous password, and resistance to malicious attacks. These features have been proven depending on the Automated Validation of Internet Security Protocols and Applications. Moreover, the computation and communication costs are efficient compared with other related schemes.

Article
Wireless Sensor Network for Medical Applications

Hanady S.Ahmed, Abduladhem Abdulkareem Ali

Pages: 49-59

PDF Full Text
Abstract

This work presents a healthcare monitoring system that can be used in an intensive care room. Biological information represented by ECG signals is achieved by ECG acquisition part . AD620 Instrumentation Amplifier selected due to its low current noise. The ECG signals of patients in the intensive care room are measured through wireless nodes. A base node is connected to the nursing room computer via a USB port , and is programmed with a specific firmware. The ECG signals are transferred wirelessly to the base node using nRF24L01+ wireless module. So, the nurse staff has a real time information for each patient available in the intensive care room. A star Wireless Sensor Network is designed for collecting ECG signals . ATmega328 MCU in the Arduino Uno board used for this purpose. Internet for things used For transferring ECG signals to the remote doctor, a Virtual Privet Network is established to connect the nursing room computer and the doctor computer . So, the patients information kept secure. Although the constructed network is tested for ECG monitoring, but it can be used to monitor any other signals. INTRODUCTION For elderly people, or the patient suffering from the cardiac disease it is very vital to perform accurate and quick diagnosis. Putting such person under continuous monitoring is very necessary. (ECG) is one of the critical health indicators that directly bene ¿ t from long-term monitoring. ECG signal is a time-varying signal representing the electrical activity of the heart. It is an effective, non- invasive diagnostic tool for cardiac monitoring[1]. In this medical field, a big improvement has been achieved in last few years. In the past, several remote monitoring systems using wired communications were accessible while nowadays the evolution of wireless communication means enables these systems to operate everywhere in the world by expanding internet benefits, applications, and services [2]. Wireless Sensor Networks (WSNs), as the name suggests consist of a network of wireless nodes that have the capability to sense a parameter of interest like temperature, humidity, vibration etc[3,4]. The health care application of wireless sensory network attracts many researches nowadays[ 5-7] . Among these applications ECG monitoring using smart phones[6,8], wearable Body sensors[9], remote patient mentoring[10],...etc. This paper presents wireless ECG monitoring system for people who are lying at intensive care room. At this room ECG signals for every patient are measured using wireless nodes then these signals are transmitted to the nursing room for remote monitoring. The nursing room computer is then connected to the doctors computer who is available at any location over the word by Virtual Privet Network (VPN) in such that the patients information is kept secure and inaccessible from unauthorized persons. II. M OTE H ARDWARE A RCHITECTURE The proposed mote as shown in Fig.1 consists of two main sections : the digital section which is represented by the Arduino UNO Board and the wireless module and the analog section. The analog section consists of Instrumentation Amplifier AD620 , Bandpass filter and an operational amplifier for gain stage, in addition to Right Leg Drive Circuit. The required power is supplied by an internal 3800MAH Lithium-ion (Li-ion) battery which has 3.7V output voltage.

Article
Reduced Area and Low Power Implementation of FFT/IFFT Processor

Shefa A. Dawwd, Suha. M. Nori

Pages: 108-119

PDF Full Text
Abstract

The Fast Fourier Transform (FFT) and Inverse FFT(IFFT) are used in most of the digital signal processing applications. Real time implementation of FFT/IFFT is required in many of these applications. In this paper, an FPGA reconfigurable fixed point implementation of FFT/IFFT is presented. A manually VHDL codes are written to model the proposed FFT/IFFT processor. Two CORDIC-based FFT/IFFT processors based on radix-2and radix-4 architecture are designed. They have one butterfly processing unit. An efficient In-place memory assignment and addressing for the shared memory of FFT/IFFT processors are proposed to reduce the complexity of memory scheme. With "in-place" strategy, the outputs of butterfly operation are stored back to the same memory location of the inputs. Because of using DIF FFT, the output was to be in reverse order. To solve this issue, we have re-use the block RAM that used for storing the input sample as reordering unit to reduce hardware cost of the proposed processor. The Spartan-3E FPGA of 500,000 gates is employed to synthesize and implement the proposed architecture. The CORDIC based processors can save 40% of power consumption as compared with Xilinx logic core architectures of system generator.

Article
An Adaptive Steganography Insertion Technique Based on Cosine Transform

Taif Alobaidi, Wasfy Mikhael

Pages: 45-58

PDF Full Text
Abstract

In the last couple decades, several successful steganography approaches have been proposed. Least Significant Bit (LSB) Insertion technique has been deployed due to its simplicity in implementation and reasonable payload capacity. The most important design parameter in LSB techniques is the embedding location selection criterion. In this work, LSB insertion technique is proposed which is based on selecting the embedding locations depending on the weights of coefficients in Cosine domain (2D DCT). The cover image is transformed to the Cosine domain (by 2D DCT) and predefined number of coefficients are selected to embed the secret message (which is in the binary form). Those weights are the outputs of an adaptive algorithm that analyses the cover image in two domains (Haar and Cosine). Coefficients, in the Cosine transform domain, with small weights are selected. The proposed approach is tested with samples from the BOSSbase, and a custom-built databases. Two metrics are utilized to show the effectiveness of the technique, namely, Root Mean Squared Error (RMSE), and Peak Signal-to-Noise Ratio (PSNR). In addition, human visual inspection of the result image is also considered. As shown in the results, the proposed approach performs better, in terms of (RMSE, and PSNR) than commonly employed truncation and energy based methods.

Article
Vehicle Remote Support and Surveillance System

Ahmed J. Abid, Ramzy S. Ali, Rafah A. Saheb

Pages: 55-63

PDF Full Text
Abstract

the proposed design offers a complete solution to support and surveillance vehicles remotely. The offered algorithm allows a monitoring center to track vehicles; diagnoses fault remotely, control the traffic and control CO emission. The system is programmed to scan the on-board diagnostic OBD periodically or based on request to check if there are any faults and read all the available sensors, then make an early fault prediction based on the sensor readings, an experience with the vehicle type and fault history. It is so useful for people who are not familiar with fault diagnosis as well as the maintenance center. The system offers tracking the vehicle remotely, which protects it against theft and warn the driver if it exceeds the speed limit according to its location. Finally, it allows the user to report any traffic congestion and allow s a vehicle navigator to be up to date with the traffic condition based on the other system’s user feedback.

Article
Design and Implementation of Line Follower Arduino Mobile Robot Using Matlab Simulink Toolbox

Mazin Majid Abdulnabi Alwan, Anwar Abdulrazzaq Green, Abdulazez Safaa Noori, Ammar A. Aldair

Pages: 11-16

PDF Full Text
Abstract

The main problem of line follower robot is how to make the mobile robot follows a desired path (which is a line drawn on the floor) smoothly and accurately in shortest time. In this paper, the design and implementation of a complex line follower mission is presented by using Matlab Simulink toolbox. The motion of mobile robot on the complex path is simulated by using the Robot Simulator which is programed in Matlab to design and test the performance of the proposed line follower algorithm and the designed PID controller. Due to the complexity of selection the parameters of PID controller, the Particle Swarm Optimization (PSO) algorithm are used to select and tune the parameters of designed PID controller. Five Infrared Ray (IR) sensors are used to collect the information about the location of mobile robot with respect to the desired path (black line). Depending on the collected information, the steering angle of the mobile robot will be controlled to maintain the robot on the desired path by controlling the speed of actuators (two DC motors). The obtained simulation results show that, the motion of mobile robot is still stable even the complex maneuver is performed. The hardware design of the robot system is perform by using the Arduino Mobile Robot (AMR). The Simulink Support Package for Arduino and control system toolbox are used to program the AMR. The practical results show that the performances of real mobile robot are exactly the same of the performances of simulated mobile robot.

Article
New Replica Selection Technique for Binding Replica Sites in Data Grids

Rafah M. Almuttairi, Rajeev Wankar, Atul Negi, C. R. Rao, Mahdi S. Almahna

Pages: 186-193

PDF Full Text
Abstract

The objective in Data Grids is to reduce access and file (replica) transfer latencies, as well as to avoid single site congestion by the numerous requesters. To facilitate access and transfer of the data, the files of the Data Grid are distributed across the multiple sites. The effectiveness of a replica selection strategy in data grids depends on its ability to serve the requirement posed by the users' jobs. Most jobs are required to be executed at a specific execution time. To achieve the QoS perceived by the users, response time metrics should take into account a replica selection strategy. Total execution time needs to factor latencies due to network transfer rates and latencies due to search and location. Network resources affect the speed of moving the required data and searching methods can reduce scope for replica selection. This paper presents a replica selection strategy that adapts its criteria dynamically so as to best approximate application providers’ and clients’ requirements. We introduce a new selection technique (EST) that shows improved performance over the more common algorithms.

Article
Practical Implementation of an Indoor Robot Localization and Identification System using an Array of Anchor Nodes

Israa Sabri A. AL-Forati, Abdulmuttalib T. Rashid

Pages: 9-16

PDF Full Text
Abstract

This paper proposes a low-cost Light Emitting Diodes (LED) system with a novel arrangement that allows an indoor multi- robot localization. The proposed system uses only a matrix of low-cost LED installed uniformly on the ground of an environment and low-cost Light Dependent Resistor (LDR), each equipped on bottom of the robot for detection. The matrix of LEDs which are driven by a modified binary search algorithm are used as active beacons. The robot localizes itself based on the signals it receives from a group of neighbor LEDs. The minimum bounded circle algorithm is used to draw a virtual circle from the information collected from the neighbor LEDs and the center of this circle represents the robot’s location. The propose system is practically implemented on an environment with (16*16) matrix of LEDs. The experimental results show good performance in the localization process.

Article
Design and Implementation of Monitoring System for Lethal Events of High-Risk COVID-19 Patients

Suhad Qasim Naeem, Ammar Ibrahim Majeed, Noor Nateq ALfaisaly

Pages: 221-231

PDF Full Text
Abstract

The monitoring of COVID-19 patients has been greatly aided by the Internet of Things (IoT). Vital signs, symptoms, and mobility data can be gathered and analyzed by IoT devices, including wearables, sensors, and cameras. This information can be utilized to spot early infection symptoms, monitor the illness’s development, and stop the virus from spreading. It’s critical to take vital signs of hospitalized patients in order to assess their health. Although early warning scores are often calculated three times a day, they might not indicate decompensation symptoms right away. Death rates are higher when deterioration is not properly diagnosed. By employing wearable technology, these ongoing assessments may be able to spot clinical deterioration early and facilitate prompt therapies. This research describes the use of Internet of Things (IoT) to follow fatal events in high-risk COVID-19 patients. These patients’ vital signs, which include blood pressure, heart rate, respiration rate, blood oxygen level, and fever, are taken and fed to a central server on a regular basis so that information may be processed, stored, and published instantly. After processing, the data is utilized to monitor the patients’ condition and send Short Message Service (SMS) alerts when the patients’ vital signs rise above predetermined thresholds. The system’s design, which is based on two ESP32 controllers, sensors for the vital signs listed above, and a gateway, provides real-time reports, high-risk alerts, and patient status information. Clinicians, the patient’s family, or any other authorized person can keep an eye on and follow the patient’s status at any time and from any location. The main contribution in this work is the designed algorithm used in the gateway and the manner in which this gateway collects, analyze, process, and send the patient’s data to the IoT server from one side and the manner in which the gateway deals with the IoT server in the other side. The proposed method leads to reduce the cost and the time the system it takes to get the patient’s status report.

Article
Internet of Things Based Oil Pipeline Spill Detection System Using Deep Learning and LAB Colour Algorithm

Muhammad H. Obaid, Ali H. Hamad

Pages: 137-148

PDF Full Text
Abstract

Given the role that pipelines play in transporting crude oil, which is considered the basis of the global economy and across different environments, hundreds of studies revolve around providing the necessary protection for it. Various technologies have been employed in this pursuit, differing in terms of cost, reliability, and efficiency, among other factors. Computer vision has emerged as a prominent technique in this field, albeit requiring a robust image-processing algorithm for spill detection. This study employs image segmentation techniques to enable the computer to interpret visual information and images effectively. The research focuses on detecting spills in oil pipes caused by leakage, utilizing images captured by a drone equipped with a Raspberry Pi and Pi camera. These images, along with their global positioning system (GPS) location, are transmitted to the base station using the message queuing telemetry transport Internet of Things (MQTT IoT) protocol. At the base station, deep learning techniques, specifically Holistically-Nested Edge Detection (HED) and extreme inception (Xception) networks, are employed for image processing to identify contours. The proposed algorithm can detect multiple contours in the images. To pinpoint a contour with a black color, representative of an oil spill, the CIELAB color space (LAB) algorithm effectively removes shadow effects. If a contour is detected, its area and perimeter are calculated to determine whether it exceeds a certain threshold. The effectiveness of the proposed system was tested on Iraqi oil pipeline systems, demonstrating its capability to detect spills of different sizes.

Article
Transient stability Assessment using Artificial Neural Network Considering Fault Location

nan P.K.Olulope, nan K.A.Folly, nan S.Chowdhury, nan S.P.Chowdhury

Pages: 67-72

PDF Full Text
Abstract

This paper describes the capability of artificial neural network for predicting the critical clearing time of power system. It combines the advantages of time domain integration schemes with artificial neural network for real time transient stability assessment. The training of ANN is done using selected features as input and critical fault clearing time (CCT) as desire target. A single contingency was applied and the target CCT was found using time domain simulation. Multi layer feed forward neural network trained with Levenberg Marquardt (LM) back propagation algorithm is used to provide the estimated CCT. The effectiveness of ANN, the method is demonstrated on single machine infinite bus system (SMIB). The simulation shows that ANN can provide fast and accurate mapping which makes it applicable to real time scenario.

1 - 24 of 24 items

Search Parameters

Journal Logo
Iraqi Journal for Electrical and Electronic Engineering

College of Engineering, University of Basrah

  • Copyright Policy
  • Terms & Conditions
  • Privacy Policy
  • Accessibility
  • Cookie Settings
Licensing & Open Access

CC BY 4.0 Logo Licensed under CC-BY-4.0

This journal provides immediate open access to its content.

Editorial Manager Logo Elsevier Logo

Peer-review powered by Elsevier’s Editorial Manager®

Copyright © 2025 College of Engineering, University of Basrah. All rights reserved, including those for text and data mining, AI training, and similar technologies.