Iraqi Journal for Electrical and Electronic Engineering
Login
Iraqi Journal for Electrical and Electronic Engineering
  • Home
  • Articles & Issues
    • Latest Issue
    • All Issues
  • Authors
    • Submit Manuscript
    • Guide for Authors
    • Authorship
    • Article Processing Charges (APC)
    • Proofreading Service
  • Reviewers
    • Guide for Reviewers
    • Become a Reviewer
  • About
    • About Journal
    • Aims and Scope
    • Editorial Team
    • Journal Insights
    • Peer Review Process
    • Publication Ethics
    • Plagiarism
    • Allegations of Misconduct
    • Appeals and Complaints
    • Corrections and Withdrawals
    • Open Access
    • Archiving Policy
    • Abstracting and indexing
    • Announcements
    • Contact

Search Results for p-q-theory

Article
Unified P-Q based STATCOM Control for Wind Driven Induction Generator

Ahmed A. A. Hafez a,b, R. M. Al-Bouthig, J. I. AL-Sadey

Pages: 10-17

PDF Full Text
Abstract

This paper principally advises a simple and reliable control for Static Synchronous Compensator (STATCOM) in a stand-alone wind driven self-excited induction generator power system. The control was proposed based on instantaneous P-Q theory. The advised control enjoys the merits of robustness, reliability and simplicity. The paper also proposes a dimensioning procedure for the STATCOM that involves advising an annotative analytical expression for sizing the DC-link capacitor. This procedure has the advantages of applicability for different reactive power compensators that depend on a separate DC-link in its operation. Comprehensive simulation results in Matlab environment were illustrated for corroborating the performance of the advised control under rigorous operating scenarios. The results show the feasibility, reliability and practicability of the proposed controller.

Article
Modeling and Simulation of Five-Phase Synchronous Reluctance Motor Fed by Five-Phase Inverter

Namariq Abdulameer Ameen, Ali Kadhim Abdulabbas, Habeeb Jaber Nekad

Pages: 58-65

PDF Full Text
Abstract

Five-phase machine employment in electric drive system is expanding rapidly in many applications due to several advantages that they present when compared with their three-phase complements. Synchronous reluctance machines(SynRM) are considered as a proposed alternative to permanent magnet machine in the automotive industry because the volatilities in the permanent magnet price, and a proposed alternative for induction motor because they have no field excitation windings in the rotor, SyRM rely on high reluctance torque thus no needing for magnetic material in the structure of rotor. This paper presents dynamic simulation of five phase synchronous reluctance motor fed by five phase voltage source inverter based on mathematical modeling. Sinusoidal pulse width modulation (SPWM) technique is used to generate the pulses for inverter. The theory of reference frame has been used to transform five-phase SynRM voltage equations for simplicity and in order to eliminate the angular dependency of the inductances. The torque in terms of phase currents is then attained using the known magnetic co-energy method, then the results obtained are typical.

Article
Theoretical Model for Heterojunction Phototransistor in Optoelectronic Switch Configurations Part 1: Optical Gain Characteristics

F. R. Tahir, R. S. Fyath

Pages: 44-53

PDF Full Text
Abstract

This paper presents a comprehensive analysis for the performance of heterojunction bipolar phototransistor (HPT) as an essential element for optoelectronic switch configurations. The theory of operation of the (HPT) is reviewed. Analytical expressions are drived for transistor current components, optical gain $G_{opt}$ and DC current gain $h_{FE}$ in common emitter configuration. The analysis enables one to study the influence of various structure parameters and incident optical power on the optical gain characteristics of the (HPT). Simulation results are presented for a $1.3~\mu m$ $\text{In}_{0.53}\text{Ga}_{0.47}\text{As}/\text{InP}$ structure.

Article
Study of Chaotic-based Audio Encryption Algorithms: A Review

Alaa Shumran, Abdul-Basset A. Al-Hussein

Pages: 85-103

PDF Full Text
Abstract

Nowadays, multimedia communication has become very widespread and this requires it to be protected from attackers and transmitted securely for reliability. Encryption and decryption techniques are useful in providing effective security for speech signals to ensure that these signals are transmitted with secure data and prevent third parties or the public from reading private messages. Due to the rapid improvement in digital communications over the recent period up to the present, the security of voice data transmitted over various networks has been classified as a favored field of study in earlier years. The contributions to audio encryption are discussed in this review. This Comprehensive review mainly focuses on presenting several kinds of methods for audio encryption and decryption the analysis of these methods with their advantages and disadvantages have been investigated thoroughly. It will be classified into encryption based on traditional methods and encryption based on advanced chaotic systems. They are divided into two types, continuous-time system, and discrete-time system, and also classified based on the synchronization method and the implementation method. In the fields of information and communications security, system designers face many challenges in both cost, performance, and architecture design, Field Programmable gate arrays (FPGAs) provide an excellent balance between computational power and processing flexibility. In addition, encryption methods will be classified based on Chaos-based Pseudo Random Bit Generator, Fractional-order systems, and hybrid chaotic generator systems, which is an advantageous point for this review compared with previous ones. Audio algorithms are presented, discussed, and compared, highlighting important advantages and disadvantages. Audio signals have a large volume and a strong correlation between data samples. Therefore, if traditional cryptography systems are used to encrypt such huge data, they gain significant overhead. Standard symmetric encryption systems also have a small key-space, which makes them vulnerable to attacks. On the other hand, encryption by asymmetric algorithms is not ideal due to low processing speed and complexity. Therefore, great importance has been given to using chaotic theory to encode audio files. Therefore, when proposing an appropriate encryption method to ensure a high degree of security, the key space, which is the critical part of every encryption system, and the key sensitivity must be taken into account. The key sensitivity is related to the initial values and control variables of the chaotic system chosen as the audio encryption algorithm. In addition, the proposed algorithm should eliminate the problems of periodic windows, such as limited chaotic range and non-uniform distribution, and the quality of the recovered audio signal remains good, which confirms the convenience, reliability, and high security.

Article
Chameleon Chaotic System-Based Audio Encryption Algorithm and FPGA Implementation

Alaa Shumran, Abdul-Basset A. Al-Hussein

Pages: 232-250

PDF Full Text
Abstract

Audio encryption has gained popularity in a variety of fields including education, banking over the phone, military, and private audio conferences. Data encryption algorithms are necessary for processing and sending sensitive information in the context of secure speech conversations. In recent years, the importance of security in any communications system has increased. To transfer data securely, a variety of methods have been used. Chaotic system-based encryption is one of the most significant encryption methods used in the field of security. Chaos-based communication is a promising application of chaos theory and nonlinear dynamics. In this research, a chaotic algorithm for the new chaotic chameleon system was proposed, studied, and implemented. The chameleon chaotic system has been preferred to be employed because it has the property of changing from self-excited (SA) to hidden-attractor (HA) which increases the complexity of the system dynamics and gives strength to the encryption algorithm. A chaotic chameleon system is one in which, depending on the parameter values, the chaotic attractor alternates between being a hidden attractor and a self-excited attractor. This is an important feature, so it is preferable to use it in cryptography compared to other types of chaotic systems. This model was first implemented using a Field Programmable Gate Array (FPGA), which is the first time it has been implemented in practical applications. The chameleon system model was implemented using MATLAB Simulink and the Xilinx System Generator model. Self-excited, hidden, and coexisting attractors are shown in the proposed system. Vivado software was used to validate the designs, and Xilinx ZedBoard Zynq-7000 FPGA was used to implement them. The dynamic behavior of the proposed chaotic system was also studied and analysis methods, including phase portrait, bifurcation diagrams, and Lyapunov exponents. Assessing the quality of the suggested method by doing analyses of many quality measures, including correlation, differential signal-to-noise ratio (SNR), entropy, histogram analysis, and spectral density plot. The numerical analyses and simulation results demonstrate how well the suggested method performs in terms of security against different types of cryptographic assaults.

Article
A Study on Pre-processing Algorithms for Metal Parts Inspection

Haider Sh. Hashim, Anton Satria Prabuwono, Siti Norul Huda Sheikh Abdullah

Pages: 1-4

PDF Full Text
Abstract

Pre-processing is very useful in a variety of situations since it helps to suppress information that is not related to the exact image processing or analysis task. Mathematical morphology is used for analysis, understanding and image processing. It is an influential method in the geometric morphological analysis and image understanding. It has befallen a new theory in the digital image processing domain. Edges detection and noise reduction are a crucial and very important pre-processing step. The classical edge detection methods and filtering are less accurate in detecting complex edge and filtering various types of noise. This paper proposed some useful mathematic morphological techniques to detect edge and to filter noise in metal parts image. The experimental result showed that the proposed algorithm helps to increase accuracy of metal parts inspection system.

Article
Ant Colony Algorithm (ACO) Applied for Tuning PI of Shunt Active Power Filter (SAPF)

Raheel Jawad, Rawaa Jawad, Zahraa Salman

Pages: 204-211

PDF Full Text
Abstract

In the present-day decade, the world has regarded an expansion in the use of non-linear loads. These a lot draw harmonic non- sinusoidal currents and voltages in the connection factor with the utility and distribute them with the useful resource of the overall performance of it. The propagation of these currents and voltages into the grids have an effect on the electricity constructions in addition to the one of various client equipment. As a result, the electrical strength notable has come to be critical trouble for each client and distributor of electrical power. Active electrical electricity filters have been proposed as environment splendid gear for electrical power pinnacle notch enchantment and reactive electrical strength compensation. Active Power Filters (APFs) have Flipped out to be a possible wish in mitigating the harmonics and reactive electrical electricity compensation in single-phase and three-phase AC electrical energy networks with Non-Linear Loads (NLLs). Conventionally, this paper applied Ant Colony Algorithm (ACO) for tuning PI and reduce Total Harmonic Distortion (THD). The result show reduces THD at 2.33%.

Article
Design and FPGA Implementation of a Hyper-Chaotic System for Real-time Secure Image Transmission

Abdul-Basset A. Al-Hussein, Fadhil Rahma Tahir, Ghaida A. Al-Suhail

Pages: 55-68

PDF Full Text
Abstract

Recently, chaos theory has been widely used in multimedia and digital communications due to its unique properties that can enhance security, data compression, and signal processing. It plays a significant role in securing digital images and protecting sensitive visual information from unauthorized access, tampering, and interception. In this regard, chaotic signals are used in image encryption to empower the security; that’s because chaotic systems are characterized by their sensitivity to initial conditions, and their unpredictable and seemingly random behavior. In particular, hyper-chaotic systems involve multiple chaotic systems interacting with each other. These systems can introduce more randomness and complexity, leading to stronger encryption techniques. In this paper, Hyper-chaotic Lorenz system is considered to design robust image encryption/ decryption system based on master-slave synchronization. Firstly, the rich dynamic characteristics of this system is studied using analytical and numerical nonlinear analysis tools. Next, the image secure system has been implemented through Field-Programmable Gate Arrays (FPGAs) Zedboard Zynq xc7z020-1clg484 to verify the image encryption/decryption directly on programmable hardware Kit. Numerical simulations, hardware implementation, and cryptanalysis tools are conducted to validate the effectiveness and robustness of the proposed system.

Article
Proposed Method for Optimizing Fuzzy linear programming Problems by using Two-Phase Technique

Zaki S. Towfik, Sabiha Fathil Jawad

Pages: 89-96

PDF Full Text
Abstract

Fuzzy linear programming (FLP ) is an application of fuzzy set theory in linear decision making problems and most of these problems are related to linear programming contains fuzzy constrains or crisp objectives function or contains crisp constrains with fuzzy objectives function, which called fuzzy linear programming (FLP) with triplet fuzzy numbers consist a hybrid fuzzy. The crisp constrains used in the problems of types (= or ≥) with a proposed optimization fuzzy objectives and fuzzy constrains. In this paper proposed method for solving fuzzy linear programming problem by using Two-phase technique to solve the problem and to determine the optima crisp objectives.

Article
Series and Parallel Arc Fault Detection in Electrical Buildings Based on Discrete Wavelet Theory

Elaf Abed Saeed, Khalid M. Abdulhassan, Osama Y. K. Al-Atbee

Pages: 94-101

PDF Full Text
Abstract

Electrical issues such as old wires and faulty connections are the most common causes of arc faults. Arc faults cause electrical fires by generating high temperatures and discharging molten metal. Every year, such fires cause a considerable deal of destruction and loss. This paper proposes a new method for detecting residential series and parallel arc faults. A simulation model for the arc is employed to simulate the arc faults in series and parallel circuits. The fault features are then retrieved using a signal processing approach called Discrete Wavelet Transform (DWT) designed in MATLAB/Simulink based on the fault detection algorithm. Then db2 and one level were found appropriate mother and level of wavelet transform for extracting arc-fault features. MATLAB Simulink was used to build and simulate the arc-fault model.

Article
Damping of Power Systems Oscillations by using Genetic Algorithm-Based Optimal Controller Damping of Power Systems Oscillations by using Genetic Algorithm-Based Optimal Controller

Akram F. Bati

Pages: 50-55

PDF Full Text
Abstract

In this paper, the power system stabilizer (PSS) and Thyristor controlled phase shifter(TCPS) interaction is investigated . The objective of this work is to study and design a controller capable of doing the task of damping in less economical control effort, and to globally link all controllers of national network in an optimal manner , toward smarter grids . This can be well done if a specific coordination between PSS and FACTS devices , is accomplished . Firstly, A genetic algorithm-based controller is used. Genetic Algorithm (GA) is utilized to search for optimum controller parameter settings that optimize a given eigenvalue based objective function. Secondly, an optimal pole shifting, based on modern control theory for multi-input multi-output systems, is used. It requires solving first order or second order linear matrix Lyapunov equation for shifting dominant poles to much better location that guaranteed less overshoot and less settling time of system transient response following a disturbance.

Article
Robust Control Design for Two-Wheel Self-Balanced Mobile Robot

Hasanain H. Mohsin, Ammar A. Aldair, Walid A. Al-Hussaibi

Pages: 38-46

PDF Full Text
Abstract

As a key type of mobile robot, the two-wheel mobile robot has been developed rapidly for varied domestic, health, and industrial applications due to human-like movement and balancing characteristics based on the inverted pendulum theory. This paper presents a developed Two-Wheel Self-Balanced Robot (TWSBR) model under road disturbance effects and simulated using MATLAB Simscape Multibody. The considered physical-mechanical structure of the proposed TWSBS is connected with a Simulink controller scheme by employing physical signal converters to describe the system dynamics efficiently. Through the Simscape environment, the TWSBR motion is visualized and effectively analyzed without the need for complicated analysis of the associated mathematical model. Besides, 3D visualization of real-time behavior for the implemented TWSBR plant model is displayed by Simulink Mechanics Explorer. Robot balancing and stability are achieved by utilizing Proportional Integral Derivative (PID) and Linear Quadratic Regulator (LQR) controllers' approaches considering specific control targets. A comparative study and evaluation of both controllers are conducted to verify the robustness and road disturbance rejection. The realized performance and robustness of developed controllers are observed by varying object-carrying loaded up on mechanical structure layers during robot motion. In particular, the objective weight is loaded on the robot layers (top, middle, and bottom) during disturbance situations. The achieved findings may have the potential to extend the deployment of using TWSBRs in the varied important application.

Article
Short Circuit Faults Identification and Localization in IEEE 34 Nodes Distribution Feeder Based on the Theory of Wavelets

Sara J. Authafa, Khalid M. Abdul-Hassan

Pages: 65-79

PDF Full Text
Abstract

In this paper a radial distribution feeder protection scheme against short circuit faults is introduced. It is based on utilizing the substation measured current signals in detecting faults and obtaining useful information about their types and locations. In order to facilitate important measurement signals features extraction such that better diagnosis of faults can be achieved, the discrete wavelet transform is exploited. The captured features are then utilized in detecting, identifying the faulted phases (fault type), and fault location. In case of a fault occurrence, the detection scheme will make a decision to trip out a circuit breaker residing at the feeder mains. This decision is made based on a criteria that is set to distinguish between the various system states in a reliable and accurate manner. After that, the fault type and location are predicted making use of the cascade forward neural networks learning and generalization capabilities. Useful information about the fault location can be obtained provided that the fault distance from source, as well as whether it resides on the main feeder or on one of the laterals can be predicted. By testing the functionality of the proposed scheme, it is found that the detection of faults is done fastly and reliably from the view point of power system protection relaying requirements. It also proves to overcome the complexities provided by the feeder structure to the accuracy of the identification process of fault types and locations. All the simulations and analysis are performed utilizing MATLAB R2016b version software package.

Article
An Efficient Diffusion Approach for Chaos-Based Image Encryption and DNA Sequences

Ghofran Khaled Shraida, Hameed Abdulkareem Younis

Pages: 69-74

PDF Full Text
Abstract

Experts and researchers in the field of information security have placed a high value on the security of image data in the last few years. They have presented several image encryption techniques that are more secure. To increase the security level of image encryption algorithms, this article offers an efficient diffusion approach for image encryption methods based on one- dimensional Logistic, three-dimensional Lorenz, DNA encoding and computing, and SHA-256. The encryption test demonstrates that the method has great security and reliability. This article, also, examines the security of encryption methods, such as secret key space analysis, key sensitivity test, histogram analysis, information entropy process, correlation examination, and differential attack. When the image encryption method described in this article is compared to several previous image encryption techniques, the encryption algorithm has higher information entropy and a lower correlation coefficient.

Article
Dynamic Model of Linear Induction Motor Considering the End Effects

Dr. Haroutuon A. Hairik, Mohammed H. Hassan

Pages: 38-50

PDF Full Text
Abstract

In this paper the dynamic behavior of linear induction motor is described by a mathematical model taking into account the end effects and the core losses. The need for such a model rises due to the complexity of linear induction motors electromagnetic field theory. The end affects are modeled by introducing a speed dependent scale factor to the magnetizing inductance and series resistance in the d-axis equivalent circuit. Simulation results are presented to show the validity of the model during both no-load and sudden load change intervals. This model can also be used directly in simulation researches for linear induction motor vector control drive systems.

Article
Hover Control for Helicopter Using Neural Network-Based Model Reference Adaptive Controller

Abdul-Basset A. Al-Hussein

Pages: 67-72

PDF Full Text
Abstract

Unmanned aerial vehicles (UAV), have enormous important application in many fields. Quanser three degree of freedom (3-DOF) helicopter is a benchmark laboratory model for testing and validating the validity of various flight control algorithms. The elevation control of a 3-DOF helicopter is a complex task due to system nonlinearity, uncertainty and strong coupling dynamical model. In this paper, an RBF neural network model reference adaptive controller has been used, employing the grate approximation capability of the neural network to match the unknown and nonlinearity in order to build a strong MRAC adaptive control algorithm. The control law and stable neural network updating law are determined using Lyapunov theory.

1 - 16 of 16 items

Search Parameters

Journal Logo
Iraqi Journal for Electrical and Electronic Engineering

College of Engineering, University of Basrah

  • Copyright Policy
  • Terms & Conditions
  • Privacy Policy
  • Accessibility
  • Cookie Settings
Licensing & Open Access

CC BY 4.0 Logo Licensed under CC-BY-4.0

This journal provides immediate open access to its content.

Editorial Manager Logo Elsevier Logo

Peer-review powered by Elsevier’s Editorial Manager®

Copyright © 2025 College of Engineering, University of Basrah. All rights reserved, including those for text and data mining, AI training, and similar technologies.