Iraqi Journal for Electrical and Electronic Engineering
Login
Iraqi Journal for Electrical and Electronic Engineering
  • Home
  • Articles & Issues
    • Latest Issue
    • All Issues
  • Authors
    • Submit Manuscript
    • Guide for Authors
    • Authorship
    • Article Processing Charges (APC)
    • Proofreading Service
  • Reviewers
    • Guide for Reviewers
    • Become a Reviewer
  • About
    • About Journal
    • Aims and Scope
    • Editorial Team
    • Journal Insights
    • Peer Review Process
    • Publication Ethics
    • Plagiarism
    • Allegations of Misconduct
    • Appeals and Complaints
    • Corrections and Withdrawals
    • Open Access
    • Archiving Policy
    • Abstracting and indexing
    • Announcements
    • Contact

Search Results for region

Article
A Survey on Segmentation Techniques for Image Processing

Wala’a N. Jasim, Rana Jassim Mohammed

Pages: 73-93

PDF Full Text
Abstract

The segmentation methods for image processing are studied in the presented work. Image segmentation can be defined as a vital step in digital image processing. Also, it is used in various applications including object co-segmentation, recognition tasks, medical imaging, content based image retrieval, object detection, machine vision and video surveillance. A lot of approaches were created for image segmentation. In addition, the main goal of segmentation is to facilitate and alter the image representation into something which is more important and simply to be analyzed. The approaches of image segmentation are splitting the images into a few parts on the basis of image’s features including texture, color, pixel intensity value and so on. With regard to the presented study, many approaches of image segmentation are reviewed and discussed. The techniques of segmentation might be categorized into six classes: First, thresholding segmentation techniques such as global thresholding (iterative thresholding, minimum error thresholding, otsu's, optimal thresholding, histogram concave analysis and entropy based thresholding), local thresholding (Sauvola’s approach, T.R Singh’s approach, Niblack’s approaches, Bernsen’s approach Bruckstein’s and Yanowitz method and Local Adaptive Automatic Binarization) and dynamic thresholding. Second, edge-based segmentation techniques such as gray-histogram technique, gradient based approach (laplacian of gaussian, differential coefficient approach, canny approach, prewitt approach, Roberts approach and sobel approach). Thirdly, region based segmentation approaches including Region growing techniques (seeded region growing (SRG), statistical region growing, unseeded region growing (UsRG)), also merging and region splitting approaches. Fourthly, clustering approaches, including soft clustering (fuzzy C-means clustering (FCM)) and hard clustering (K-means clustering). Fifth, deep neural network techniques such as convolution neural network, recurrent neural networks (RNNs), encoder-decoder and Auto encoder models and support vector machine. Finally, hybrid techniques such as evolutionary approaches, fuzzy logic and swarm intelligent (PSO and ABC techniques) and discusses the pros and cons of each method.

Article
Brain MRI Images Segmentation Based on U-Net Architecture

Assalah Zaki Atiyah, Khawla Hussein Ali

Pages: 21-27

PDF Full Text
Abstract

Brain tumors are collections of abnormal tissues within the brain. The regular function of the brain may be affected as it grows within the region of the skull. Brain tumors are critical for improving treatment options and patient survival rates to prevent and treat them. The diagnosis of cancer utilizing manual approaches for numerous magnetic resonance imaging (MRI) images is the most complex and time-consuming task. Brain tumor segmentation must be carried out automatically. A proposed strategy for brain tumor segmentation is developed in this paper. For this purpose, images are segmented based on region-based and edge-based. Brain tumor segmentation 2020 (BraTS2020) dataset is utilized in this study. A comparative analysis of the segmentation of images using the edge-based and region-based approach with U-Net with ResNet50 encoder, architecture is performed. The edge-based segmentation model performed better in all performance metrics compared to the region-based segmentation model and the edge-based model achieved the dice loss score of 0. 008768, IoU score of 0. 7542, f1 score of 0. 9870, the accuracy of 0. 9935, the precision of 0. 9852, recall of 0. 9888, and specificity of 0. 9951.

Article
Feasibility Study of Off-Grid Rural Electrification in Iraq: A Case Study of the AL-Teeb Area

Husam A. Salim, Jabbar R. Rashed

Pages: 251-263

PDF Full Text
Abstract

In developing nations, such as Iraq, supplying power to isolated and rural border areas that are not connected to the grid continues to be a problem. At present, fossil fuels, which are significant causes of pollution, supply around 80% of the world’s energy demands. Nonetheless, drastically reducing reliance on fossil fuels has many reasons, including depleting global fossil fuel supplies, increasing costs and growing energy needs. The present study examines the electrical requirements of the Al-Teeb area, a city situated in the eastern region of Iraq, close to the Iranian border. This region has not been researched despite its tourism and oil significance. Despite the unpredictable expansion of many isolated locations in Iraq in recent years, the number of generation stations has not changed. Supplying energy to these places will require considerable time and money. Photovoltaics (PV), wind turbines (WTs), diesel generators (DGs), batteries and converters combined on the basis of their compatibility under three distinct scenarios comprise the system’s components. Considering the lowest net present cost (NPC) and cost of energy (COE) of all the examined scenarios, PV, WTs, batteries and DGs are the most economical solutions for the Al-Teeb area. Number of PV (1,215), number of WTs (59), number of DGs (13), number of batteries (3,138), number of converters (47), COE (0.155 US$/kWh), NPC (14.2 million US$) and initial capital cost (4.91 million US$) are revealed by the results. Finally, the results are confirmed using another global optimization method, namely, modified particle swarm optimization.

Article
Parallel Search Using Probabilistic DNA Sticker Model to Cryptanyze One Time Pad Polyalphabetic Cipher

Basim Sahar Yaseen

Pages: 104-110

PDF Full Text
Abstract

Nowadays, it is difficult to imagine a powerful algorithm of cryptography that can continue cryptanalyzing and attacking without the use of unconventional techniques. Although some of the substitution algorithms are old, such as Vigen`ere, Alberti, and Trithemius ciphers, they are considered powerful and cannot be broken. In this paper we produce the novelty algorithm, by using of biological computation as an unconventional search tool combined with an uninhibited analysis method is the vertical probabilistic model, that makes attacking and analyzing these ciphers possible and very easy to transform the problem from a complex to a linear one, which is a novelty achievement. The letters of the encoded message are processed in the form of segments of equal length, to report the available hardware components. Each letter codon represents a region of the memory strand, and the letters calculated for it are symbolized within the probabilistic model so that each pair has a triple encoding: the first is given as a memory strand encoding and the others are its complement in the sticker encoding; These encodings differ from one region to another. The solution space is calculated and then the parallel search process begins. Some memory complexities are excluded even though they are within the solution paths formed, because the natural language does not contain its sequences. The precision of the solution and the time consuming of access to it depend on the length of the processed text, and the precision of the solution is often inversely proportional to the speed of access to it. As an average of the time spent to reach the solution, a text with a length of 200 cipher characters needs approximately 15 minutes to give 98% of the correct components of the specific hardware. The aim of the paper is to transform OTP substitution analysis from a NP problem to a O(nm) problem, which makes it easier to find solutions to it easily with the available capabilities and to develop methods that are harnessed to attack difficult and powerful ciphers that differ in class and type from the OTP polyalphabetic substitution ciphers.

Article
Region-Based Fractional Wavelet Transform Using Post Processing Artifact Reduction

Jassim M. Abdul-Jabbar, Alyaa Q. Ahmed Taqi

Pages: 45-53

PDF Full Text
Abstract

Wavelet-based algorithms are increasingly used in the source coding of remote sensing, satellite and other geospatial imagery. At the same time, wavelet-based coding applications are also increased in robust communication and network transmission of images. Although wireless multimedia sensors are widely used to deliver multimedia content due to the availability of inexpensive CMOS cameras, their computational and memory resources are still typically very limited. It is known that allowing a low-cost camera sensor node with limited RAM size to perform a multi-level wavelet transform, will in return limit the size of the acquired image. Recently, fractional wavelet filter technique became an interesting solution to reduce communication energy and wireless bandwidth, for resource-constrained devices (e.g. digital cameras). The reduction in the required memory in these fractional wavelet transforms is achieved at the expense of the image quality. In this paper, an adaptive fractional artifacts reduction approach is proposed for efficient filtering operations according to the desired compromise between the effectiveness of artifact reduction and algorithm simplicity using some local image features to reduce boundaries artifacts caused by fractional wavelet. Applying such technique on different types of images with different sizes using CDF 9/7 wavelet filters results in a good performance.

Article
Securing a Web-Based Hospital Management System Using a Combination of AES and HMAC

Alaa B. Baban, Safa A. Hameed

Pages: 93-99

PDF Full Text
Abstract

The demand for a secured web storage system is increasing daily for its reliability which ensures data privacy and confidentiality. The proposed paper aims to find the most secure ways to maintain integrity and protect privacy and security in healthcare management systems. The Advanced Encryption Standard (AES) algorithm is used to encrypt data transferred by providing a means to check the integrity of information transmitted and make it more immune to cyberattack techniques, this was implemented by using Keyed-Hash Message Authentication Code (HMAC) and Secured Hash Algorithm-256 (SHA-256). The risk of exposure to attackers can be avoided by using honeypot systems combined with Intrusion detection systems (IDSs) as a firewall system is not effective against such attacks alone. The experimental results evaluate the proposed security health information management system by comparing the performance of the encryption algorithm based on encryption time, memory and CPU usage, and entropy for different plaintext lengths. In addition, it can be seen that when changing the AES key size, more memory and time are required the longer the key size is used. The 128 bits AES key is therefore advised if the system must operate in hard real-time.

Article
Transient Response of Multiquantum Well Vertical-Cavity Surface Emitting Lasers

Raad S. Fyath, Saad M. Falh, Fadil R. Tahir

Pages: 64-76

PDF Full Text
Abstract

The dynamic performance of vertical-cavity surface emitting lasers (VCSEL) diodes can be enhanced by incorporating multiquantum-well (MQW) structure in the active region. This paper addresses the transient response of MQW-VCSEL by solving the laser rate equation in the large-signal regime. The analysis makes use of the energy band structure and optical gain spectrum obtained by applying Schrödinger equation to both conduction and valance bands. Simulation results are presented for $1.3~\mu m$ InGaAs/InP VCSEL and indicate clearly that a MQW laser has higher switching speed compared with bulk laser and this finding is more pronounced with small number of wells.

Article
Second-Order Statistical Methods GLCM for Authentication Systems

Mohammed A. Taha, Hanaa M. Ahmed

Pages: 88-93

PDF Full Text
Abstract

For many uses, biometric systems have gained considerable attention. Iris identification was One of the most powerful sophisticated biometrical techniques for effective and confident authentication. The current iris identification system offers accurate and reliable results based on near-infrared light (NIR) images when images are taken in a restricted area with fixed- distance user cooperation. However, for the color eye images obtained under visible wavelength (VW) without collaboration among the users, the efficiency of iris recognition degrades because of noise such as eye blurring images, eye lashing, occlusion, and reflection. This work aims to use the Gray-Level Co-occurrence Matrix (GLCM) to retrieve the iris's characteristics in both NIR iris images and visible spectrum. GLCM is second-order Statistical-Based Methods for Texture Analysis. The GLCM- based extraction technology was applied after the preprocessing method to extract the pure iris region's characteristics. The Energy, Entropy, Correlation, Homogeneity, and Contrast collection of second-order statistical features are determined from the generated co-occurrence matrix, Stored as a vector for numerical features. This approach is used and evaluated on the CASIA v1and ITTD v1 databases as NIR iris image and UBIRIS v1 as a color image. The results showed a high accuracy rate (99.2 %) on CASIA v1, (99.4) on ITTD v1, and (87%) on UBIRIS v1 evaluated by comparing to the other methods.

Article
Design and implementation of monitoring and warning (IOT) system for electricity poles

Jumana Amer AL-Hammoudi, Basil H. Jasim

Pages: 105-111

PDF Full Text
Abstract

There are many serious accidents on human life caused by electric current columns, and it is possible for the Internet of Things to find solutions to prevent the risks that occur, as in many fields such as medicine, agriculture, industry and others. In this paper, we will show monitoring and tracking of the current that passes through the electrical poles and the possible leakage, in addition to monitoring the temperature and humidity in the area, and knowing the condition of the light in the column according to morning and evening, this proposed system that will perform a general purpose added to the region. using Open source NODE MCU board, GPS positioning, current sensor, temperature and humidity sensor that provide desired data via open source platforms that we have chosen to be ThingSpeak that easily to handle.

Article
On the Performance of Wireless-Powered NOMA Communication Networks

Noor K. Breesam, Walid A. Al-Hussaibi, Falah H. Ali

Pages: 160-169

PDF Full Text
Abstract

In different modern and future wireless communication networks, a large number of low-power user equipment (UE) devices like Internet of Things, sensor terminals, and smart modules have to be supported over constrained power and bandwidth resources. Therefore, wireless-powered communication (WPC) is considered a promising technology for varied applications in which the energy harvesting (EH) from radio frequency radiations is exploited for data transmission. This requires efficient resource allocation schemes to optimize the performance of WPC and prolong the network lifetime. In this paper, harvest-then-transmit-based WP non-orthogonal multiple access (WP-NOMA) system is designed with time-split (TS) and power control (PC) allocation strategies. To evaluate the network performance, the sum rate and UEs’ rates expressions are derived considering power-domain NOMA with successive interference cancellation detection. For comparison purposes, the rate performance of the conventional WP orthogonal multiple access (WP-OMA) is derived also considering orthogonal frequency-division multiple access and time-division multiple access schemes. Intensive investigations are conducted to obtain the best TS and PC resource parameters that enable maximum EH for higher data transmission rates compared with the reference WP-OMA techniques. The achieved outcomes demonstrate the effectiveness of designed resource allocation approaches in terms of the realized sum rate, UE’s rate, rate region, and fairness without distressing the restricted power of far UEs.

Article
Emotion Recognition Based on Mining Sub-Graphs of Facial Components

Suhaila N. Mohammed, Alia K. Abdul Hassan

Pages: 39-48

PDF Full Text
Abstract

Facial emotion recognition finds many real applications in the daily life like human robot interaction, eLearning, healthcare, customer services etc. The task of facial emotion recognition is not easy due to the difficulty in determining the effective feature set that can recognize the emotion conveyed within the facial expression accurately. Graph mining techniques are exploited in this paper to solve facial emotion recognition problem. After determining positions of facial landmarks in face region, twelve different graphs are constructed using four facial components to serve as a source for sub-graphs mining stage using gSpan algorithm. In each group, the discriminative set of sub-graphs are selected and fed to Deep Belief Network (DBN) for classification purpose. The results obtained from the different groups are then fused using Naïve Bayes classifier to make the final decision regards the emotion class. Different tests were performed using Surrey Audio-Visual Expressed Emotion (SAVEE) database and the achieved results showed that the system gives the desired accuracy (100%) when fusion decisions of the facial groups. The achieved result outperforms state-of-the-art results on the same database.

Article
Bifurcations and Chaos in Current-Driven Induction Motor

Fatma N. Ayoob, Fadhil R. Tahir, Khalid M. Abdul-Hassan

Pages: 1-9

PDF Full Text
Abstract

In this paper, a model of PI-speed control current-driven induction motor based on indirect field oriented control (IFOC) is addressed. To assess the complex dynamics of a system, different dynamical properties, such as stability of equilibrium points, bifurcation diagrams, Lyapunov exponents spectrum, and phase portraits are characterized. It is found that the induction motor model exhibits chaotic behaviors when its parameters fall into a certain region. Small variations of PI parameters and load torque affect the dynamics and stability of this electric machine. A chaotic attractor has been observed and the speed of the motor oscillates chaotically. Numerical simulation results are validating the theoretical analysis.

Article
A Comprehensive Review of Image Segmentation Techniques

Salwa Khalid Abdulateef, Mohanad Dawood Salman

Pages: 166-175

PDF Full Text
Abstract

Image segmentation is a wide research topic; a huge amount of research has been performed in this context. Image segmentation is a crucial procedure for most object detection, image recognition, feature extraction, and classification tasks depend on the quality of the segmentation process. Image segmentation is the dividing of a specific image into a numeral of homogeneous segments; therefore, the representation of an image into simple and easy forms increases the effectiveness of pattern recognition. The effectiveness of approaches varies according to the conditions of objects arrangement, lighting, shadow and other factors. However, there is no generic approach for successfully segmenting all images, where some approaches have been proven to be more effective than others. The major goal of this study is to provide summarize of the disadvantages and the advantages of each of the reviewed approaches of image segmentation.

Article
Determination of Residential Electrical Load Components In Iraqi North Region

Majid. S. Al-Hafidh, Mudhafar A. Al-Nama, Azher S. Al-Fahadi

Pages: 161-165

PDF Full Text
Abstract

The residential electrical load in the city of Mosul as well as in most of cities in Iraq, is the major problem for the administration of electricity distribution. Since this kind of load is increasing drastically compared with other loads such as industrial, agricultural tourism and others which are declining for the last two decades due to unstable condition of the county. The residential electrical load components must be determined to solve the problems resulting from the significant increase in this load. This research aims to conduct a field survey to find out and identify the components of the residential electrical load ratios and qualitative change in the months of the year. The survey was conducted in the city of Mosul in northern Iraq. T he results were analyzed, and a number of recommendations were given to rationalize consumption.

1 - 14 of 14 items

Search Parameters

Journal Logo
Iraqi Journal for Electrical and Electronic Engineering

College of Engineering, University of Basrah

  • Copyright Policy
  • Terms & Conditions
  • Privacy Policy
  • Accessibility
  • Cookie Settings
Licensing & Open Access

CC BY 4.0 Logo Licensed under CC-BY-4.0

This journal provides immediate open access to its content.

Editorial Manager Logo Elsevier Logo

Peer-review powered by Elsevier’s Editorial Manager®

Copyright © 2025 College of Engineering, University of Basrah. All rights reserved, including those for text and data mining, AI training, and similar technologies.