Volume 18, Issue 1

June 2022

<Previous Issue  Next Issue>

Electronic Version


Open Access
Face Recognition System Against Adversarial Attack Using Convolutional Neural Network
Ansam Kadhim and Salah Al-Darraji
Pages: 1-8
Version of record online: 06 November 2021      Full Text (PDF) DOI:10.37917/ijeee.18.1.1
Face recognition is the technology that verifies or recognizes faces from images, videos, or real-time streams. It can be used in security or employee attendance systems. Face recognition systems may encounter some attacks that reduce their ability to recognize faces properly. So, many noisy images mixed with original ones lead to confusion in the results. Various attacks that exploit this weakness affect the face recognition systems such as Fast Gradient Sign Method (FGSM), Deep Fool, and Projected Gradient Descent (PGD). This paper proposes a method to protect the face recognition system against these attacks by distorting images through different attacks, then training the recognition deep network model, specifically Convolutional Neural Network (CNN), using the original and distorted images. Diverse experiments have been conducted using combinations of original and distorted images to test the effectiveness of the system. The system showed an accuracy of 93% using FGSM attack, 97% using deep fool, and 95% using PGD. 
Open Access
Review in IoT for Healthcare in Our Life
Bayadir A. Issa and Qabeela Q. Thabit
Pages: 9-20
Version of record online: 06 November 2021      Full Text (PDF) DOI:10.37917/ijeee.18.1.2
Over the previous decade, significant research has been conducted in the field of healthcare services and their technological advancement. To be more precise, the Internet of Things (IoT) has demonstrated potential for connecting numerous medical devices, sensors, and healthcare professionals in order to deliver high-quality medical services in remote locations. This has resulted in an increase in patient safety, a decrease in healthcare expenses, an increase in the healthcare services’ accessibility, and an increase in the industry’s healthcare operational efficiency. This paper provides an overview of the possible healthcare uses of Internet of Things (IoT)-based technologies. The evolution of the HIoT application has been discussed in this article in terms of enabling technology, services of healthcare, and applications for resolving different healthcare challenges. Additionally, effort difficulties and drawbacks with the HIoT system are explored. In summary, this study provides a complete source of information on the many applications of HIoT together the purpose is to help future academics who are interested in working in the field and making advances gain knowledge into the issue.
Open Access
Brain MRI Images Segmentation Based on U-Net Architecture
Assalah Zaki Atiyah and Khawla Hussein Ali
Pages: 21-27
Version of record online: 20 November 2021      Full Text (PDF) DOI:10.37917/ijeee.18.1.3
Brain tumors are collections of abnormal tissues within the brain. The regular function of the brain may be affected as it grows within the region of the skull. Brain tumors are critical for improving treatment options and patient survival rates to prevent and treat them. The diagnosis of cancer utilizing manual approaches for numerous magnetic resonance imaging (MRI) images is the most complex and time-consuming task. Brain tumor segmentation must be carried out automatically. A proposed strategy for brain tumor segmentation is developed in this paper. For this purpose, images are segmented based on region-based and edge-based. Brain tumor segmentation 2020 (BraTS2020) dataset is utilized in this study. A comparative analysis of the segmentation of images using the edge-based and region-based approach with U-Net with ResNet50 encoder, architecture is performed. The edge-based segmentation model performed better in all performance metrics compared to the region-based segmentation model and the edge-based model achieved the dice loss score of 0. 008768, IoU score of 0. 7542, f1 score of 0. 9870, the accuracy of 0. 9935, the precision of 0. 9852, recall of 0. 9888, and specificity of 0. 9951.
Open Access
Facial Modelling and Animation: An Overview of The State-of-The Art
Samia Dawood Shakir and Ali A. Al-Azza
Pages: 28-37
Version of record online: 24 November 2021      Full Text (PDF) DOI:10.37917/ijeee.18.1.4
Animating human face presents interesting challenges because of its familiarity as the face is the part utilized to recognize individuals. This paper reviewed the approaches used in facial modeling and animation and described their strengths and weaknesses. Realistic face animation of computer graphic models of human faces can be hard to achieve as a result of the many details that should be approximated in producing realistic facial expressions. Many methods have been researched to create more and more accurate animations that can efficiently represent human faces. We described the techniques that have been utilized to produce realistic facial animation. In this survey, we roughly categorized the facial modeling and animation approach into the following classes: blendshape or shape interpolation, parameterizations, facial action coding system-based approaches, moving pictures experts group-4 facial animation, physics-based muscle modeling, performance driven facial animation, visual speech animation. 
Open Access
Series And Parallel Arc Fault Detection Based on Discrete Wavelet VS. FFT Techniques
Elaf Abed Saeed, Khalid M. Abdulhassan and Osama Y. Khudair
Pages: 38-47
Version of record online: 07 December 2021      Full Text (PDF) DOI:10.37917/ijeee.18.1.5
Arc problems are most commonly caused by electrical difficulties such as worn cables and improper connections. Electrical fires are caused by arc faults, which generate tremendous temperatures and discharge molten metal. Every year, flames of this nature inflict a great lot of devastation and loss. A novel approach for identifying residential series and parallel arc faults is presented in this study. To begin, arc faults in series and parallel are simulated using a suitable simulation arc model. The fault characteristics are then recovered using a signal processing technique based on the fault detection technique called Discrete Wavelet Transform (DWT), which is built in MATLAB/Simulink. Then came db2, and one level was discovered for obtaining arc-fault features. The suitable mother and level of wavelet transform should be used, and try to compare results with conventional methods (FFT-Fast Fourier Transform). MATLAB was used to build and simulate arc-fault models with these techniques. 
Open Access
Comparison of New Multilevel Inverter Topology with Conventional Topologies Used for Induction Heating System
Aws H. Al-Jrew, Jawad R. Mahmood and Ramzy S. Ali
Pages: 48-57
Version of record online: 16 January 2022      Full Text (PDF) DOI:10.37917/ijeee.18.1.6
In this article, a comparison of innovative multilevel inverter topology with standard topologies has been conducted. The proposed single phase five level inverter topology has been used for induction heating system. This suggested design generates five voltage levels with a fewer number of power switches. This reduction in number of switches decreases the switching losses and the number of driving circuits and reduce the complexity of control circuit. It also reduces the cost and size for the filter used. Analysis and comparison has been done among the conventional topologies (neutral clamped and cascade H-bridge multilevel inverters) with the proposed inverter topology. The analysis includes the total harmonic distortion THD, efficiency and overall performance of the inverter systems. The simulation and analysis have been done using MATLAB/ SIMULINK. The results show good performance for the proposed topology in comparison with the conventional topologies.
Open Access
Semantic Segmentation of Aerial Images Using U-Net Architecture
Sarah Kamel Hussein and Khawla Hussein Ali
Pages: 58-63
Version of record online: 19 January 2022      Full Text (PDF) DOI:10.37917/ijeee.18.1.7
Arial images are very high resolution. The automation for map generation and semantic segmentation of aerial images are challenging problems in semantic segmentation. The semantic segmentation process does not give us precise details of the remote sensing images due to the low resolution of the aerial images. Hence, we propose an algorithm U-Net Architecture to solve this problem. It is classified into two paths. The compression path (also called: the encoder) is the first path and is used to capture the image’s context. The encoder is just a convolutional and maximal pooling layer stack. The symmetric expanding path (also called: the decoder) is the second path, which is used to enable exact localization by transposed convolutions. This task is commonly referred to as dense prediction, which is completely connected to each other and also with the former neurons which gives rise to dense layers. Thus it is an end-to-end fully convolutional network (FCN), i.e. it only contains convolutional layers and does not contain any dense layer because of which it can accept images of any size. The performance of the model will be evaluated by improving the image using the proposed method U-NET and obtaining an improved image by measuring the accuracy compared with the value of accuracy with previous methods.
Open Access
IoT Based Gas Leakage Detection and Alarming System using Blynk platforms
Noor Kareem Jumaa, Younus Mohammed Abdulkhaleq, Muntadher Asaad Nadhim, and Tariq Aziz Abbas
Pages: 64-70
Version of record online: 26 February 2022      Full Text (PDF) DOI:10.37917/ijeee.18.1.8
Gas or liquefied petroleum gas (LPG) is a chemical substance resultant from petroleum and could be dangerous in industrial places or those that deal with this substance. Gas leakage causes many health issues. So, to prevent such catastrophes and in order to maintain a clean air environment, the workspace atmosphere should be frequently monitored and controlled. The proposed monitoring gas leakage detector system is based on Internet of Things (IoT) technology. NodeMCU ESP8266 Wi-Fi is used to be the microcontroller for the whole system. The combustible gas sensor (MQ2) is used in order to detect the presence of methane (CH4) and carbon monoxide gas (CO). MQ2 sensor will detect the concentration of the gas according to the voltage output of the sensor and the ESP8266 will send the data reading from the gas sensor to Blynk IoT platform over an IOS phone; data visualization is done using Thingspeak IoT Platform. Besides, a fan will immediately work upon the leakage occurs along with an alarming buzzer.
Open Access
Secure Patient Authentication Scheme in the Healthcare System Using Symmetric Encryption
Naba M. Hamed and Ali A. Yassin
Pages: 71-81
Version of record online: 3 March 2022      Full Text (PDF) DOI:10.37917/ijeee.18.1.9
Recently, the incorporation of state-of-the-art technology such as Electronic Healthcare Records (EHRs), networks, and cloud computing has transformed the traditional healthcare system. However, security problems have arisen as a result of the integration of technology.  Secure remote user authentication is a core part of the healthcare system to validate the user’s identification via an unsecured communication network. Since then, several remote user authentication schemes have been presented, each with its own set of pros and limitations. As a result, security, malicious attacks, and privacy concerns are considered one of the main challenges related to the healthcare system. In this paper, we propose a safe user authentication scheme for patients in the healthcare system that overcomes these flaws and confirms the security of the proposed work using scyther, a formal security tool. In the healthcare environment, our work provides an effective means to construct an environment capable of setting, registering, storing, searching, analyzing, authentication, and verifying electronic healthcare information in order to protect the information of patients. Furthermore, our suggested scheme uses symmetric encryption based on the crypto-hash function for accessing the anomaly of the patient’s identity and One-Time Password (OTP). Towards the end of the study, the performance analysis results indicate a delicate balance of security and performance that is frequently lacking in previous works.
Open Access
Design PI Controller for Tank Level in Industrial Process
Anwer Abdulkareem Ali and Mofeed Turky Rashid
Pages: 82-92
Version of record online: 5 March 2022      Full Text (PDF) DOI:10.37917/ijeee.18.1.10
In today’s chemical, refinery, and petrochemical sectors, separation tanks are one of the most significant separating processes. One or more separation tanks must operate consistently and reliably for multiple facilities’ safe and efficient operation. Therefore, in this paper, a PI controller unit has been designed to improve the performance of the tank level controller of the industrial process in Basrah Refinery Station. The overall system mathematical model has been derived and simulated by MATLAB to evaluate the performance. Further, to improve the performance of the tank level controller, optimal PI parameters should be calculated, which Closed-Loop PID Autotuner has been used for this task. Several experiments have been conducted to evaluate the performance of the proposed system. The results indicated that the PI controller based on the Autotuner Method is superior to the conventional PI controller in terms of ease to implement and configuration also less time to get optimal PI gains.
Open Access
Building A Control Unit of A Series-Parallel Hybrid Electric Vehicle by Using A Nonlinear Model Predictive Control (NMPC) Strategy
Maher Al-Flehawee, Auday Al-Mayyahi
Pages: 93-102
Version of record online: 31 March 2022      Full Text (PDF) DOI:10.37917/ijeee.18.1.11
Hybrid electric vehicles have received considerable attention because of their ability to improve fuel consumption compared to conventional vehicles. In this paper, a series-parallel hybrid electric vehicle is used because they combine the advantages of the other two configurations. In this paper, the control unit for a series-parallel hybrid electric vehicle is implemented using a Nonlinear Model Predictive Control (NMPC) strategy. The NMPC strategy needs to create a vehicle energy management optimization problem, which consists of the cost function and its constraints. The cost function describes the required control objectives, which are to improve fuel consumption and obtain a good dynamic response to the required speed while maintaining a stable value of the state of charge (SOC) for batteries. While the cost function is subject to the physical constraints and the mathematical prediction model that evaluate the vehicle’s behavior based on the current vehicle measurements. The optimization problem is solved at each sampling step using the (SQP) algorithm to obtain the optimum operating points of the vehicle’s energy converters, which are represented by the torque of the vehicle components.
Open Access
Expanding New Covid-19 Data with Conditional Generative Adversarial Networks
Haneen Majid and Khawla Hussein Ali
Pages: 103-110
Version of record online: 03 April 2022      Full Text (PDF) DOI:10.37917/ijeee.18.1.12
COVID-19 is an infectious viral disease that mostly affects the lungs. That quickly spreads across the world. Early detection of the virus boosts the chances of patients recovering quickly worldwide. Many radiographic techniques are used to diagnose an infected person such as X-rays, deep learning technology based on a large amount of chest x-ray images is used to diagnose COVID-19 disease. Because of the scarcity of available COVID-19 X-rays image, the limited COVID-19 Datasets are insufficient for efficient deep learning detection models. Another problem with a limited dataset is that training models suffer from over-fitting, and the predictions are not generalizable to address these problems. In this paper, we developed Conditional Generative Adversarial Networks (CGAN) to produce synthetic images close to real images for the COVID-19 case and traditional augmentation that was used to expand the limited dataset then used to train by Customized deep detection model. The Customized Deep learning model was able to obtain excellent detection accuracy of 97% accurate with only ten epochs. The proposed augmentation outperforms other augmentation techniques. The augmented dataset includes 6988 high-quality and resolution COVID-19 X-rays images. At the same time, the original COVID-19 X-rays images are only 587.
Open Access
Grid-Forming and Grid-Following Based Microgrid Inverters Control
Ali M. Jasim and Basil H. Jasim
Pages: 111-131
Version of record online: 21 April 2022      Full Text (PDF) DOI:10.37917/ijeee.18.1.13
Microgrids (ℳ-grids) can be thought of as a small-scale electrical network comprised of a mix of Distributed Generation (DG) resources, storage devices, and a variety of load species. It provides communities with a stable, secure, and renewable energy supply in either off-grid (grid-forming) or on-grid (grid-following) mode. In this work, a control strategy of coordinated power management for a Low Voltage (LV) ℳ-grid with integration of solar Photovoltaic (PV), Battery Energy Storage System (BESS) and three phase loads operated autonomously or connected to the utility grid has been created and analyzed in the Matlab Simulink environment. The main goal expressed here is to achieve the following points: (i) grid following, grid forming modes, and resynchronization mode between them, (ii) Maximum Power Point Tracking (MPPT) from solar PV using fuzzy logic technique, and active power regulator based boost converter using a Proportional Integral (PI) controller is activated when a curtailment operation is required, (iii) ℳ-grid imbalance compensation (negative sequence) due to large single-phase load is activated, and (iv) detection and diagnosis the fault types using Discrete Wavelet Transform (DWT). Under the influence of irradiance fluctuation on solar plant, the proposed control technique demonstrates how the adopted system works in grid-following mode (PQ control), grid- formation, and grid resynchronization to seamlessly connect the ℳ-grid with the main distribution system. In this system, a power curtailment management system is introduced in the event of a significant reduction in load, allowing the control strategy to be switched from MPPT to PQ control, permitting the BESS to absorb excess power. Also, in grid-following mode, the BESS’s imbalance compensation mechanism helps to reduce the negative sequence voltage that occurs at the Point of Common Coupling (PCC) bus as a result of an imbalance in the grid’s power supply. In addition to the features described above, this system made use of DWT to detect and diagnose various fault conditions.
Open Access
Five-Component Load Forecast in Residential Sector Using Smart Methods
Yamama A. I. Al-Nasiri, Hussein Al-bayaty, and Majid S.M. Al-Hafidh
Pages: 132-138
Version of record online: 23 April 2022      Full Text (PDF) DOI:10.37917/ijeee.18.1.14
The electrical load is affected by the weather conditions in many countries as well as in Iraq. The weather-sensitive electrical load is, usually, divided into two components, a weather-sensitive component, and a weather-insensitive component. The research provides a method for separating the weather-sensitive electrical load into five components. and aims to prove the efficiency of the five-component load Forecasting model. The artificial neural network was used to predict the weather-sensitive electrical load using the MATLAB R17a software. Weather data and loads were used for one year for Mosul City. The performance of the artificial neural network was evaluated using the mean squared error and the mean absolute percentage error. The results indicate the accuracy of the prediction model used, MAPE equal to 0.0402.
Open Access
A Comparison of COIVD-19 Cases Classification Based on Machine Learning Approaches
Oqbah Salim Atiyah and Saadi Hamad Thalij
Pages: 139-143
Version of record online: 25 April 2022      Full Text (PDF) DOI:10.37917/ijeee.18.1.15
COVID-19 emerged in 2019 in china, the worldwide spread rapidly, and caused many injuries and deaths among humans. Accurate and early detection of COVID-19 can ensure the long-term survival of patients and help prohibit the spread of the epidemic. COVID-19 case classification techniques help health organizations quickly identify and treat severe cases. Algorithms of classification are one the essential matters for forecasting and making decisions to assist the diagnosis, early identification of COVID-19, and specify cases that require to intensive care unit to deliver the treatment at appropriate timing. This paper is intended to compare algorithms of classification of machine learning to diagnose COVID-19 cases and measure their performance with many metrics, and measure mislabeling (false-positive and false-negative) to specify the best algorithms for speed and accuracy diagnosis. In this paper, we focus onto classify the cases of COVID-19 using the algorithms of machine learning. we load the dataset and perform dataset preparation, pre-processing, analysis of data, selection of features, split of data, and use of classification algorithm. In the first using four classification algorithms, (Stochastic Gradient Descent, Logistic Regression, Random Forest, Naive Bayes), the outcome of algorithms accuracy respectively was 99.61%, 94.82% ,98.37%,96.57%, and the result of execution time for algorithms respectively were 0.01s, 0.7s, 0.20s, 0.04. The Stochastic Gradient Descent of mislabeling was better. Second, using four classification algorithms, (eXtreme-Gradient Boosting, Decision Tree, Support Vector Machines, K_Nearest Neighbors), the outcome of algorithms accuracy was 98.37%, 99%, 97%, 88.4%, and the result of execution time for algorithms respectively were 0.18s, 0.02s, 0.3s, 0.01s. The Decision Tree of mislabeling was better. Using machine learning helps improve allocate medical resources to maximize their utilization. Classification algorithm of clinical data for confirmed COVID-19 cases can help predict a patient’s need to advance to the ICU or not need by using a global dataset of COVID-19 cases due to its accuracy and quality.