June 2015
<Previous Issue Next Issue>
Open Access |
Independent Component Analysis for Separation of Speech Mixtures: A Comparison Among Thirty Algorithms |
Ali Al-Saegh |
Pages: 1-9 |
DOI: 10.37917/ijeee.11.1.1 |
FULL TEXT (PDF) |
Abstract: |
Vast number of researches deliberated the separation of speech mixtures due to the importance of this field of research. Whereas its applications became widely used in our daily life; such as mobile conversation, video conferences, and other distant communications. These sorts of applications may suffer from what is well known the cocktail party problem. Independent component analysis (ICA) has been extensively used to overcome this problem and many ICA algorithms based on different techniques have been developed in this context. Still coming up with some suitable algorithms to separate speech mixed signals into their original ones is of great importance. Hence, this paper utilizes thirty ICA algorithms for estimating the original speech signals from mixed ones, the estimation process is carried out with the purpose of testing the robustness of the algorithms once against a different number of mixed signals and another against different lengths of mixed signals. Three criteria namely Spearman correlation coefficient, signal to interference ratio, and computational demand have been used for comparing the obtained results. The results of the comparison were sufficient to signify some algorithms which are appropriate for the separation of speech mixtures. |
Open Access |
Unified P-Q based STATCOM Control for Wind Driven Induction Generator |
Ahmed A. A. Hafez, R. M. Al-Bouthig, J. I. AL-Sadey |
Pages: 10-17 |
DOI: 10.37917/ijeee.11.1.2 |
FULL TEXT (PDF) |
Abstract: |
This paper principally advises a simple and reliable control for Static Synchronous Compensator (STATCOM) in a stand-alone wind driven self-excited induction generator power system. The control was proposed based on instantaneous P-Q theory. The advised control enjoys the merits of robustness, reliability and simplicity. The paper also proposes a dimensioning procedure for the STATCOM that involves advising an annotative |
Open Access |
Security Issues of Solar Energy Harvesting Road Side Unit (RSU) |
Qutaiba I. Ali |
Pages: 18-31 |
DOI: 10.37917/ijeee.11.1.3 |
FULL TEXT (PDF) |
Abstract: |
Vehicular network security had spanned and covered a wide range of security related issues. However solar energy harvesting Road Side Unit (RSU) security was not defined clearly, it is this aspect that is considered in this paper. In this work, we will suggest an RSU security model to protect it against different internal and external threats. The main goal is to protect RSU specific data (needed for its operation) as well as its functionality and |
Open Access |
Path Planning of Mobile Robot Using Fuzzy-Potential Field Method |
Alaa A. Ahmed, Turki Y. Abdalla, Ali A. Abed |
Pages: 32-41 |
DOI: 10.37917/ijeee.11.1.4 |
FULL TEXT (PDF) |
Abstract: |
This paper deals with the navigation of a mobile robot in unknown environment using artificial potential field method. The aim of this paper is to develop a complete method that allows the mobile robot to reach its goal while avoiding unknown obstacles on its path. An approach proposed is introduced in this paper based on combing the artificial potential field method with fuzzy logic controller to solve drawbacks of artificial potential field method such as local minima problems, make an effective motion planner and improve the quality of the trajectory of mobile robot. |
Open Access |
Multilevel Permutation with Different Block Size/ Stream Cipher Image Encryption |
Abbas A. Jasim, Hiba Hakim |
Pages: 42-48 |
DOI: 10.37917/ijeee.11.1.5 |
FULL TEXT (PDF) |
Abstract: |
In this work, a new image encryption method using a combined multilevel permutation with stream cipher is proposed. In the permutation algorithm, image is divided into blocks in each level and its blocks are rearranged by using pseudorandom permutation method. A new non linear stream cipher algorithm is also proposed that is based on combining several keys generated by Linear Feedback Shift Register (LFSR). The results shown that the proposed algorithm has a high security feature and it is efficient for image encryption. Practical tests proved that the proposed encryption algorithm is robust, provides high level of security and gives perfect reconstruction of the decrypted image. |
Open Access |
Wireless Sensor Network for Medical Applications |
Hanady S. Ahmed, Abduladhem Abdulkareem Ali |
Pages: 49-59 |
DOI: 10.37917/ijeee.11.1.6 |
FULL TEXT (PDF) |
Abstract: |
This work presents a healthcare monitoring system that can be used in an intensive care room. Biological information represented by ECG signals is achieved by ECG acquisition part . AD620 Instrumentation Amplifier selected due to its low current noise. The ECG signals of patients in the intensive care room are measured through wireless nodes. A base node is connected to the nursing room computer via a USB port , and is programmed with a specific firmware. The ECG signals are transferred wirelessly to the base node using nRF24L01+ wireless module. So, the nurse staff has a real time information for each patient available in the intensive care room. A star Wireless Sensor Network is designed for collecting ECG signals . ATmega328 MCU in the Arduino Uno board used for this purpose. Internet for things used For transferring ECG signals to the remote doctor, a Virtual Privet Network is established to connect the nursing room computer and the doctor computer . So, the patients information kept secure. Although the constructed network is tested for ECG monitoring, but it can be used to monitor any other signals. |
Open Access |
Reactive Power Contribution and Pricing for Restructured Power Industry |
Susithra M, Gnanadass R |
Pages: 60-69 |
DOI: 10.37917/ijeee.11.1.7 |
FULL TEXT (PDF) |
Abstract: |
Competitive trend towards restructuring and unbundling of transmission services has resulted in the need renteto discover the impact of a particular generator to load. This paper initially presents the analysis of three diffreactive power valuation methods namely, Modified Ybus, Virtual flow approach and Modified Power flow tracing to compute the reactive power output from a particular generator to particular load. Among these methods, the modified power flow electricity tracing method is identified as the best because of its various features. Secondly, based on this Method, the opportunity cost for practical system is determined. Hence, this method can be useful in providing additional insight into power system operation and can be used to modify existing tariffs of charging for reactive power transmission loss and reactive power transmission services. Simulation and comparison results are shown by taking IEEE 30 bus system as test system. |
Open Access |
Matlab/Simulink Modeling of Parallel Resonant DC Link Soft-Switching Four-leg SVPWM Inverter |
Riyadh G. Omar, Rabee’ H. Thejel |
Pages: 70-82 |
DOI: 10.37917/ijeee.11.1.8 |
FULL TEXT (PDF) |
Abstract: |
This paper suggests the use of the traditional parallel resonant dc link (PRDCL) circuit to give soft switching to the Four-leg Space Vector Pulse Width Modulation (SVPWM) inverter. The proposed circuit provides a short period of zero voltage across the inverter during the zero-vectors occurrence. The transition between the zero and active vectors accomplished with zero- voltage condition (ZVC), this reduces the switching losses. Moreover, the inverter output voltage Total Harmonic Distortion (THD) not affected by circuit operation, since the zero voltage periods occur simultaneously with zero-vector periods. To confirm the results, balanced and unbalanced loads are used. Matlab/Simulink model implemented for simulation. |
Open Access |
Control Strategy for Three-Phase PWM Boost Rectifier Operating Under Different Supply Voltage Conditions |
Turki Kahawish Hassan, Muntadher Kadhem Abdullah |
Pages: 83-100 |
DOI: 10.37917/ijeee.11.1.9 |
FULL TEXT (PDF) |
Abstract: |
In this paper, a proposed control strategy is presented to improve the performance of the pulse width modulation (PWM) boost type rectifier when operating under different supply voltage conditions (balanced, unbalanced, and distorted three-phase supply voltages). The proposed control strategy is divided into two parts, the first part is voltage controller and the second part is current controller. In the voltage controller, Repetitive Controller (RC) is used to reduce the even order harmonics in the regulated output dc voltage so small output capacitor (filter) is used instead of large capacitor. RC also reduces the even order harmonics which appear in the reflected dc current (IMAX), this leads to reduce the odd order harmonics which appear in the input currents. While in the current controller, Enhanced Phase Locked Loop (EPLL) technique is used to obtain sinusoidal and balanced three phases, to construct the reference currents, which are in phase with the fundamental supply voltages. Therefore, the supply-side power factor is kept close to unity. A proportional controller is used to give excellent tracking between the line and the reference currents. The complete system with the proposed control strategy are simulated using Matlab/Simulink. The results for the complete system using repetitive voltage controller are obtained and compared to the results of the system with the conventional voltage controller (Proportional-Integral (PI) controller connected in series with a Low Pass Filter (LPF)). The results with the repetitive controller show better response and stable operation in the steady state under different input voltage conditions, as well as in the transient response under changing the load condition. |
Open Access |
NTT: Network Topology Tool for Enhancing NS-2 |
Hayder Naser Khraibet AL-Behadili |
Pages: 101-104 |
DOI: 10.37917/ijeee.11.1.10 |
FULL TEXT (PDF) |
Abstract: |
Network Simulator-2(NS-2) is one of the most popular simulation systems that is widely used in the network community. C++ and the object-oriented Tool Command Language (TCL) are both used to write this simulator. C++ works as a background for this simulator, whereas TCL is responsible for scheduling discrete events and network configuration objects. The TCL language is used to write the code of the simulation scenario. NS-2 does not |
Open Access |
Design and Develop an Information system for Court Data in the Republic of Iraq by using SSRS Reports with SSAS Cubes |
Ayad Mohammed Jabbar |
Pages: 105-109 |
DOI: 10.37917/ijeee.11.1.11 |
FULL TEXT (PDF) |
Abstract: |
Multidimensional Online analytical processing (MOLAP) technology is considered a good tool to produce meaningful and quality results by using a multidimensional cube. The term “multidimensional cube” is used to refer to the multiple layers of data that are used to show the result. This result is identified by high-level management to increase the Iraqi court work and to improve its quality. The Iraqi court needs an analytical report to make a |
Open Access |
A comparative Study of Forecasting the Electrical Demand in Basra city using Box-Jenkins and Modern Intelligent Techniques |
Khadeega Abd Al-zahra, Khulood Moosa, Basil H. Jasim |
Pages: 110-123 |
DOI: 10.37917/ijeee.11.1.12 |
FULL TEXT (PDF) |
Abstract: |
The electrical consumption in Basra is extremely nonlinear; so forecasting the monthly required of electrical consumption in this city is very useful and critical issue. In this Article an intelligent techniques have been proposed to predict the demand of electrical consumption of Basra city. Intelligent techniques including ANN and Neuro-fuzzy structured trained. The result obtained had been compared with conventional Box-Jenkins models (ARIMA models) as a statistical method used in time series analysis. ARIMA (Autoregressive integrated moving average) is one of the statistical models that utilized in time series prediction during the last several decades. Neuro-Fuzzy Modeling was used to build the prediction system, which give effective in improving the predict operation efficiency. To train the prediction system, a historical data were used. The data representing the monthly electric consumption in Basra city during the period from (Jan 2005 to Dec 2011). The data utilized to compare the proposed model and the forecasting of demand for the subsequent two years (Jan 2012-Dec 2013). The results give the efficiency of proposed methodology and show the good performance of the proposed Neuro-fuzzy method compared with the traditional ARIMA method. |
Open Access |
Off-line Signature Recognition Using Weightless Neural Network and Feature Extraction |
Ali Al-Saegh |
Pages: 124-131 |
DOI: 10.37917/ijeee.11.1.13 |
FULL TEXT (PDF) |
Abstract: |
The problem of automatic signature recognition and verification has been extensively investigated due to the vitality of this field of research. Handwritten signatures are broadly used in daily life as a secure way for personal identification. In this paper a novel approach is proposed for handwritten signature recognition in an off-line environment based on Weightless Neural Network (WNN) and feature extraction. This type of neural networks (NN) is characterized by its simplicity in design and implementation. Whereas no weights, transfer functions and multipliers are required. Implementing the WNN needs only Random Access Memory (RAM) slices. Moreover, the whole process of training can be accomplished with few numbers of training samples and by presenting them once to the neural network. Employing the proposed approach in signature recognition area yields promising results with rates of 99.67% and 99.55% for recognition of signatures that the network has trained on and rejection of signatures that the network .has not trained on, respectively. |
Open Access |
Fuzzy Petri Net Controller for Quadrotor System using Particle Swam Optimization |
Mohammed J. Mohammed, Abduladhem A. Ali, Mofeed T. Rashid |
Pages: 132-144 |
DOI: 10.37917/ijeee.11.1.14 |
FULL TEXT (PDF) |
Abstract: |
In this paper, fuzzy Petri Net controller is used for Quadrotor system. The fuzzy Petrinet controller is arranged in the velocity PID form. The optimal values for the fuzzy Petri Net controller parameters have been achieved by using particle swarm optimization algorithm. In this paper, the reference trajectory is obtained from a reference model that can be designed to have the ideal required response of the Quadrotor, also using the quadrotor equations to find decoupling controller is first designed to reduce the effect of coupling between different inputs and outputs of quadrotor. The system performance has been measured by MATLAB. Simulation results showed that the FPN controller has a reasonable robustness against disturbances and good dynamic performance. |
Open Access |
Identification of RBC and WBC Count in Human Blood Using ARM Based Instrumentation |
B. Dodda Basavanagoud, K Padma Priya |
Pages: 145-150 |
DOI: 10.37917/ijeee.11.1.15 |
FULL TEXT (PDF) |
Abstract: |
The rapid growth in microelectronics and crunching RISC in the field of bio-medical sciences incorporated of soft tools to diagnose various parameters of human fluids. Conventional method of blood sample analysis makes use of laboratory technique of titration, which is operator-dependent and results in lot of errors depending on the skill of the technician. In order to eliminate the human errors involved in the conventional method, in this paper an attempt has been made to present a capillary centrifuge technique driven by high speed DC motor fed by Morgan chopper and controlled by powerful ARM processor. It results in accurate analysis of the blood samples. The various techniques involved in accurate sensing of speed using timer and generation of firing pulses to thyristor in the Morgan chopper is judiciously achieved. This paper clearly brings out the advantages of the proposed blood measurement technique which effectively gives blood analysis faster and at a low cost. |