The reluctance of industry to allow wireless paths to be incorporated in process control loops has limited the potential applications and benefits of wireless systems. The challenge is to maintain the performance of a control loop, which is degraded by slow data rates and delays in a wireless path. To overcome these challenges, this paper presents an application–level design for a wireless sensor/actuator network (WSAN) based on the “automated architecture”. The resulting WSAN system is used in the developing of a wireless distributed control system (WDCS). The implementation of our wireless system involves the building of a wireless sensor network (WSN) for data acquisition and controller area network (CAN) protocol fieldbus system for plant actuation. The sensor/actuator system is controlled by an intelligent digital control algorithm that involves a controller developed with velocity PID- like Fuzzy Neural Petri Net (FNPN) system. This control system satisfies two important real-time requirements: bumpless transfer and anti-windup, which are needed when manual/auto operating aspect is adopted in the system. The intelligent controller is learned by a learning algorithm based on back-propagation. The concept of petri net is used in the development of FNN to get a correlation between the error at the input of the controller and the number of rules of the fuzzy-neural controller leading to a reduction in the number of active rules. The resultant controller is called robust fuzzy neural petri net (RFNPN) controller which is created as a software model developed with MATLAB. The developed concepts were evaluated through simulations as well validated by real-time experiments that used a plant system with a water bath to satisfy a temperature control. The effect of disturbance is also studied to prove the system's robustness.
In this paper, a fuzzy based controller for boost type AC/DC converter has been presented. Its operation and performance have been investigated through its simulation in the environment of Mat Lab. The system has been tested under various loading conditions. The obtained results showed that this fuzzy based controller can effectively control the power factor and the harmonic contents of the current drawn from the power factor system distribution network.
In this paper the identification and control for the impressed current cathodic protection (ICCP) system are present. Firstly, an identification model using an Adaptive Neuro-Fuzzy Inference Systems (ANFIS) was implemented. The identification model consists of four inputs which are the aeration flow rates, the temperature, conductivity, and protection current, and one output that represented by the structure-to-electrolyte potential. The used data taken from an experimental CP system model, type impressed current submerged sample pipe carbon steel. Secondly, two control techniques are used. The first control technique use a conventional Proportional-Integral-Derivative (PID) controller, while the second is the fuzzy controller. The PID controller can be applied to control ICCP system and quite easy to implement. But, it required very fine tuning of its parameters based on the desired value. Furthermore, it needed time response more than fuzzy controller to track reference voltage. So the fuzzy controller has a faster and better response.
This paper presents and discusses a buck DC/DC converter control based on fuzzy logic approach, in which the fuzzy controller has been driven by voltage error signal and a current error signal for which the load current has been taken as a reference one. The validity of the proposed approach has been examined through starting the buck DC/DC converter at different loading and input voltages (to monitor the starting performances), exposing the converter into large load resistance and input voltage step variations (to explore its dynamic performance), in addition to step and smooth variation in the reference voltage (to see its ability in readjusting its operating point to comply with the new setting). The simulation results presented an excellent load & line regulations abilities in addition to a good reference tracking ability. It also showed the possibility of using the buck converter as smooth variable voltage source (under smooth reference voltage variations).
It's not easy to implement the mixed / optimal controller for high order system, since in the conventional mixed / optimal feedback the order of the controller is much than that of the plant. This difficulty had been solved by using the structured specified PID controller. The merit of PID controllers comes from its simple structure, and can meets the industry processes. Also it have some kind of robustness. Even that it's hard to PID to cope the complex control problems such as the uncertainty and the disturbance effects. The present ideas suggests combining some of model control theories with the PID controller to achieve the complicated control problems. One of these ideas is presented in this paper by tuning the PID parameters to achieve the mixed / optimal performance by using Intelligent Genetic Algorithm (IGA). A simple modification is added to IGA in this paper to speed up the optimization search process. Two MIMO example are used during investigation in this paper. Each one of them has different control problem.
In this paper we present the details of methodology pursued in implementation of an HMI and Demo Temperature Monitoring application for wireless sensor-based distributed control systems. The application of WSN for a temperature monitoring and control is composed of a number of sensor nodes (motes) with a networking capability that can be deployed for monitoring and control purposes. The temperature is measured in the real time by the sensor boards that sample and send the data to the monitoring computer through a base station or gateway. This paper proposes how such monitoring system can be setup emphasizing on the aspects of low cost, energy-efficient, easy ad-hoc installation and easy handling and maintenance. This paper focuses on the overall potential of wireless sensor nodes and networking in industrial applications. A specific case study is given for the measurement of temperature (with thermistor or thermocouple), humidity, light and the health of the WSN. The focus was not on these four types of measurements and analysis but rather on the design of a communication protocol and building of an HMI software for monitoring. So, a set of system design requirements are developed that covered the use of the wireless platforms, the design of sensor network, the capabilities for remote data access and management, the connection between the WSN and an HMI software designed with MATLAB.
Some engineering applications requires constant engine speed such as power generators, production lines ..etc. The current paper focuses on adding a new closed loop based on engine torque. Load cells can be used to measure the torque of load applied , the electrical signal is properly handled to manipulate a special fuel actuator to compensate for the reduction in engine speed. The speed loop still acts as the most outer closed loop. This method leads to rapid speed compensation and lead control action.
Health Information Technology (HIT) provides many opportunities for transforming and improving health care systems. HIT enhances the quality of health care delivery, reduces medical errors, increases patient safety, facilitates care coordination, monitors the updated data over time, improves clinical outcomes, and strengthens the interaction between patients and health care providers. Living in modern large cities has a significant negative impact on people's health, for instance, the increased risk of chronic diseases such as diabetes. According to the rising morbidity in the last decade, the number of patients with diabetes worldwide will exceed 642 million in 2040, meaning that one in every ten adults will be affected. All the previous research on diabetes mellitus indicates that early diagnoses can reduce death rates and overcome many problems. In this regard, machine learning (ML) techniques show promising results in using medical data to predict diabetes at an early stage to save people's lives. In this paper, we propose an intelligent health care system based on ML methods as a real-time monitoring system to detect diabetes mellitus and examine other health issues such as food and drug allergies of patients. The proposed system uses five machine learning methods: K-Nearest Neighbors, Naïve Bayes, Logistic Regression, Random Forest, and Support Vector Machine (SVM). The system selects the best classification method with high accuracy to optimize the diagnosis of patients with diabetes. The experimental results show that in the proposed system, the SVM classifier has the highest accuracy of 83%.
A wireless body area network (WBAN) connects separate sensors in many places of the human body, such as clothes, under the skin. WBAN can be used in many domains such as health care, sports, and control system. In this paper, a scheme focused on managing a patient’s health care is presented based on building a WBAN that consists of three components, biometric sensors, mobile applications related to the patient, and a remote server. An excellent scheme is proposed for the patient’s device, such as a mobile phone or a smartwatch, which can classify the signal coming from a biometric sensor into two types, normal and abnormal. In an abnormal signal, the device can carry out appropriate activities for the patient without requiring a doctor as a first case. The patient does not respond to the warning message in a critical case sometimes, and the personal device sends an alert to the patient’s family, including his/her location. The proposed scheme can preserve the privacy of the sensitive data of the patient in a protected way and can support several security features such as mutual authentication, key management, anonymous password, and resistance to malicious attacks. These features have been proven depending on the Automated Validation of Internet Security Protocols and Applications. Moreover, the computation and communication costs are efficient compared with other related schemes.
In this study, Dielectric Barrier Discharge plasma irradiation (DBD) is applied to treatment and improve the properties of the ZnO thin film deposited on the glass substrate as a sensor for glucose detection. The ZnO is prepared via a sol-gel method in this work. ZnO is irradiated by the DBD high voltage plasma to improve of its sensitivity. The optical properties, roughness and surface morphology of the waveguide coated ZnO thin films before and after DBD plasma irradiation are studied in this work. The results showed a significant improvement in the performance of the sensor in the detection of concentrations of glucose solution after plasma irradiation. Where the largest value in sensitivity was equal to 62.7 when the distance between electrodes was 5 cm compared to the sensitivity before irradiation, which was equal to 92. The high response showed in results demonstrating that the fabricated waveguide coated ZnO after plasma irradiation has the excellent potential application as a sensor to detect small concentration of glucose solution.
Adaptive filtering constitutes one of the core technologies in digital signal processing and finds numerous application areas in science as well as in industry. Adaptive filtering techniques are used in a wide range of applications such as noise cancellation. Noise cancellation is a common occurrence in today telecommunication systems. The LMS algorithm which is one of the most efficient criteria for determining the values of the adaptive noise cancellation coefficients are very important in communication systems, but the LMS adaptive noise cancellation suffers response degrades and slow convergence rate under low Signal-to- Noise ratio (SNR) condition. This paper presents an adaptive noise canceller algorithm based fuzzy and neural network. The major advantage of the proposed system is its ease of implementation and fast convergence. The proposed algorithm is applied to noise canceling problem of long distance communication channel. The simulation results showed that the proposed model is effectiveness.
In order to reduce the impact of watermark embedding on the perceptual fidelity of the marked signal, watermarking systems process the generated watermark to match it to the local properties of the underlying host signal prior to embedding. However, this adaptation process could distort the watermark, affecting its robustness and information content. In this paper, a new watermark coding technique is proposed, that enables the application of some mark- nondistorting host-adaptation processing, where the intensity of the watermark could be redistributed according to the local properties of the underlying host without changing the way of interpreting the watermark to be embedded. This completely eliminates the need to equalize adaptation distortions prior to decoding, and hence, to pass any side information about the adaptation processing to the decoder, too.
The multilevel inverter is attracting the specialist in medium and high voltage applications, among its types, the cascade H bridge Multi-Level Inverter (MLI), commonly used for high power and high voltage applications. The main advantage of the conventional cascade (MLI) is generated a large number of output voltage levels but it demands a large number of components that produce complexity in the control circuit, and high cost. Along these lines, this paper presents a brief about the non-conventional cascade multilevel topologies that can produce a high number of output voltage levels with the least components. The non-conventional cascade (MLI) in this paper was built to reduce the number of switches, simplify the circuit configuration, uncomplicated control, and minimize the system cost. Besides, it reduces THD and increases efficiency. Two topologies of non-conventional cascade MLI three phase, the Nine level and Seventeen level are presented. The PWM technique is used to control the switches. The simulation results show a better performance for both topologies. THD, the power loss and the efficiency of the two topologies are calculated and drawn to the different values of the Modulation index (ma).
According to the growing interest in the soft robotics research field, where various industrial and medical applications have been developed by employing soft robots. Our focus in this paper will be the Pneumatic Muscle Actuator (PMA), which is the heart of the soft robot. Achieving an accurate control method to adjust the actuator length to a predefined set point is a very difficult problem because of the hysteresis and nonlinearity behaviors of the PMA. So the construction and control of a 30 cm soft contractor pneumatic muscle actuator (SCPMA) were done here, and by using different strategies such as the PID controller, Bang-Bang controller, Neural network controller, and Fuzzy controller, to adjust the length of the (SCPMA) between 30 cm and 24 cm by utilizing the amount of air coming from the air compressor. All of these strategies will be theoretically implemented using the MATLAB/Simulink package. Also, the performance of these control systems will be compared with respect to the time-domain characteristics and the root mean square error (RMSE). As a result, the controller performance accuracy and robustness ranged from one controller to another, and we found that the fuzzy logic controller was one of the best strategies used here according to the simplicity of the implementation and the very accurate response obtained from this method.
In this paper, a new algorithm called the virtual circle tangents is introduced for mobile robot navigation in an environment with polygonal shape obstacles. The algorithm relies on representing the polygonal shape obstacles by virtual circles, and then all the possible trajectories from source to target is constructed by computing the visible tangents between the robot and the virtual circle obstacles. A new method for searching the shortest path from source to target is suggested. Two states of the simulation are suggested, the first one is the off-line state and the other is the on-line state. The introduced method is compared with two other algorithms to study its performance.
Searchable symmetric encryption (SSE) is a robust cryptographic method that allows users to store and retrieve encrypted data on a remote server, such as a cloud server, while maintaining the privacy of the user’s data. The technique employs symmetric encryption, which utilizes a single secret key for both data encryption and decryption. However, extensive research in this field has revealed that SSE encounters performance issues when dealing with large databases. Upon further investigation, it has become apparent that the issue is due to poor locality, necessitating that the cloud server access multiple memory locations for a single query. Additionally, prior endeavors in this domain centered on locality optimization have often led to expanded storage requirements (the stored encrypted index should not be substantially larger than the original index) or diminished data retrieval efficiency (only required data should be retrieved).we present a simple, secure, searchable, and cost-effective scheme, which addresses the aforementioned problems while achieving a significant improvement in information retrieval performance through site optimization by changing the encrypted inverted index storage mechanism. The proposed scheme has the optimal locality O(1) and the best read efficiency O(1)with no significant negative impact on the storage space, which often increases due to the improvement of the locality. Using real-world data, we demonstrate that our scheme is secure, practical, and highly accurate. Furthermore, our proposed work can resist well-known attacks such as keyword guessing attacks and frequency analysis attacks.
The Intelligent Control of Vibration Energy Harvesting system is presented in this paper. The harvesting systems use a me- chanical vibration to generate electrical energy in a suitable form for use. Proportional-Integrated-derivative controller and Fuzzy Logic controller have been suggested; their parameters are optimized using a new heuristic algorithm, the Camel Trav- eling Algorithm(CTA). The proposed circuit Simulink model was constructed in Matlab facilities, and the model was tested under various operating conditions. The results of the simulation using the CTA was compared with two other methods.
Vast number of researches deliberated the separation of speech mixtures due to the importance of this field of research . Whereas its applications became widely used in our daily life; such as mobile conversation, video conferences, and other distant communications. These sorts of applications may suffer from what is well known the cocktail party problem. Independent component analysis (ICA) has been extensively used to overcome this problem and many ICA algorithms based on different techniques have been developed in this context. Still coming up with some suitable algorithms to separate speech mixed signals into their original ones is of great importance. Hence, this paper utilizes thirty ICA algorithms for estimating the original speech signals from mixed ones, the estimation process is carried out with the purpose of testing the robustness of the algorithms once against a different number of mixed signals and another against different lengths of mixed signals. Three criteria namely Spearman correlation coefficient, signal to interference ratio, and computational demand have been used for comparing the obtained results. The results of the comparison were sufficient to signify some algorithms which are appropriate for the separation of speech mixtures.
Content-Based Image Retrieval (CBIR) is an automatic process of retrieving images that are the most similar to a query image based on their visual content such as colour and texture features. However, CBIR faces the technical challenge known as the semantic gap between high level conceptual meaning and the low-level image based features. This paper presents a new method that addresses the semantic gap issue by exploiting cluster shapes. The method first extracts local colours and textures using Discrete Cosine Transform (DCT) coefficients. The Expectation-Maximization Gaussian Mixture Model (EM/GMM) clustering algorithm is then applied to the local feature vectors to obtain clusters of various shapes. To compare dissimilarity between two images, the method uses a dissimilarity measure based on the principle of Kullback-Leibler divergence to compare pair-wise dissimilarity of cluster shapes. The paper further investigates two respective scenarios when the number of clusters is fixed and adaptively determined according to cluster quality. Experiments are conducted on publicly available WANG and Caltech6 databases. The results demonstrate that the proposed retrieval mechanism based on cluster shapes increases the image discrimination, and when the number of clusters is fixed to a large number, the precision of image retrieval is better than that when the relatively small number of clusters is adaptively determined.
Nowadays, the trend has become to utilize Artificial Intelligence techniques to replace the human's mind in problem solving. Vehicle License Plate Recognition (VLPR) is one of these problems in which the computer outperforms the human being in terms of processing speed and accuracy of results. The emergence of deep learning techniques enhances and simplifies this task. This work emphasis on detecting the Iraqi License Plates based on SSD Deep Learning Algorithm. Then Segmenting the plate using horizontal and vertical shredding. Finally, the K-Nearest Neighbors (KNN) algorithm utilized to specify the type of car. The proposed system evaluated by using a group of 500 different Iraqi Vehicles. The successful results show that 98% regarding the plate detection, and 96% for segmenting operation.
It can be said that the system of sensing the tilt angle and speed of a multi-rotor copter come in the first rank among all the other sensors on the multi-rotor copters and all other planes due to its important roles for stabilization. The MPU6050 sensor is one of the most popular sensors in this field. It has an embedded 3-axis accelerometer and a 3-axis gyroscope. It is a simple sensor in dealing with it and extracting accurate data. Everything changes when this sensor is placed on the plane. It becomes very complicated to deal with it due to vibration of the motors on the multirotor copter. In this study, two main problems were diagnosed was solved that appear in most sensors when they are applied to a high-frequency vibrating environment. The first problem is how to get a precise angle of the sensor despite the presence of vibration. The second problem is how to overcome the errors that appear when the multirotor copter revolves around its vertical axis during the tilting in either direction x or y or both. The first problem was solved in two steps. The first step involves mixing data of the gyroscope sensor with the data of auxetometer sensor by a mathematical equation based on optimized complementary filter using gray wolf optimization algorithm GWO. The second step involves designing a suitable FIR filter for data. The second problem was solved by finding a non-linear mathematical relationship between the angles of the copter in both X and Y directions, and the rotation around the vertical axis of multirotor copter frame.
This Paper presents a novel hardware design methodology of digital control systems. For this, instead of synthesizing the control system using Very high speed integration circuit Hardware Description Language (VHDL), LabVIEW FPGA module from National Instrument (NI) is used to design the whole system that include analog capture circuit to take out the analog signals (set point and process variable) from the real world, PID controller module, and PWM signal generator module to drive the motor. The physical implementation of the digital system is based on Spartan-3E FPGA from Xilinx. Simulation studies of speed control of a D.C. motor are conducted and the effect of a sudden change in reference speed and load are also included.
This work addresses the critical need for secure and patient-controlled Electronic Health Records (EHR) migration among healthcare hospitals’ cloud servers (HHS). The relevant approaches often lack robust access control and leave data vulnerable during transfer. Our proposed scheme empowers patients to delegate EHR migration to a trusted Third-Party Hospital (TTPH); which is the Certification Authority (CA) while enforcing access control. The system leverages asymmetric encryption utilizing the Elliptic Curve Digital Signature Algorithm (ECDSA), EEC and ECDSA added robust security and lightness EHR sharing. Patient and user privacy is managed due to anonymity through cryptographic hashing for data protection and utilizes mutual authentication for secure communication. Formal security analysis using the Scyther tool and informal analysis was conducted to validate the system’s robustness. The proposed scheme achieved EHR integrity due to the verification of the communicated HHS and ensuring the integrity of the HHS digital certificate during EHR migration. Ultimately, the result achieved in the proposed work demonstrated the scheme’s high balance between data security and accuracy of communication, where the best result obtained represented 7.7/ ms as computational cost and 1248 /bits as communication cost compared with the relevant approaches.
The occurrence of Sub-Synchronous Resonance (SSR) phenomena can be attributed to the interaction that takes place between wind turbine generators and series-compensated transmission lines. The Doubly-Fed Induction Generator (DFIG) is widely recognized as a prevalent generator form employed in wind energy conversion systems. The present paper commences with an extensive exposition on modal analysis techniques employed in a series of compensated wind farms featuring Doubly Fed Induction Generators (DFIGs). The system model encompasses various components, including the aerodynamics of a wind turbine, an induction generator characterized by a sixth-order model, a second- order two-mass shaft system, a series compensated transmission line described by a fourth-order model, controllers for the Rotor-Side Converter (RSC) and the Grid-Side Converter (GSC) represented by an eighth-order model, and a first-order DC-link model. The technique of eigenvalue-based SSR analysis is extensively utilized in various academic and research domains. The eigenvalue technique depends on the initial conditions of state variables to yield an accurate outcome. The non-iterative approach, previously employed for the computation of initial values of the state variables, has exhibited issues with convergence, lack of accuracy, and excessive computational time. The comparative study evaluates the time-domain simulation outcomes under different wind speeds and compensation levels, along side the eigenvalue analysis conducted using both the suggested and non-iterative methods. This comparative analysis is conducted to illustrate the proposed approach efficacy and precision. The results indicate that the eigenvalue analysis conducted using the proposed technique exhibits more accuracy, as it aligns with the findings of the simulations across all of the investigated instances. The process of validation is executed with the MATLAB program. Within the context of the investigation, it has been found that increasing compensation levels while simultaneously decreasing wind speed leads to system instability. Therefore, modifying the compensation level by the current wind speed is advisable.
In today's chemical, refinery, and petrochemical sectors, separation tanks are one of the most significant separating processes. One or more separation tanks must operate consistently and reliably for multiple facilities' safe and efficient operation. Therefore, in this paper, a PI controller unit has been designed to improve the performance of the tank level controller of the industrial process in Basrah Refinery Station. The overall system mathematical model has been derived and simulated by MATLAB to evaluate the performance. Further, to improve the performance of the tank level controller, optimal PI parameters should be calculated, which Closed-Loop PID Autotuner has been used for this task. Several experiments have been conducted to evaluate the performance of the proposed system. The results indicated that the PI controller based on the Autotuner Method is superior to the conventional PI controller in terms of ease to implement and configuration also less time to get optimal PI gains.
This work focuses on using two-dimensional finite element method to calculate apparent and incremental inductances for 40W fluorescent lamp ballast with different loading conditions based on its design documents. Seven inductance calculation techniques are adopted by calculating ballast stored magnetic energy and flux linkage using ANSYS software. The calculated results for apparent inductances show a good agreement with the design and average measured values, while calculated incremental inductances have been verified by noting the behavior of core hysteresis loop experimentally. These seven techniques establish a good base for researchers and designers to obtain an accurate inductance profile for any iron-core inductor.
Training the user in Brain-Computer Interface (BCI) systems based on brain signals that recorded using Electroencephalography Motor Imagery (EEG-MI) signal is a time-consuming process and causes tiredness to the trained subject, so transfer learning (subject to subject or session to session) is very useful methods of training that will decrease the number of recorded training trials for the target subject. To record the brain signals, channels or electrodes are used. Increasing channels could increase the classification accuracy but this solution costs a lot of money and there are no guarantees of high classification accuracy. This paper introduces a transfer learning method using only two channels and a few training trials for both feature extraction and classifier training. Our results show that the proposed method Independent Component Analysis with Regularized Common Spatial Pattern (ICA-RCSP) will produce about 70% accuracy for the session to session transfer learning using few training trails. When the proposed method used for transfer subject to subject the accuracy was lower than that for session to session but it still better than other methods.
This article presents a power-efficient low noise amplifier (LNA) with high gain and low noise figure (NF) dedicated to satellite communications at a frequency of 435 MHz. LNAs’ gain and NF play a significant role in the designs for satellite ground terminals seeking high amplification and maintaining a high signal-to-noise ratio (SNR). The proposed design utilized the transistor (BFP840ESD) to achieve a low NF of 0.459 dB and a high-power gain of 26.149 dB. The study carries out the LNA design procedure, from biasing the transistor, testing its stability at the operation frequency, and finally terminating the appropriate matching networks. In addition to the achieved high gain and low NF, the proposed LNA consumes as low power as only 2 mW.
The Leader detecting and following are one of the main challenges in designing a leader-follower multi-robot system, in addition to the challenge of achieving the formation between the robots, while tracking the leader. The biological system is one of the main sources of inspiration for understanding and designing such multi-robot systems, especially, the aggregations that follow an external stimulus such as light. In this paper, a multi-robot system in which the robots are following a spotlight is designed based on the behavior of the Artemia aggregations. Three models are designed: kinematic and two dynamic models. The kinematic model reveals the light attraction behavior of the Artemia aggregations. The dynamic model will be derived based on the newton equation of forces and its parameters are evaluated by two methods: first, a direct method based on the physical structure of the robot and, second, the Least Square Parameter Estimation method. Several experiments are implemented in order to check the success of the three proposed systems and compare their performance. The experiments are divided into three scenarios of simulation according to three paths: the straight line, circle, zigzag path. The V-Rep software has been used for the simulation and the results appeared the success of the proposed system and the high performance of tracking the spotlight and achieving the flock formation, especially the dynamic models.
The ability to harvest energy from the environment represents an important technology area that promises to eliminate wires and battery maintenance for many important applications and permits deploying self powered devices. This paper suggests the use of a solar energy harvester to charge mobile phone devices. In the beginning, a comprehensive overview to the energy harvesting concept and technologies is presented. Then the design procedure of our energy harvester was detailed. Our prototype solar energy harvester proves its efficiency to charge the aimed batteries under sunlight or an indoor artificial light.
In this paper new semi-empirical formulas are developed to evaluate the variation of both real and imaginary parts of soil complex permittivity with depth inside the earth's surface. Computed values using these models show good agreement with published measured values for soils of the same textures and same frequency band. Use of these models may serve to handle more accurate results especially in the ground probing radar (GPR) applications and other applications relating the detection of buried objects inside the earth's surface, where the use of a single average value of the soil complex permittivity had not necessarily led, for most of the times, to accurate results for the electromagnetic fields propagated inside the earth's surface.
The presented research introduces a control strategy for a three-phase grid-tied LCL-filtered quasi-Z-source inverter (qZSI) using a Lyapunov-function-based method and cascaded proportional-resonant (PR) controllers. The suggested control strategy ensures the overall stability of the closed-loop system and eliminates any steady-state inaccuracy in the grid current. The inverter current and capacitor voltage reference values of qZSI are created by the utilization of cascaded coupled proportional-resonant (PR) controllers. By utilizing synchronous reference frame and Lyapunov function- based control, the requirement to perform derivative operations and anticipate inductance and capacitance are avoided, resulting in achieving the goal of zero steady-state error in the grid current. The qZSI can accomplish shoot-through control by utilizing a simple boost control method. Computer simulations demonstrate that the suggested control strategy effectively achieves the desired control objectives, both in terms of steady-state and dynamic performance.
This work presents a wireless communication network (WCN) infrastructure for the smart grid based on the technology of Worldwide Interoperability for Microwave Access (WiMAX) to address the main real-time applications of the smart grid such as Wide Area Monitoring and Control (WAMC), video surveillance, and distributed energy resources (DER) to provide low cost, flexibility, and expansion. Such wireless networks suffer from two significant impairments. On one hand, the data of real- time applications should deliver to the control center under robust conditions in terms of reliability and latency where the packet loss is increased with the increment of the number of industrial clients and transmission frequency rate under the limited capacity of WiMAX base station (BS). This research suggests wireless edge computing using WiMAX servers to address reliability and availability. On the other hand, BSs and servers consume affected energy from the power grid. Therefore, the suggested WCN is enhanced by green self-powered based on solar energy to compensate for the expected consumption of energy. The model of the system is built using an analytical approach and OPNET modeler. The results indicated that the suggested WCN based on green WiMAX BS and green edge computing can handle the latency and data reliability of the smart grid applications successfully and with a self-powered supply. For instance, WCN offered latency below 20 msec and received data reliability up to 99.99% in the case of the heaviest application in terms of data.
Vehicle Ad-hoc Network (VANET) is a type of wireless network that enables communication between vehicles and Road Side Units (RSUs) to improve road safety, traffic efficiency, and service delivery. However, the widespread use of vehicular networks raises serious concerns about users’ privacy and security. Privacy in VANET refers to the protection of personal information and data exchanged between vehicles, RSUs, and other entities. Privacy issues in VANET include unauthorized access to location and speed information, driver and passenger identification, and vehicle tracking. To ensure privacy in VANET, various technologies such as pseudonymization, message authentication, and encryption are employed. When vehicles frequently change their identity to avoid tracking, message authentication ensures messages are received from trusted sources, and encryption is used to prevent unauthorized access to messages. Therefore, researchers have presented various schemes to improve and enhance the privacy efficiency of vehicle networks. This survey article provides an overview of privacy issues as well as an in-depth review of the current state-of-the-art pseudonym-changing tactics and methodologies proposed.
Non-Orthogonal Multiple Access (NOMA) has been promised for fifth generation (5G) cellular wireless network that can serve multiple users at same radio resources time, frequency, and code domains with different power levels. In this paper, we present a new simulation compression between a random location of multiple users for Non-Orthogonal Multiple Access (NOMA) and Orthogonal Multiple Access (OMA) that depend on Successive Interference Cancellation (SIC) and generalized the suggested joint user pairing for NOMA and beyond cellular networks. Cell throughput and Energy Efficiency (EE) are gained are developed for all active NOMA user in suggested model. Simulation results clarify the cell throughput for NOMA gained 7 Mpbs over OMA system in two different scenarios deployed users (3 and 4). We gain an attains Energy Efficiency (EE) among the weak power users and the stronger power users.
In the city of Basrah, there is an urgent need to use the water for irrigation process more efficiently for many reasons: one of them, the high temperature in long summer season and the other is the lack of sources fresh water sources. In this work, a smart irrigation system based wireless sensor networks (WSNs) is implemented. This system consists of the main unit that represented by an Arduino Uno board which include an ATmega328 microcontroller, different sensors as moisture sensors, temperature sensors, humidity sensors, XBee modules and solenoid valve. Zigbee technology is used in this project for implementing wireless technology. This system has two modes one manual mode, the other is a smart mode. The set points must be changed manually according to the specified season to satisfy the given conditions for the property irrigation, and the smart operation of the system will be according to these set points.
The incredible growth of FPGA capabilities in recent years and the new included features have made them more and more attractive for numerous embedded systems. There is however an important shortcoming concerning security of data and design. Data security implies the protection of the FPGA application in the sense that the data inside the circuit and the data transferred to/from the peripheral circuits during the communication are protected. This paper suggests a new method to support the security of any FPGA platform using network processor technology. Low cost IP2022 UBICOM network processor was used as a security shield in front of any FPGA device. It was supplied with the necessary security methods such as AES ciphering engine, SHA-1, HMAC and an embedded firewall to provide confidentiality, integrity, authenticity, and packets filtering features.
The power theft is one of the main problems facing the electric energy sector in Iraq, where a large amount of electrical energy is lost due to theft. It is required to design a system capable of detecting and locating energy theft without any human interaction. This paper presents an effective solution with low cost to solve power theft issue in distribution lines. Master meter is designed to measures the power of all meters of the homes connected to it. All the measured values are transmitted to the server via GPRS. The values of power for all energy meters within the grid are also transmitted. The comparison between the power of the master meter and all the other meters are transmitted to the server. If there is a difference between the energy meters, then a theft is happened and the server will send a signal via GSM to the overrun meter to switch off the power supply. Raspberry pi is used as a server and equipped and programmed to detect the power theft.
The power quality problems can be defined as the difference between the quality of power supplied and the quality of power required. Recently a large interest has been focused on a power quality domain due to: disturbances caused by non-linear loads and Increase in number of electronic devices. Power quality measures the fitness of the electric power transmitted from generation to industrial, domestic and commercial consumers. At least 50% of power quality problems are of voltage quality type. Voltage sag is the serious power quality issues for the electric power industry and leads to the damage of sensitive equipments like, computers, programmable logic controller (PLC), adjustable speed drives (ADS). The prime goal of this paper is to investigate the performance of the Fuzzy Logic controller based DVR in reduction the power disturbances to restore the load voltage to the nominal value and reduce the THD to a permissible value which is 5% for the system less than 69Kv. The modeling and simulation of a power distribution system have been achieved using MATLABL/Simulink. Different faults conditions and power disturbances with linear and non-linear loads are created with the proposed system, which are initiated at a duration of 0.8sec and kept till 0.95sec.
In this paper, we evaluate the performance of UMTS (Universal Mobile Telecommunication System) downlink system in vicinity of UWB system. The study is achieved via simulating a scenario of a building which is located within UMTS cell borders and utilizes from both UMTS and UWB appliances. The simulation results show that the UMTS system is considerably affected by the UWB interference. However, in order to battle this interference and achieve reasonable BER (Bit Error Rate) of 10 -4 , we found that it is very necessary to carefully raise the UMTS base station transmitted power against that of UWB interferer. So, the minimum requirements for UMTS system to overcome UWB interference are stated in this work.
In this article, a robust control technique for 2-DOF helicopter system is presented. The 2-DOF helicopter system is 2 inputs and 2 outputs system that is suffering from the high nonlinearity and strong coupling. This paper focuses on design a simple, robust, and optimal controller for the helicopter system. Moreover, The proposed control method takes into account effects of the measurement noise in the closed loop system that effect on the performance of controller as well as the external disturbance. The proposed controller combines low pass filter with robust PID controller to ensure good tracking performance with high robustness. A low pass filter and PID controller are designed based H∞weighted mixed sensitivity. Nonlinear dynamic model of 2-DOF helicopter system linearized and then decoupled into pitch and yaw models. Finally, proposed controller applied for each model. Matlab program is used to check effectiveness the proposed control method. Simulation results show that the proposed controllers has best tracking performance with no overshot and the smallest settling time with respect to standard H∞and optimized PID controller.
Early in the 20th century, as a result of technological advancements, the importance of digital marketing significantly increased as the necessity for digital customer experience, promotion, and distribution emerged. Since the year 1988, in the case when the term ”Digital Marketing” first appeared, the business sector has undergone drastic growth, moving from small startups to massive corporations on a global scale. The marketer must navigate a chaotic environment caused by the vast volume of generated data. Decision-makers must contend with the fact that user data is dynamic and changes every day. Smart applications must be used within enterprises to better evaluate, classify, enhance, and target audiences. Customers who are tech-savvy are pushing businesses to make bigger financial investments and use cutting-edge technologies. It was only natural that marketing and trade could be one of the areas to move to such development, which helps to move to the speed of spread, advertisements, along with other things to facilitate things for reaching and winning customers. In this study, we utilized machine learning (ML) algorithms (Decision tree (DT), K-Nearest Neighbor (KNN), CatBoost, and Random Forest (RF) (for classifying data in customers to move to development. Improve the ability to forecast customer behavior so one can gain more business from them more quickly and easily. With the use of the aforementioned dataset, the suggested system was put to the test. The results show that the system can accurately predict if a customer will buy something or not; the random forest (RF) had an accuracy of 0.97, DT had an accuracy of 0. 95, KNN had an accuracy of 0. 91, while the CatBoost algorithm had the execution time 15.04 of seconds, and gave the best result of highest f1 score and accuracy (0.91, 0. 98) respectively. Finally, the study’s future goals involve being created a web page, thereby helping many banking institutions with speed and forecast accuracy. Using more techniques of feature selection in conjunction with the marketing dataset to improve diagnosis.
Recently, the incorporation of state-of-the-art technology such as Electronic Healthcare Records (EHRs), networks, and cloud computing has transformed the traditional healthcare system. However, security problems have arisen as a result of the integration of technology. Secure remote user authentication is a core part of the healthcare system to validate the user's identification via an unsecure communication network. Since then, several remote user authentication schemes have been presented, each with its own set of pros and limitations. As a result, security, malicious attacks and privacy concerns are considered one of the main challenges related to the healthcare system. In this paper, we propose a safe user authentication scheme for patients in the healthcare system that overcomes these flaws and confirms the security of the proposed work using scyther, a formal security tool. In the healthcare environment, our work provides an effective means to construct an environment capable of setting, registering, storing, searching, analyzing, authentication, and verifying electronic healthcare information in order to protect the information of patients. Furthermore, our suggested scheme uses symmetric encryption based on the crypto- hash function for accessing the anomaly of the patient's identity and One-Time Password (OTP). Towards the end of the study, the performance analysis results indicate a delicate balance of security and performance that is frequently lacking in previous works.
In this paper, fuzzy Petri Net controller is used for Quadrotor system. The fuzzy Petrinet controller is arranged in the velocity PID form. The optimal values for the fuzzy Petri Net controller parameters have been achieved by using particle swarm optimization algorithm. In this paper, the reference trajectory is obtained from a reference model that can be designed to have the ideal required response of the Quadrotor, also using the quadrotor equations to find decoupling controller is first designed to reduce the effect of coupling between different inputs and outputs of quadrotor. The system performance has been measured by MATLAB. Simulation results showed that the FPN controller has a reasonable robustness against disturbances and good dynamic performance.
Independent Component Analysis (ICA) has been successfully applied to a variety of problems, from speaker identification and image processing to functional magnetic resonance imaging (fMRI) of the brain. In particular, it has been applied to analyze EEG data in order to estimate the sources form the measurements. However, it soon became clear that for EEG signals the solutions found by ICA often depends on the particular ICA algorithm, and that the solutions may not always have a physiologically plausible interpretation. Therefore, nowadays many researchers are using ICA largely for artifact detection and removal from EEG, but not for the actual analysis of signals from cortical sources. However, a recent modification of an ICA algorithm has been applied successfully to EEG signals from the resting state. The key idea was to perform a particular preprocessing and then apply a complex- valued ICA algorithm. In this paper, we consider multiple complex-valued ICA algorithms and compare their performance on real-world resting state EEG data. Such a comparison is problematic because the way of mixing the original sources (the “ground truth”) is not known. We address this by developing proper measures to compare the results from multiple algorithms. The comparisons consider the ability of an algorithm to find interesting independent sources, i.e. those related to brain activity and not to artifact activity. The performance of locating a dipole for each separated independent component is considered in the comparison as well. Our results suggest that when using complex-valued ICA algorithms on preprocessed signals the resting state EEG activity can be analyzed in terms of physiological properties. This reestablishes the suitability of ICA for EEG analysis beyond the detection and removal of artifacts with real-valued ICA applied to the signals in the time-domain.
The development of renewable resources and the deregulation of the market have made forecasting energy demand more critical in recent years. Advanced intelligent models are created to ensure accurate power projections for several time horizons to address new difficulties. Intelligent forecasting algorithms are a fundamental component of smart grids and a powerful tool for reducing uncertainty in order to make more cost- and energy-efficient decisions about generation scheduling, system reliability and power optimization, and profitable smart grid operations. However, since many crucial tasks of power operators, such as load dispatch, rely on short-term forecasts, prediction accuracy in forecasting algorithms is highly desired. This essay suggests a model for estimating Denmark’s power use that can precisely forecast the month’s demand. In order to identify factors that may have an impact on the pattern of a number of unique qualities in the city direct consumption of electricity. The current paper also demonstrates how to use an ensemble deep learning technique and Random forest to dramatically increase prediction accuracy. In addition to their ensemble, we showed how well the individual Random forest performed.
The conventional multilevel inverter (MLI) is divided into three types: diode clamped MLI, cascade H Bridge MLI and flying capacitor MLI. The main disadvantage of these types is the higher required number of components when the number of the levels increases and this results in more switching losses, system higher cost, more complex of control circuit as well as less accuracy. The work in this paper proposes two topologies of nonconventional diode clamping MLI three phase nine levels and eleven levels. The first proposed topology has ten switches and six diodes per phase while the second topology has nine switches and four diodes per phase. The pulse width modulation (PWM) control method is used as a control to gate switches. THD of the two proposed topologies are analyzed and calculated according different values of Modulation index (where the power loss and efficiency are obtained and plotted.
In this paper, a hierarchical Arabic phoneme recognition system is proposed in which Mel Frequency Cepstrum Coefficients (MFCC) features is used to train the hierarchical neural networks architecture. Here, separate neural networks (subnetworks) are to be recursively trained to recognize subsets of phonemes. The overall recognition process is a combination of the outputs of these subnetworks. Experiments that explore the performance of the proposed hierarchical system in comparison to non-hierarchical (flat) baseline systems are also presented in this paper.
The rapid progress in mobile computing necessitates energy efficient solutions to support substantially diverse and complex workloads. Heterogeneous many core platforms are progressively being adopted in contemporary embedded implementations for high performance at low power cost estimations. These implementations experience diverse workloads that offer drastic opportunities to improve energy efficiency. In this paper, we propose a novel per core power gating (PCPG) approach based on workload classifications (WLC) for drastic energy cost minimization in the dark silicon era. Core of our paradigm is to use an integrated sleep mode management based on workloads classification indicated by the performance counters. A number of real applications benchmark (PARSEC) are adopted as a practical example of diverse workloads, including memory- and CPU-intensive ones. In this paper, these applications are exercised on Samsung Exynos 5422 heterogeneous many core system showing up to 37% to 110% energy efficient when compared with our most recent published work, and ondemand governor, respectively. Furthermore, we illustrate low-complexity and low-cost runtime per core power gating algorithm that consistently maximize IPS/Watt at all state space.
Every day, a tremendous amount of image data is generated as a result of recent advances in imaging and computing technology. Several content-based image retrieval (CBIR) approaches have been introduced for searching image collections. These methods, however, involve greater computing and storage resources. Cloud servers can address this issue by offering a large amount of computational power at a low cost. However, cloud servers are not completely trustworthy, and data owners are concerned about the privacy of their personal information. In this research, we propose and implement a secure CBIR (SCBIR) strategy for searching and retrieving cipher text image databases. In the proposed scheme, the extract aggregated feature vectors to represent the related image collection and use a safe Asymmetric Scalar-Product-Preserving Encryption (ASPE) approach to encrypt these vectors while still allowing for similarity computation. To improve search time, all encrypted features are recursively clustered using the k-means method to create a tree index. The results reveal that SCBIR is faster at indexing and retrieving than earlier systems, with superior retrieval precision and scalability. In addition, our paper introduces the watermark to discover any illegal distributions of the images that are received by unlawful data users. Particularly, the cloud server integrates a unique watermark directly into the encrypted images before sending them to the data users. As a result, if an unapproved image copy is revealed, the watermark can be extracted and the unauthorized data users who spread the image can be identified. The performance of the proposed scheme is proved, while its performance is demonstrated through experimental results.
A new algorithm for the localization and identification of multi-node systems has been introduced in this paper; this algorithm is based on the idea of using a beacon provided with a distance sensor and IR sensor to calculate the location and to know the identity of each visible node during scanning. Furthermore, the beacon is fixed at middle of the frame bottom edge for a better vision of nodes. Any detected node will start to communicate with the neighboring nodes by using the IR sensors distributed on its perimeter; that information will be used later for the localization of invisible nodes. The performance of this algorithm is shown by the implementation of several simulations .
In this paper a fully neural network-based structure have been proposed to control speeds of rolling stands of a steel rolling mill. The structure has property of controlling the motors speed such that the loop height between each successive stands tracks the required height reference. Synchronization between these stands is also maintained so that the metal flow rate from first stand to the last stand is kept constant. This structure is robust against the disturbance effects such as, torque loading, plant parameter change... etc. The results reveal performance of the structure as a comparison with the conventional control method for a practical worksheet data.
The reliance on networks and systems has grown rapidly in contemporary times, leading to increased vulnerability to cyber assaults. The Distributed Denial-of-Service (Distributed Denial of Service) attack, a threat that can cause great financial liabilities and reputation damage. To address this problem, Machine Learning (ML) algorithms have gained huge attention, enabling the detection and prevention of DDOS (Distributed Denial of Service) Attacks. In this study, we proposed a novel security mechanism to avoid Distributed Denial of Service attacks. Using an ensemble learning methodology aims to it also can differentiate between normal network traffic and the malicious flood of Distributed Denial of Service attack traffic. The study also evaluates the performance of two well-known ML algorithms, namely, the decision tree and random forest, which were used to execute the proposed method. Tree in defending against Distributed Denial of Service (DDoS) attacks. We test the models using a publicly available dataset called TIME SERIES DATASET FOR DISTRIBUTED DENIAL OF SERVICE ATTACK DETECTION. We compare the performance of models using a list of evaluation metrics developing the Model. This step involves fetching the data, preprocessing it, and splitting it into training and testing subgroups, model selection, and validation. When applied to a database of nearly 11,000 time series; in some cases, the proposed approach manifested promising results and reached an Accuracy (ACC) of up to 100 % in the dataset. Ultimately, this proposed method detects and mitigates distributed denial of service. The solution to securing communication systems from this increasing cyber threat is this: preventing attacks from being successful.
The unprogrammed penetration for the loads in the distribution networks make it work in an unbalancing situation that leads to unstable operation for those networks. the instability coming from the imbalance can cause many serious problems like the inefficient use of the feeders and the heat increased in the distribution transformers. The demands response can be regarded as a modern solution for the problem by offering a program to decreasing the consumption behavior for the program's participators in exchange for financial incentives in specific studied duration according to a direct order from the utility. The paper uses a new suggested algorithm to satisfy the direct load control demand response strategy that can be used in solving the unbalancing problem in distribution networks. The algorithm procedure has been simulated in MATLAB 2018 to real data collected from the smart meters that have been installed recently in Baghdad. The simulation results of applying the proposed algorithm on different cases of unbalancing showed that it is efficient in curing the unbalancing issue based on using the demand response strategy.
the proposed design offers a complete solution to support and surveillance vehicles remotely. The offered algorithm allows a monitoring center to track vehicles; diagnoses fault remotely, control the traffic and control CO emission. The system is programmed to scan the on-board diagnostic OBD periodically or based on request to check if there are any faults and read all the available sensors, then make an early fault prediction based on the sensor readings, an experience with the vehicle type and fault history. It is so useful for people who are not familiar with fault diagnosis as well as the maintenance center. The system offers tracking the vehicle remotely, which protects it against theft and warn the driver if it exceeds the speed limit according to its location. Finally, it allows the user to report any traffic congestion and allow s a vehicle navigator to be up to date with the traffic condition based on the other system’s user feedback.
This paper focuses on designing distributed wireless sensor network gateways armed with Intrusion Detection System (IDS). The main contribution of this work is the attempt to insert IDS functionality into the gateway node (UBICOM IP2022 network processor chip) itself. This was achieved by building a light weight signature based IDS based on the famous open source SNORT IDS. Regarding gateway nodes, as they have limited processing and energy constrains, the addition of further tasks (the IDS program) may affects seriously on its performance, so that, the current design takes these constrains into consideration as a priority and use a special protocol to achieve this goal. In order to optimize the performance of the gateway nodes, some of the preprocessing tasks were offloaded from the gateway nodes to a suggested classification and processing server and a new searching algorithm was suggested. Different measures were taken to validate the design procedure and a detailed simulation model was built to discover the behavior of the system in different environments.
Agriculture is the primary food source for humans and livestock in the world and the primary source for the economy of many countries. The majority of the country's population and the world depend on agriculture. Still, at present, farmers are facing difficulty in dealing with the requirements of agriculture. Due to many reasons, including different and extreme weather conditions, the abundance of water quality, etc. This paper applied the Internet of Things and deep learning system to establish a smart farming system to monitor the environmental conditions that affect tomato plants using a mobile phone. Through deep learning networks, trained the dataset taken from PlantVillage and collected from google images to classify tomato diseases, and obtained a test accuracy of 97%, which led to the publication of the model to the mobile application for classification for its high accuracy. Using the IoT, a monitoring system and automatic irrigation were built that were controlled through the mobile remote to monitor the environmental conditions surrounding the plant, such as air temperature and humidity, soil moisture, water quality, and carbon dioxide gas percentage. The designed system has proven its efficiency when tested in terms of disease classification, remote irrigation, and monitoring of the environmental conditions surrounding the plant. And giving alerts when the values of the sensors exceed the minimum or higher values causing damage to the plant. The farmer can take the appropriate action at the right time to prevent any damage to the plant and thus obtain a high-quality product.
The power quality nowadays of the low voltage distribution system is vital for the utility and the consumer at the same time. One disturbing issue affected the quality conditions in the radial distribution system is load balancing. This survey paper is looking most the articles that deal with the phase nodal and lateral phase swapping because it is the efficient and direct method to maintain the current and voltage in balance situation, lead to a suitable reduction in the losses and preventing the wrong tripping of the protective relays.
Navigational sensors are evolving both on a commercial and research level. However, the limitation still lies in the accuracy of the respective sensors. For a navigation system to reach a certain accuracy, multi sensors or fusion sensors are used. In this paper, a framework of fuzzy sensor data fusing is proposed to obtain an optimised navigational system. Different types of sensors without a known state of inaccuracy can be fused using the same method proposed. This is demonstrated by fusing compass/accelerometer and GPS signal. GPS is prone to inaccuracies due to environmental factors. These inaccuracies are available in the extracted NMEA protocols as SNR and HDOP. Dead reckoning sensors on the other hand do not depend on external radio signal coverage and can be used in areas with low coverage, but the errors are unbounded and have an accumulative effect over time.
This article introduces a novel Quantum-inspired Future Search Algorithm (QFSA), an innovative amalgamation of the classical Future Search Algorithm (FSA) and principles of quantum mechanics. The QFSA was formulated to enhance both exploration and exploitation capabilities, aiming to pinpoint the optimal solution more effectively. A rigorous evaluation was conducted using seven distinct benchmark functions, and the results were juxtaposed with five renowned algorithms from existing literature. Quantitatively, the QFSA outperformed its counterparts in a majority of the tested scenarios, indicating its superior efficiency and reliability. In the subsequent phase, the utility of QFSA was explored in the realm of fault detection in underground power cables. An Artificial Neural Network (ANN) was devised to identify and categorize faults in these cables. By integrating QFSA with ANN, a hybrid model, QFSA-ANN, was developed to optimize the network’s structure. The dataset, curated from MATLAB simulations, comprised diverse fault types at varying distances. The ANN structure had two primary units: one for fault location and another for detection. These units were fed with nine input parameters, including phase- currents and voltages, current and voltage values from zero sequences, and voltage angles from negative sequences. The optimal architecture of the ANN was determined by varying the number of neurons in the first and second hidden layers and fine-tuning the learning rate. To assert the efficacy of the QFSA-ANN model, it was tested under multiple fault conditions. A comparative analysis with established methods in the literature further accentuated its robustness in terms of fault detection and location accuracy. this research not only augments the field of search algorithms with QFSA but also showcases its practical application in enhancing fault detection in power distribution systems. Quantitative metrics, detailed in the main article, solidify the claim of QFSA-ANN’s superiority over conventional methods.
Arial images are very high resolution. The automation for map generation and semantic segmentation of aerial images are challenging problems in semantic segmentation. The semantic segmentation process does not give us precise details of the remote sensing images due to the low resolution of the aerial images. Hence, we propose an algorithm U-Net Architecture to solve this problem. It is classified into two paths. The compression path (also called: the encoder) is the first path and is used to capture the image's context. The encoder is just a convolutional and maximal pooling layer stack. The symmetric expanding path (also called: the decoder) is the second path, which is used to enable exact localization by transposed convolutions. This task is commonly referred to as dense prediction, which is completely connected to each other and also with the former neurons which gives rise to dense layers. Thus it is an end-to-end fully convolutional network (FCN), i.e. it only contains convolutional layers and does not contain any dense layer because of which it can accept images of any size. The performance of the model will be evaluated by improving the image using the proposed method U-NET and obtaining an improved image by measuring the accuracy compared with the value of accuracy with previous methods.
The problem of automatic signature recognition and verification has been extensively investigated due to the vitality of this field of research. Handwritten signatures are broadly used in daily life as a secure way for personal identification. In this paper a novel approach is proposed for handwritten signature recognition in an off-line environment based on Weightless Neural Network (WNN) and feature extraction. This type of neural networks (NN) is characterized by its simplicity in design and implementation. Whereas no weights, transfer functions and multipliers are required. Implementing the WNN needs only Random Access Memory (RAM) slices. Moreover, the whole process of training can be accomplished with few numbers of training samples and by presenting them once to the neural network. Employing the proposed approach in signature recognition area yields promising results with rates of 99.67% and 99.55% for recognition of signatures that the network has trained on and rejection of signatures that the network has not trained on, respectively.
This paper presents new device to simulate and inject a 4-20 mA current signal to PLC and control on this signal wirelessly. The proposed simulator device has been designed and implemented by a PIC 18f4520 microcontroller and an Ethernet click. This device is connected to Wireless Local Area Network (WLAN) via Wi-Fi router using TCP/IP protocol. The simulator has two channels for 4-20 mA current output signals with two channels for digital output signals, controlled by a laptop or a smart mobile. The purpose of this work is to demonstrate the usefulness of the Wi-Fi wireless technology for remote controlling on the 4-20 mA output current signal and the digital output signal in the designed simulator device. The experiments indicate that the proposed wireless simulator outputs the 4- 20 mA current with high accuracy and very fast response. The experiments also indicate that the proposed wireless simulator is easy, comfortable and convenient practically to use in the test operations of protections, interlocks and integrity of analog input channels for PLC compared to the wired simulator.
In the world of modern technology and the huge spread of its use, it has been combined with healthcare systems and the establishment of electronic health records (EHR) to follow up on patients. This merging of technology with healthcare has allowed for more accurate EHRs that follow a patient to different healthcare facilities. Timely exchange of electronic health information (EHR) between providers is critical for aiding medical research and providing fast patient treatment. As a result, security issues and privacy problems are viewed as significant difficulties in the healthcare system. Several remote user authentication methods have been suggested. In this research, we present a feasible patient EHR migration solution for each patient. finally, each patient may securely delegate their current hospital’s information system to a hospital certification authority in order to receive migration proof that can be used to transfer their EHR to a different hospital. In addition, the proposed scheme is based on crypto-hash functions and asymmetric cryptosystems by using homomorphic cryptography. The proposed scheme carried out two exhaustive formal security proofs for the work that was provided. Using Scyther, a formal security tool, we present a secure user authentication technique in the proposed healthcare scheme that ensures security and informal analysis.
This paper presents the PLC-HMI based simulation of electrical-based PV cell/array model in laboratory platform to give the opportunity to students and users who haven't clear knowledge to study PV cell and array behavior with respect to change of environment conditions and electrical parameters. This simulation process covers the cell models under ideal and non-ideal ones. In non-ideal one, the series resistance and the shunt resistance are covered.
Self-organizing systems arise in many different fields. In this work we analyze data from social and biological systems. A central question is to demonstrate the presence of the determinism in time-series extracted from such systems that appear apparently not correlated but that are two good benchmarks for the study of complexity in real systems. We will apply the Kaplan test and we will define an order parameter for the biological data to characterize the complexity of the system.
A model reference adaptive control of condenser and deaerator of steam power plant is presented. A fuzzy-neural identification is constructed as an integral part of the fuzzy-neural controller. Both forward and inverse identification is presented. In the controller implementation, the indirect controller with propagating the error through the fuzzy-neural identifier based on Back Propagating Through Time (BPTT) learning algorithm as well as inverse control structure are proposed. Simulation results are achieved using Multi Input-Multi output (MIMO) type of fuzzy-neural network. Robustness of the plant is detected by including several tests and observations.
This paper presents a new optimization algorithm called corrosion diffusion optimization algorithm (CDOA). The proposed algorithm is based on the diffusion behavior of the pitting corrosion on the metal surface. CDOA utilizes the oxidation and reduction electrochemical reductions as well as the mathematical model of Gibbs free energy in its searching for the optimal solution of a certain problem. Unlike other algorithms, CDOA has the advantage of dispensing any parameter that need to be set for improving the convergence toward the optimal solution. The superiority of the proposed algorithm over the others is highlighted by applying them on some unimodal and multimodal benchmark functions. The results show that CDOA has better performance than the other algorithms in solving the unimodal equations regardless the dimension of the variable. On the other hand, CDOA provides the best multimodal optimization solution for dimensions less than or equal to (5, 10, 15, up to 20) but it fails in solving this type of equations for variable dimensions larger than 20. Moreover, the algorithm is also applied on two engineering application problems, namely the PID controller and the cantilever beam to accentuate its high performance in solving the engineering problems. The proposed algorithm results in minimized values for the settling time, rise time, and overshoot for the PID controller. Where the rise time, settling time, and maximum overshoot are reduced in the second order system to 0.0099, 0.0175 and 0.005 sec., in the fourth order system to 0.0129, 0.0129 and 0 sec, in the fifth order system to 0.2339, 0.7756 and 0, in the fourth system which contains time delays to 1.5683, 2.7102 and 1.80 E-4 sec., and in the simple mass-damper system to 0.403, 0.628 and 0 sec., respectively. In addition, it provides the best fitness function for the cantilever beam problem compared with some other well-known algorithms.
Due to the recent improvements in imaging and computing technologies, a massive quantity of image data is generated every day. For searching image collection, several content-based image retrieval (CBIR) methods have been introduced. However, these methods need more computing and storage resources. Cloud servers can fill this gap by providing huge computational power at a cheap price. However, cloud servers are not fully trusted, thus image owners have legal concerns about the privacy of their private data. In this paper, we proposed and implemented a privacy-preserving CBIR (PP-CBIR) scheme that allows searching and retrieving image databases in a cipher text format. Specifically, we extract aggregated feature vectors to represent the corresponding image collection and employ the asymmetric scalar-product-preserving encryption scheme (ASPE) method to protect these vectors while allowing for similarity computation between these encrypted vectors. To enhance search time, all encrypted features are clustered by the k-means algorithm recursively to construct a tree index. Results show that PP-CBIR has faster indexing and retrieving with good retrieval precision and scalability than previous schemes.
This article presents a novel optimization algorithm inspired by camel traveling behavior that called Camel algorithm (CA). Camel is one of the extraordinary animals with many distinguish characters that allow it to withstand the severer desert environment. The Camel algorithm used to find the optimal solution for several different benchmark test functions. The results of CA and the results of GA and PSO algorithms are experimentally compared. The results indicate that the promising search ability of camel algorithm is useful, produce good results and outperform the others for different test functions.
In coordination of a group of mobile robots in a real environment, the formation is an important task. Multi- mobile robot formations in global knowledge environments are achieved using small robots with small hardware capabilities. To perform formation, localization, orientation, path planning and obstacle and collision avoidance should be accomplished. Finally, several static and dynamic strategies for polygon shape formation are implemented. For these formations minimizing the energy spent by the robots or the time for achieving the task, have been investigated. These strategies have better efficiency in completing the formation, since they use the cluster matching algorithm instead of the triangulation algorithm.
In this study, we propose a compact, tri-band microstrip patch antenna for 5G applications, operating at 28 GHz, 38 GHz, and 60 GHz frequency bands. Starting with a basic rectangular microstrip patch, modifications were made to achieve resonance in the target frequency bands and improve S11 performance, gain, and impedance bandwidth. An inset feed was employed to enhance antenna matching, and a π–shaped slot was incorporated into the radiating patch for better antenna characteristics. The design utilized a Rogers RT/Duroid-5880 substrate with a 0.508 mm thickness, a 2.2 dielectric constant, and a 0.0009 loss tangent. The final dimensions of the antenna are 8 x 8.5 x 0.508 mm3. The maximum S11 values obtained at the resonant frequencies of 27.9 GHz, 38.4 GHz, and 56 GHz are -15.4 dB, -18 dB, and -26.4 dB, respectively. The impedance bandwidths around these frequencies were 1.26 GHz (27.245 - 28.505), 1.08 GHz (37.775 - 38.855), and 12.015 GHz (51.725 - 63.74), respectively. The antenna gains at the resonant frequencies are 7.96 dBi, 6.82 dBi, and 7.93 dBi, respectively. Radiation efficiencies of 88%, 84%, and 90% were achieved at the resonant frequencies. However, it is observed that the radiation is maximum in the broadside direction at 28 GHz, although it peaks at −41o/41o and −30o/30o at 38 GHz and 56 GHz, respectively. Furthermore, the antenna design, simulations, and optimizations were carried out using HFSS, and the results were verified with CST. Both simulators showed a reasonable degree of consistency, confirming the effectiveness and reliability of the proposed antenna design.
In this paper, a new compact coplanar antenna used for Radio frequency identification (FID) applications is presented. This antenna is operated at the resonant frequency of 2.45 GHz. The proposed antenna is designed on an epoxy substrate material type (FR-4) with small size of (40 × 28) mm2 in which the dielectric thickness (h) of 1.6 mm, relative permittivity (er) of 4.3 and tangent loss of 0.025. In this design the return loss is less than −10 dB in the frequency interval (2.12 − 2.84) GHz and the minimum value of return loss is -32 dB at resonant frequency. The maximum gain of the proposed antenna is 1.22 dB and the maximum directivity obtained is 2.27 dB. The patch and the ground plane of the proposed antenna are in the same surface. The proposed antenna has a wide bandwidth and omnidirectional radiation pattern with small size. The overall size of the compact antenna is (40 × 28 × 1.635) mm3. The Computer Simulation Technology (CST) microwave studio software is used for simulation and gets layout design.
A wireless sensor network consists of spatially distributed autonomous sensors to cooperatively monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants. Different approaches have used for simulation and modeling of SN (Sensor Network) and WSN. Traditional approaches consist of various simulation tools based on different languages such as C, C++ and Java. In this paper, MATLAB (7.6) Simulink was used to build a complete WSN system. Simulation procedure includes building the hardware architecture of the transmitting nodes, modeling both the communication channel and the receiving master node architecture. Bluetooth was chosen to undertake the physical layer communication with respect to different channel parameters (i.e., Signal to Noise ratio, Attenuation and Interference). The simulation model was examined using different topologies under various conditions and numerous results were collected. This new simulation methodology proves the ability of the Simulink MATLAB to be a useful and flexible approach to study the effect of different physical layer parameters on the performance of wireless sensor networks.
The robot is a repeated task plant. The control of such a plant under parameter variations and load disturbances is one of the important problems. The aim of this work is to design Genetic-Fuzzy controller suitable for online applications to control single link rigid robot arm plant. The genetic-fuzzy online controller (forward controller) contains two parts, an identifier part and model reference controller part. The identification is based on forward identification technique. The proposed controller it tested in normal and load disturbance conditions.
Preserving privacy and security plays a key role in allowing each component in the healthcare system to access control and gain privileges for services and resources. Over recent years, there have been several role-based access control and authentication schemes, but we noticed some drawbacks in target schemes such as failing to resist well-known attacks, leaking privacy-related information, and operational cost. To defeat the weakness, this paper proposes a secure electronic healthcare record scheme based on Schnorr Signcryption, crypto hash function, and Distributed Global Database (DGDB) for the healthcare system. Based on security theories and the Canetti-Krawczyk model (CK), we notice that the proposed scheme has suitable matrices such as scalability, privacy preservation, and mutual authentication. Furthermore, findings from comparisons with comparable schemes reveal that the suggested approach provides greater privacy and security characteristics than the other schemes and has enough efficiency in computational and communicational aspects.
This article analyzes thoroughly the performance of the Multi-Pulse Diode Rectifiers (MPDRs) regarding the quality of input/output voltage and currents. Two possible arrangements of MPDRs are investigated: series and parallel. The impact of the DC side connection on the performance of the MPDRs regarding the operation parameters and rectifier indices are comprehensively examined. Detailed analytical formulas are advised to identify clearly the key variables that control the operation of MPDRs. Moreover, comprehensive simulation results are presented to quantify the performance and validate the analytical analysis. Test-rig is set up to recognize the promising arrangement of MPDRs. Significant correlation is there between simulation and practical results. The analytical results are presented for aircraft systems (400Hz), and power grid systems (60Hz). This is to study the impact of voltage and frequency levels on the topology type of MPDRs. In general, each topology shows merits and have limitations.
Soft computing control system have been applied in various applications particularly in the fields of robotics controls. The advantage of having a soft computing controls methods is that it enable more flexibility to the control system compared with conventional model based controls system. In this paper, a UAV airship is controlled using fuzzy logic for its propulsion and steering system. The airship is tested on a simulation level before test flight. The prototype airship has on board GPS and compass for telemetry and transmitted to the ground control system via a wireless link.
In this paper, an analysis of performance acceleration of an external laser source (ELS) model based polymer fiber gratings (PFGs) by reducing the turn-on delay time (TDelay) is successfully investigated numerically by optimizing model parameters. In contrast to all previous studies that relied either on approximate or experimental equations, the analysis was based on an exact numerical formula. The analysis is based on the investigation of the effect of diode injected current (Iin j), temperature (T), recombination rate coefficients (i.e. Anr, B, and C), and optical feedback (OFB) level. Results have demonstrated that by optimizing model parameters the Delay can be controlled and reduced effectively.
In this article, a comparison of innovative multilevel inverter topology with standard topologies has been conducted. The proposed single phase five level inverter topology has been used for induction heating system. This suggested design generates five voltage levels with a fewer number of power switches. This reduction in number of switches decreases the switching losses and the number of driving circuits and reduce the complexity of control circuit. It also reduces the cost and size for the filter used. Analysis and comparison has been done among the conventional topologies (neutral clamped and cascade H-bridge multilevel inverters) with the proposed inverter topology. The analysis includes the total harmonic distortion THD, efficiency and overall performance of the inverter systems. The simulation and analysis have been done using MATLAB/ SIMULINK. The results show good performance for the proposed topology in comparison with the conventional topologies.
This work presents a healthcare monitoring system that can be used in an intensive care room. Biological information represented by ECG signals is achieved by ECG acquisition part . AD620 Instrumentation Amplifier selected due to its low current noise. The ECG signals of patients in the intensive care room are measured through wireless nodes. A base node is connected to the nursing room computer via a USB port , and is programmed with a specific firmware. The ECG signals are transferred wirelessly to the base node using nRF24L01+ wireless module. So, the nurse staff has a real time information for each patient available in the intensive care room. A star Wireless Sensor Network is designed for collecting ECG signals . ATmega328 MCU in the Arduino Uno board used for this purpose. Internet for things used For transferring ECG signals to the remote doctor, a Virtual Privet Network is established to connect the nursing room computer and the doctor computer . So, the patients information kept secure. Although the constructed network is tested for ECG monitoring, but it can be used to monitor any other signals. INTRODUCTION For elderly people, or the patient suffering from the cardiac disease it is very vital to perform accurate and quick diagnosis. Putting such person under continuous monitoring is very necessary. (ECG) is one of the critical health indicators that directly bene ¿ t from long-term monitoring. ECG signal is a time-varying signal representing the electrical activity of the heart. It is an effective, non- invasive diagnostic tool for cardiac monitoring[1]. In this medical field, a big improvement has been achieved in last few years. In the past, several remote monitoring systems using wired communications were accessible while nowadays the evolution of wireless communication means enables these systems to operate everywhere in the world by expanding internet benefits, applications, and services [2]. Wireless Sensor Networks (WSNs), as the name suggests consist of a network of wireless nodes that have the capability to sense a parameter of interest like temperature, humidity, vibration etc[3,4]. The health care application of wireless sensory network attracts many researches nowadays[ 5-7] . Among these applications ECG monitoring using smart phones[6,8], wearable Body sensors[9], remote patient mentoring[10],...etc. This paper presents wireless ECG monitoring system for people who are lying at intensive care room. At this room ECG signals for every patient are measured using wireless nodes then these signals are transmitted to the nursing room for remote monitoring. The nursing room computer is then connected to the doctors computer who is available at any location over the word by Virtual Privet Network (VPN) in such that the patients information is kept secure and inaccessible from unauthorized persons. II. M OTE H ARDWARE A RCHITECTURE The proposed mote as shown in Fig.1 consists of two main sections : the digital section which is represented by the Arduino UNO Board and the wireless module and the analog section. The analog section consists of Instrumentation Amplifier AD620 , Bandpass filter and an operational amplifier for gain stage, in addition to Right Leg Drive Circuit. The required power is supplied by an internal 3800MAH Lithium-ion (Li-ion) battery which has 3.7V output voltage.
Chaotic Sine-Cosine Algorithms (CSCAs) are new metaheuristic optimization algorithms. However, Chaotic Sine-Cosine Algorithm (CSCAs) are able to manipulate the problems in the standard Sine-Cosine Algorithm (SCA) like, slow convergence rate and falling into local solutions. This manipulation is done by changing the random parameters in the standard Sine-Cosine Algorithm (SCA) with the chaotic sequences. To verify the ability of the Chaotic Sine-Cosine Algorithms (CSCAs) for solving problems with large scale problems. The behaviors of the Chaotic Sine-Cosine Algorithms (CSCAs) were studied under different dimensions 10, 30, 100, and 200. The results show the high quality solutions and the superiority of all Chaotic Sine-Cosine Algorithms (CSCAs) on the standard SCA algorithm for all selecting dimensions. Additionally, different initial values of the chaotic maps are used to study the sensitivity of Chaotic Sine-Cosine Algorithms (CSCAs). The sensitivity test reveals that the initial value 0.7 is the best option for all Chaotic Sine-Cosine Algorithms (CSCAs).
Self-driving cars are a fundamental research subject in recent years; the ultimate goal is to completely exchange the human driver with automated systems. On the other hand, deep learning techniques have revealed performance and effectiveness in several areas. The strength of self-driving cars has been deeply investigated in many areas including object detection, localization as well, and activity recognition. This paper provides an approach to deep learning; which combines the benefits of both convolutional neural network CNN together with Dense technique. This approach learns based on features extracted from the feature extraction technique which is linear discriminant analysis LDA combined with feature expansion techniques namely: standard deviation, min, max, mod, variance and mean. The presented approach has proven its success in both testing and training data and achieving 100% accuracy in both terms.
Many assistive devices have been developed for visually impaired (VI) person in recent years which solve the problems that face VI person in his/her daily moving. Most of researches try to solve the obstacle avoidance or navigation problem, and others focus on assisting VI person to recognize the objects in his/her surrounding environment. However, a few of them integrate both navigation and recognition capabilities in their system. According to above needs, an assistive device is presented in this paper that achieves both capabilities to aid the VI person to (1) navigate safely from his/her current location (pose) to a desired destination in unknown environment, and (2) recognize his/her surrounding objects. The proposed system consists of the low cost sensors Neato XV-11 LiDAR, ultrasonic sensor, Raspberry pi camera (CameraPi), which are hold on a white cane. Hector SLAM based on 2D LiDAR is used to construct a 2D-map of unfamiliar environment. While A* path planning algorithm generates an optimal path on the given 2D hector map. Moreover, the temporary obstacles in front of VI person are detected by an ultrasonic sensor. The recognition system based on Convolution Neural Networks (CNN) technique is implemented in this work to predict object class besides enhance the navigation system. The interaction between the VI person and an assistive system is done by audio module (speech recognition and speech synthesis). The proposed system performance has been evaluated on various real-time experiments conducted in indoor scenarios, showing the efficiency of the proposed system.
This is a design of an expert system in the focused ion beam optical system by using fuzzy logic technique to build an intelligent agent. Present software has been designed as an interpretation expert system, written in Visual C# for optimizing the calculation of three electrostatic lenses column. By using such rule based engine, the axial potential distributions for electrostatic fields undergo the constraints have been used to find spot size focusing for ions in the image plane which have values are very useful for getting and designing FIB model, over ranges of ion beam angles (5, 10,30,50,75 and 100) mrad.
In recent years, there has been a considerable rise in the applications in which object or image categorization is beneficial for example, analyzing medicinal images, assisting persons to organize their collections of photos, recognizing what is around self-driving vehicles, and many more. These applications necessitate accurately labeled datasets, in their majority involve an extensive diversity in the types of images, from cats or dogs to roads, landscapes, and so forth. The fundamental aim of image categorization is to predict the category or class for the input image by specifying to which it belongs. For human beings, this is not a considerable thing, however, learning computers to perceive represents a hard issue that has become a broad area of research interest, and both computer vision techniques and deep learning algorithms have evolved. Conventional techniques utilize local descriptors for finding likeness between images, however, nowadays; progress in technology has provided the utilization of deep learning algorithms, especially the Convolutional Neural Networks (CNNs) to auto-extract representative image patterns and features for classification The fundamental aim of this paper is to inspect and explain how to utilize the algorithms and technologies of deep learning to accurately classify a dataset of images into their respective categories and keep model structure complication to a minimum. To achieve this aim, must focus precisely and accurately on categorizing the objects or images into their respective categories with excellent results. And, specify the best deep learning-based models in image processing and categorization. The developed CNN-based models have been proposed and a lot of pre-training models such as (VGG19, DenseNet201, ResNet152V2, MobileNetV2, and InceptionV3) have been presented, and all these models are trained on the Caltech-101 and Caltech-256 datasets. Extensive and comparative experiments were conducted on this dataset, and the obtained results demonstrate the effectiveness of the proposed models. The obtained results demonstrate the effectiveness of the proposed models. The accuracy for Caltech-101 and Caltech-256 datasets was (98.06% and 90%) respectively.
Automatic signature verification methods play a significant role in providing a secure and authenticated handwritten signature in many applications, to prevent forgery problems, specifically institutions of finance, and transections of legal papers, etc. There are two types of handwritten signature verification methods: online verification (dynamic) and offline verification (static) methods. Besides, signature verification approaches can be categorized into two styles: writer dependent (WD), and writer independent (WI) styles. Offline signature verification methods demands a high representation features for the signature image. However, lots of studies have been proposed for WI offline signature verification. Yet, there is necessity to improve the overall accuracy measurements. Therefore, a proved solution in this paper is depended on deep learning via convolutional neural network (CNN) for signature verification and optimize the overall accuracy measurements. The introduced model is trained on English signature dataset. For model evaluation, the deployed model is utilized to make predictions on new data of Arabic signature dataset to classify whether the signature is real or forged. The overall obtained accuracy is 95.36% based on validation dataset.
In smart cities, health care, industrial production, and many other fields, the Internet of Things (IoT) have had significant success. Protected agriculture has numerous IoT applications, a highly effective style of modern agriculture development that uses artificial ways to manipulate climatic parameters such as temperature to create ideal circumstances for the growth of animals and plants. Convolutional Neural Networks (CNNs) is a deep learning approach that has made significant progress in image processing. From 2016 to the present, various applications for the automatic diagnosis of agricultural diseases, identifying plant pests, predicting the number of crops, etc., have been developed. This paper involves a presentation of the Internet of Things system in agriculture and its deep learning applications. It summarizes the most essential sensors used and methods of communication between them, in addition to the most important deep learning algorithms devoted to intelligent agriculture.
Nowadays, renewable energy is being used increasingly because of the global warming and destruction of the environment. Therefore, the studies are concentrating on gain of maximum power from this energy such as the solar energy. A sun tracker is device which rotates a photovoltaic (PV) panel to the sun to get the maximum power. Disturbances which are originated by passing the clouds are one of great challenges in design of the controller in addition to the losses power due to energy consumption in the motors and lifetime limitation of the sun tracker. In this paper, the neuro-fuzzy controller has been designed and implemented using Field Programmable Gate Array (FPGA) board for dual axis sun tracker based on optical sensors to orient the PV panel by two linear actuators. The experimental results reveal that proposed controller is more robust than fuzzy logic controller and proportional- integral (PI) controller since it has been trained offline using Matlab tool box to overcome those disturbances. The proposed controller can track the sun trajectory effectively, where the experimental results reveal that dual axis sun tracker power can collect 50.6% more daily power than fixed angle panel. Whilst one axis sun tracker power can collect 39.4 % more daily power than fixed angle panel. Hence, dual axis sun tracker can collect 8 % more daily power than one axis sun tracker .
In this paper, a new algorithm called table-based matching for multi-robot (node) that used for localization and orientation are suggested. The environment is provided with two distance sensors fixed on two beacons at the bottom corners of the frame. These beacons have the ability to scan the environment and estimate the location and orientation of the visible nodes and save the result in matrices which are used later to construct a visible node table. This table is used for matching with visible-robot table which is constructed from the result of each robot scanning to its neighbors with a distance sensor that rotates at 360⁰; at this point, the location and identity of all visible nodes are known. The localization and orientation of invisible robots rely on the matching of other tables obtained from the information of visible robots. Several simulations implementation are experienced on a different number of nodes to submit the performance of this introduced algorithm.
In this work, the phase lock loop PLL-based controller has been adopted for tracking the resonant frequency to achieve maximum power transfer between the power source and the resonant load. The soft switching approach has been obtained to reduce switching losses and improve the overall efficiency of the induction heating system. The jury’s stability test has been used to evaluate the system’s stability. In this article, a multilevel inverter has been used with a series resonant load for an induction heating system to clarify the effectiveness of using it over the conventional full-bridge inverter used for induction heating purposes. Reduced switches five-level inverter has been implemented to minimize switching losses, the number of drive circuits, and the control circuit’s complexity. A comparison has been made between the conventional induction heating system with full bridge inverter and the induction heating system with five level inverter in terms of overall efficiency and total harmonic distortion THD. MATLAB/ SIMULINK has been used for modeling and analysis. The mathematical analysis associated with simulation results shows that the proposed topology and control system performs well.
Quantum-dot Cellular Automata (QCA) is a new emerging technology for designing electronic circuits in nanoscale. QCA technology comes to overcome the CMOS limitation and to be a good alternative as it can work in ultra-high-speed. QCA brought researchers attention due to many features such as low power consumption, small feature size in addition to high frequency. Designing circuits in QCA technology with minimum costs such as cells count and the area is very important. This paper presents novel structures of D-latch and D-Flip Flop with the lower area and cell count. The proposed Flip-Flop has SET and RESET ability. The proposed latch and Flip-Flop have lower complexity compared with counterparts in terms of cell counts by 32% and 26% respectively. The proposed circuits are designed and simulated in QCADesigner software.
Power transformer protective relay should block the tripping during magnetizing inrush and rapidly operate the tripping during internal faults. Recently, the frequency environment of power system has been made more complicated and the quantity of 2nd frequency component in inrush state has been decreased because of the improvement of core steel. And then, traditional approaches will likely be maloperated in the case of magnetizing inrush with low second harmonic component and internal faults with high second harmonic component. This paper proposes a new relaying algorithm to enhance the fault detection sensitivities of conventional techniques by using a fuzzy logic approach. The proposed fuzzy-based relaying algorithm consists of flux-differential current derivative curve, harmonic restraint, and percentage differential characteristic curve. The proposed relaying was tested with MATLAB simulation software and showed a fast and accurate trip operation.
In the era of modern trends such as cloud computing, social media applications, emails, mobile applications, and URLs that lead to increased risks for defrauding authorized users, and then the attackers try to gain illegal access to accounts of users through a malicious attack. The phishing attack is one of the dangerous attacks caused to access of authorized account illegally way. The finances, business, banking, and other sensitive in states are faces by this type of attacks due to the important information they have. In this paper, we propose a secure verification scheme that can overcome the above-mentioned issues. Additionally, the proposed scheme can resist famous cyberattacks such as impersonate attacks, MITM attacks. Moreover, the proposed scheme has security features like strong verification, forward secrecy, user’s identity anomaly. The security analysis and the experimental results proved the strongest of the proposed scheme compared with other related works. Finally, our proposed scheme balanced between the performance and the security merits.
Due to their vital applications in many real-world situations, researchers are still presenting bunches of methods for better analysis of motor imagery (MI) electroencephalograph (EEG) signals. However, in general, EEG signals are complex because of their nonstationary and high-dimensionality properties. Therefore, high consideration needs to be taken in both feature extraction and classification. In this paper, several hybrid classification models are built and their performance is compared. Three famous wavelet mother functions are used for generating scalograms from the raw signals. The scalograms are used for transfer learning of the well-known VGG-16 deep network. Then, one of six classifiers is used to determine the class of the input signal. The performance of different combinations of mother functions and classifiers are compared on two MI EEG datasets. Several evaluation metrics show that a model of VGG-16 feature extractor with a neural network classifier using the Amor mother wavelet function has outperformed the results of state-of-the-art studies.
Radio frequency identification (RFID) technology is being used widely in the last few years. Its applications classifies into auto identification and data capturing issues. The purpose of this paper is to design and implement RFID active tags and reader using microcontroller ATmega328 and 433 MHz RF links. The paper also includes a proposed mutual authentication protocol between RFID reader and active tags with ownership transfer stage. Our protocol is a mutual authentication protocol with tag’s identifier updating mechanism. The updating mechanism has the purpose of providing forward security which is important in any authentication protocol to prevent the attackers from tracking the past transactions of the compromised tags. The proposed protocol gives the privacy and security against all famous attacks that RFID system subjected for due to the transfer of data through unsecure wireless channel, such as replay, denial of service, tracking and cloning attacks. It also ensures ownership privacy when the ownership of the tag moves to a new owner.
In different modern and future wireless communication networks, a large number of low-power user equipment (UE) devices like Internet of Things, sensor terminals, and smart modules have to be supported over constrained power and bandwidth resources. Therefore, wireless-powered communication (WPC) is considered a promising technology for varied applications in which the energy harvesting (EH) from radio frequency radiations is exploited for data transmission. This requires efficient resource allocation schemes to optimize the performance of WPC and prolong the network lifetime. In this paper, harvest-then-transmit-based WP non-orthogonal multiple access (WP-NOMA) system is designed with time-split (TS) and power control (PC) allocation strategies. To evaluate the network performance, the sum rate and UEs’ rates expressions are derived considering power-domain NOMA with successive interference cancellation detection. For comparison purposes, the rate performance of the conventional WP orthogonal multiple access (WP-OMA) is derived also considering orthogonal frequency-division multiple access and time-division multiple access schemes. Intensive investigations are conducted to obtain the best TS and PC resource parameters that enable maximum EH for higher data transmission rates compared with the reference WP-OMA techniques. The achieved outcomes demonstrate the effectiveness of designed resource allocation approaches in terms of the realized sum rate, UE’s rate, rate region, and fairness without distressing the restricted power of far UEs.
Animating human face presents interesting challenges because of its familiarity as the face is the part utilized to recognize individuals. This paper reviewed the approaches used in facial modeling and animation and described their strengths and weaknesses. Realistic face animation of computer graphic models of human faces can be hard to achieve as a result of the many details that should be approximated in producing realistic facial expressions. Many methods have been researched to create more and more accurate animations that can efficiently represent human faces. We described the techniques that have been utilized to produce realistic facial animation. In this survey, we roughly categorized the facial modeling and animation approach into the following classes: blendshape or shape interpolation, parameterizations, facial action coding system-based approaches, moving pictures experts group-4 facial animation, physics-based muscle modeling, performance driven facial animation, visual speech animation.
This paper deals with the navigation of a mobile robot in unknown environment using artificial potential field method. The aim of this paper is to develop a complete method that allows the mobile robot to reach its goal while avoiding unknown obstacles on its path. An approach proposed is introduced in this paper based on combing the artificial potential field method with fuzzy logic controller to solve drawbacks of artificial potential field method such as local minima problems, make an effective motion planner and improve the quality of the trajectory of mobile robot.
The advancements in modern day computing and architectures focus on harnessing parallelism and achieve high performance computing resulting in generation of massive amounts of data. The information produced needs to be represented and analyzed to address various challenges in technology and business domains. Radical expansion and integration of digital devices, networking, data storage and computation systems are generating more data than ever. Data sets are massive and complex, hence traditional learning methods fail to rescue the researchers and have in turn resulted in adoption of machine learning techniques to provide possible solutions to mine the information hidden in unseen data. Interestingly, deep learning finds its place in big data applications. One of major advantages of deep learning is that it is not human engineered. In this paper, we look at various machine learning algorithms that have already been applied to big data related problems and have shown promising results. We also look at deep learning as a rescue and solution to big data issues that are not efficiently addressed using traditional methods. Deep learning is finding its place in most applications where we come across critical and dominating 5Vs of big data and is expected to perform better.