Mr. Ahmed S. Al-Araji; Miss May N. Bunny
Volume 6, Issue 2 , August 2006, , Page 92-111
Abstract
Abstract:
A neural network-based feedforward controller and self-tuning PID controller
with optimization algorithm is presented. The scheme of the controller is based on two
unknown models that describe the system and optimization algorithm. These models are
modified Elman recurrent neural network ...
Read More ...
Abstract:
A neural network-based feedforward controller and self-tuning PID controller
with optimization algorithm is presented. The scheme of the controller is based on two
unknown models that describe the system and optimization algorithm. These models are
modified Elman recurrent neural network and NARMA-L2. The modified Elman
recurrent neural network (MERNN) model and NARMA-L2 model are learned with
two stages off-line and on-line, in order to guarantee that the output of the model
accurately represents the actual output of the system. The aim from the NARMA-L2
model is to find the Inverse Feedforward Controller (IFC) which controls the steadystate
output of the system. The MERNN model after being learned is called the
identifier. The feedback PID self tuning control signal for N-step ahead can be
calculated the PID parameters by using the optimization algorithm with the quadratic
performance index which is quadratic in the error between the desired set point and the
model output, as well as quadratic of the control action. The paper explains the
algorithm for a general case, and then a specific application on non-linear dynamical
plant is presented.
Dr. Manal H. Jassim; Tamara Z. Fadhil
Volume 16, Issue 1 , December 2016, , Page 92-103
Abstract
Abstract –This paper, presents the design and implementation of Frequency Modulation Continuous Wave (FMCW) radar system working at 77GHz for Adaptive Cruise Control (ACC) technology which is a flexible system to estimate the speed and distance in accordance to vehicle ahead, which reduces the forces ...
Read More ...
Abstract –This paper, presents the design and implementation of Frequency Modulation Continuous Wave (FMCW) radar system working at 77GHz for Adaptive Cruise Control (ACC) technology which is a flexible system to estimate the speed and distance in accordance to vehicle ahead, which reduces the forces on the rate of accidents by warning the driver when two vehicles become too close. In addition, the principle of FMCW radar is presented to generate Linear Frequency Modulated Continuous Wave (LFMCW) sweep waveform through frequency bands with triangular frequency modulation using Voltage Control Oscillator (VCO), a triangle sweep pattern adopt will resolve ambiguity without Doppler processing. This improves the decision making before hardware implementation. The simulation design is achieving the desired performance, one parameter warrants further attention. In the FMCW configuration, the sweep time is about 25 microseconds. Therefore, the system needs to sweep a 140 MHz band within a very short period. Such an automotive radar may able to meet the cost requirement.
Dr. Muaiad Shawqi M. AL-Faysale; Haider Khudheyer Latif
Volume 5, Issue 2 , December 2005, , Page 93-103
Abstract
Abstract:
Aircraft convention defines the attitude parameters in terms of three angles: roll,
pitch and heading. These angles are referenced to the local horizontal plane defined by
gravity vector. Attitude information for aircraft is obtained by using spinning rotor or
ring laser gyroscopes. These ...
Read More ...
Abstract:
Aircraft convention defines the attitude parameters in terms of three angles: roll,
pitch and heading. These angles are referenced to the local horizontal plane defined by
gravity vector. Attitude information for aircraft is obtained by using spinning rotor or
ring laser gyroscopes. These systems are very precise but they suffer from many
problems such as high cost, large size and weight and the requirements for elaborate and
intricate mechanical structure.
These problems can be reduced by the exploitation of the micromachined technology.
In this work, an attitude measuring system based on the ADXL202
accelerometer, the HMC2003 magnetic sensor and the ADuC812 microcontroller has
been designed and implemented. An algorithm for decoding of the ADXL202 output
signals is described and implemented as software programs written in C-language to
perform and display the attitude measurements and a correction method for the errors
introduced by tilt angles is described.
The measuring system operation is examined by the test of the reading’s
repeatability and constancy. A good repeatability and constancy with a high degree of
precision and small amounts of error and dispersion are found from these tests.
Mr. Ahmed Sabah Abdul Ameer Al-Araji
Volume 5, Issue 1 , June 2005, , Page 94-109
Abstract
Abstract:
A neural network-based self-tuning PID controller is presented. The scheme of
the controller is based on using a modified Elman recurrent neural network as a selftuner
for (PID) controller. The proposed method has the advantage of not necessarily
using a combined structure of identification ...
Read More ...
Abstract:
A neural network-based self-tuning PID controller is presented. The scheme of
the controller is based on using a modified Elman recurrent neural network as a selftuner
for (PID) controller. The proposed method has the advantage of not necessarily
using a combined structure of identification and decision, common in a standard selftuning
controller, because it uses a genetic algorithm based model reference. The paper
explains the algorithm for a general case, and then presents a specific application on
non-linear dynamical plant.
Hassan J. Hassan
Volume 7, Issue 2 , December 2007, , Page 95-107
Abstract
Abstract:
Image identification plays a great role in industrial, remote sensing, medical and military applications. It is concerned with the generation of a signature to the image.
This work proposes a dynamic program (use Neural Network) to classify the texture of human member image then identify ...
Read More ...
Abstract:
Image identification plays a great role in industrial, remote sensing, medical and military applications. It is concerned with the generation of a signature to the image.
This work proposes a dynamic program (use Neural Network) to classify the texture of human member image then identify whether the member is infected or not. The program has the ability of determining which part of that member is infected depending on the comparison between the healthy member image stored in advance with a test image.
The first step is to make approximation to the image using wavelet network (Wavenet) technique. Through this technique we shall get an approximated image with reduced data. In addition, we shall get implicit information to that image. The second step is to subdivide the resultant image from the first step into 16 equally subparts then deal with each subpart as a unique image.
Finally, in the third step, the minimum distance (Mahalanobias Distance) approach is employed for subpart identification. All programs are written using MATLAB VER. 6.5 package.
Janan A. Mahdi; Saleh M. Al-Qarrawy; Ashwaq T. Hashim
Volume 9, Issue 1 , December 2009, , Page 95-109
Abstract
Abstract:
Block cipher is a major part of cipher algorithm like stream cipher and other techniques. Its power comes from dealing with plaintext as parts and operating on each block independently. Blowfish is a secret-key block cipher proposed by B. Shneier. It is a Feistel network, iterating a simple ...
Read More ...
Abstract:
Block cipher is a major part of cipher algorithm like stream cipher and other techniques. Its power comes from dealing with plaintext as parts and operating on each block independently. Blowfish is a secret-key block cipher proposed by B. Shneier. It is a Feistel network, iterating a simple encryption function 16 times. The block size is 8-bytes and the key can be any length up to 56-bytes.
In this paper, a Blowfish was improved to encrypt 16-bytes using a variable key length from 8-bytes up to 144-bytes. During the design of Improved Blowfish algorithm, the pragmatic aim was to satisfy as many goals as possible while keeping the cipher simple. Only by keeping a cipher simple one can achieve a well-understood level of security, good performance, and a versatility of design that makes the cipher highly adaptable to future demands. The improved algorithm reduced the memory requirement by using a single S-box instead of four S-boxes without compromising security. The security of improved Blowfish algorithm will be increased by several techniques where the block size and key length were increased, using more complex function before the first round and after the last round and using a complex function to avoid a symmetric to the output of S-box.
Dr. Siddeeq Ameen Yousif; Dr. Laith Jasim Saud
Volume 12, Issue 1 , June 2012, , Page 96-103
Abstract
This paper proposes two important mathematical models related to network topology
which helps in computing some of the efficiency or reliability factors of communication
network as well as design purposes. Each of these models represents a topology
property. The first (second) of these models is used ...
Read More ...
This paper proposes two important mathematical models related to network topology
which helps in computing some of the efficiency or reliability factors of communication
network as well as design purposes. Each of these models represents a topology
property. The first (second) of these models is used to compute the number of
appearances of any link (node) in the geodesics between nodes in a given network
topology, and so can be used to help in uniformly distributing the data flow through
links (nodes), as well as helping in measuring the degree of survivability of the network
in case of failure of some of its links (nodes). The two models have been developed
using “Graph Theory”, and so, giving the advantage of using the very wide range of
ideas, tools, and theorems of this field in case of developing other network topology
formulas based on the two models proposed in this paper.
Ms.c. Hussain Karrem Khleaf; Assit. Prof. Dr. Hanan A. R. Akkar
Volume 7, Issue 1 , June 2007, , Page 97-110
Abstract
ABSTRACT:
In this paper back-propagation neural network is presented for pattern recognition of ECG wave analysis and diagnosis, where training is applied for some common heart disease. Linear Predictive Coding (LPC) is used as a proposed method to compress the data, which were extracted from electrocardiogram, ...
Read More ...
ABSTRACT:
In this paper back-propagation neural network is presented for pattern recognition of ECG wave analysis and diagnosis, where training is applied for some common heart disease. Linear Predictive Coding (LPC) is used as a proposed method to compress the data, which were extracted from electrocardiogram, ECG paper. LPC method is tested before using it in this work, where it has succeeded in verifying coding operation to the signals. This method is efficient to reduce the ANN size used in this work. Data used are obtained from all currently available ECG databases, which were previously collected from different fields, such as Internet sites, different hospitals and some publications related with this field. The ECG samples were processed and normalized to produce a set of data that was applied to LPC and then to Artificial Neural Network (ANN). The results obtained are compared with the classifications made by a Doctor, where these results proved an efficient diagnosis with good performance and accuracy. Simulation results are obtained using technical (MATLAB) package implemented on IBM PC.
Samir M. Hameed
Volume 11, Issue 1 , June 2011, , Page 97-105
Abstract
Abstract:
This paper presents indoor propagation modeling for wireless local area network at 2.4GHz. Different propagation path loss models are simulated such as the International Telecommunication Union (ITU) and the log-distance path loss models. The ITU model is tested in residential or office environments, ...
Read More ...
Abstract:
This paper presents indoor propagation modeling for wireless local area network at 2.4GHz. Different propagation path loss models are simulated such as the International Telecommunication Union (ITU) and the log-distance path loss models. The ITU model is tested in residential or office environments, and is examined; wether the position of the Access Point (AP) and the WLAN cards on the same floor or in another floors. Log-distance path loss model is tested and simulated; from this model the effects of the shadowing deviation can be seen. Practical measurements will be taken by using a laptop equipped with the NETSTUMBLER 0.40 software to see the impression of walls and doors. Different charts are illustrated to view the responses of ITU and log-distance path loss models versus distances, path loss, transmitting power and receiving power. Practical data are also plotted in different cases, for open area between AP and mobile user and in a random positions case.
Susan .S. Ghazoul; Lina Saeed Jajo
Volume 10, Issue 1 , December 2010, , Page 98-106
Abstract
Abstract:
In this paper we propose a new method of hiding information that produces a stego-image which is totally indistinguishable from the original image to extract the hiding message. GA is used as an efficient method to minimize the number of different bits between the cover image and the stego-image ...
Read More ...
Abstract:
In this paper we propose a new method of hiding information that produces a stego-image which is totally indistinguishable from the original image to extract the hiding message. GA is used as an efficient method to minimize the number of different bits between the cover image and the stego-image as minimum as possible by embedding the message in random locations of cover image, and then modifying the locations containing changed information in original image (cover) to improve stego-image quality. To satisfy excellent security we used a crypto-key which contains encrypted locations from hiding process. This key is used to extract the embedded message.
Areej Alaa Hassen; Abeer Fadhil Shamal
Volume 8, Issue 1 , December 2008, , Page 99-112
Abstract
Abstract:
Motion detectors are widely implemented in the design of intruder alarm systems. While these detectors in their raw state can have high detection sensitivity, this comes at the expense of generating higher false alarm rates. The most popular motion detection techniques implement either Passive ...
Read More ...
Abstract:
Motion detectors are widely implemented in the design of intruder alarm systems. While these detectors in their raw state can have high detection sensitivity, this comes at the expense of generating higher false alarm rates. The most popular motion detection techniques implement either Passive infrared motion sensors or Active Continuous Wave Microwave Doppler motion sensors. Motion detectors using Dual Detectors employing both Doppler Microwave (MW) and Passive Infrared (PIR) motion sensors provide a new performance level where the feature of both sensors are combined while avoiding the disadvantages of both. The sensors are combined through a microprocessor to provide” intelligent “motion detection system designed to greatly reduce or eliminate “single detector” false alarm. A peripheral Integrated Controller (PIC) based on the popular 8051 device manufactured by Cygnal Corporation the C8051F020 has been chosen in order to reduce designed hardware complexity and utilize the improved features of this device to obtain better system performance. The PIR and Doppler Microwave detection systems are each designed as independent motion detectors. The PIC receives signals from these two sensors in addition to a third signal from a light sensor. The PIC compares the received signals against pre-stored values, double checking their existence in addition to dynamically selecting threshold detection levels depending on weather the motion detection system was operating in day light or at night. The result is a detector with a higher performance in terms of accuracy and detection certainty. The designed system has a large room for continued performance enhancements and features addition that can lead to designing a motion detection system that can fulfill every security system requirement.
Dr.Walid A. Mahmoud; Dr.Munther N; Muthana
Volume 6, Issue 3 , December 2006, , Page 101-116
Dr. Hazem I. Ali; kais I. Abdul-Lateef; Goran A. Mohammed
Volume 6, Issue 1 , April 2006, , Page 103-115
Dr. Hilal Hadi Saleh; Dr. Ahmed Tariq Sadiq; Emad Kadhum Jabbar
Volume 4, Issue 1 , December 2004, , Page 103-110
Dr. Mohamed Jasim Mohamed
Volume 12, Issue 1 , June 2012, , Page 104-117
Abstract
In this paper, a new method for finding global optimal path planning is
proposed using a Genetic Algorithm (GA). A map of known static environment as well
as a start node and a target node connecting an optimal path which is required to be
found are given beforehand. The chosen nodes in a known static ...
Read More ...
In this paper, a new method for finding global optimal path planning is
proposed using a Genetic Algorithm (GA). A map of known static environment as well
as a start node and a target node connecting an optimal path which is required to be
found are given beforehand. The chosen nodes in a known static environment are
connected by sub-paths among each other. Each path is represented by a series of subpaths
which connect the sequential nodes to form this path. Each sub-path radiating
from each node is labeled by an integer. The chromosome code of a path is a string of
series integers that represent the labels of sub-paths which are passed through traveling
from start node to target node. Two factors are integrated into a fitness function of the
proposed genetic algorithm: the feasibility of collision avoidance path and the shortest
distance of path. Two examples of known static environment maps are taken in this
study with different numbers of obstacles and nodes. Simulation results show the
effectiveness and feasibility of the proposed GA using sub-path codes to find optimum
path planning for mobile robot.
Mr.Munqith A At-Baker; Miss. Ameera; Ali Salman AI-Qaissi
Volume 5, Issue 2 , December 2005, , Page 104-113
a Abdul-Ameer Abdul-Jabbar; Isra
Volume 16, Issue 1 , December 2016, , Page 104-117
Abstract
Abstract – This paper aims to enhance the recognition rate in some Gabor face recognition techniques; the enhancement is done using two filtering stages. the first stage consists of applying adapted wavelet de-noising filter on the face database, this adaptive filter is composed of two filters (Bior ...
Read More ...
Abstract – This paper aims to enhance the recognition rate in some Gabor face recognition techniques; the enhancement is done using two filtering stages. the first stage consists of applying adapted wavelet de-noising filter on the face database, this adaptive filter is composed of two filters (Bior 1.1 and Daubachies6) which are implemented successively both are at level 10 of decomposition. The second stage consists of computing and extracting the Gabor magnitude features using Gabor filter with 5 scaling and 8 orientations. All face images are loaded from the ORL database. As a result the Adaptive filtering technique produced good enhancement when applied on face recognition techniques, since two groups are used and are compared with our work. Each group includes four face recognition techniques: the first technique is Principal Component Analysis (PCA), the second technique is the Linear Discriminate Analysis (LDA), the third technique is the Kernel Principal Component Analysis (KPCA) and the fourth technique is the Kernel Fisher Analysis (KFA). The first group is applied with non-filtered techniques and the second group is filtered with Gabor filter, both groups are compared with the same group of techniques when de-noised with the adaptive double filter.
Dr. Yazen A. Khalil
Volume 11, Issue 1 , June 2011, , Page 106-113
Abstract
Abstract:
This article presents a proposed design and implementation of an 8-bit Arithmetic Multiplier based on FPGA (Field Programmable Gate Array). The design is implemented a schematic FPGA way using CPLD (Complex Programmable Logic Device) development board SN-PLDE2. The development board contains ...
Read More ...
Abstract:
This article presents a proposed design and implementation of an 8-bit Arithmetic Multiplier based on FPGA (Field Programmable Gate Array). The design is implemented a schematic FPGA way using CPLD (Complex Programmable Logic Device) development board SN-PLDE2. The development board contains an FPGA device EPF8282ALC4-4 (5000 gates account) of Altera FLEX8000 family (Flexible Logic Element MatriX) with the other necessary peripherals. The proposed design is achieved under MAXplus2 V10.1 software for FPGA programming. The designed arithmetic multiplier is tested using an experiment board (SN-PLDE3A). The results show both efficient usage and high performance including the accuracy and the fast operation.
Dr. Amjad J. Humaidi
Volume 10, Issue 1 , December 2010, , Page 107-120
Abstract
Abstract:
Pneumatic servo system has been applied in many industry fields. The system has many advantages, such as high speed, high flexibility and low price. However, the application of the system is restricted because the physical parameters have strong nonlinearity, inaccuracy and uncertainty, so ...
Read More ...
Abstract:
Pneumatic servo system has been applied in many industry fields. The system has many advantages, such as high speed, high flexibility and low price. However, the application of the system is restricted because the physical parameters have strong nonlinearity, inaccuracy and uncertainty, so that it is very difficult to find an optimal controller by means of traditional control theory. Proportional integral derivative (PID) control is one of the earlier control strategies; it has a simple control structure and can be easily tuned. Optimization of PID controller parameters is one of the recent control solutions; especially when the system is of high complexity. In this paper foraging strategy has been adopted to optimize the gains of PID controller for positioning control of a pneumatic system. The foraging theory is based on the assumption that animals search for nutrients in a way that maximize their energy intake per unit time spent for foraging. The bacterial foraging algorithm is a non-gradient and stochastical optimization technique; as no need for measurement and analytical description. In the work, the optimization model of E. coli bacterial foraging has been used and the performance index (cost) is based on Integral Square Error (ISE) for obtaining sub-optimal values of controller parameters. The behavior of bacteria (solutions) over their lifetime has been simulated and the effect of foraging parameters on cost function has been studied.
Kanaan A. Jalal; Saadi A. Khudair; A. K. M. Al-Shaikhli
Volume 7, Issue 2 , December 2007, , Page 108-116
Abstract
Abstract:
Direct torque control became the most popular technique for induction motor control through the last two decades, because of its simple structure, accurate and fast torque response, but it has some drawbacks such as torque and stator flux ripples. Therefore, an accurate and fast estimation ...
Read More ...
Abstract:
Direct torque control became the most popular technique for induction motor control through the last two decades, because of its simple structure, accurate and fast torque response, but it has some drawbacks such as torque and stator flux ripples. Therefore, an accurate and fast estimation of stator flux and torque values is required.
In this paper a proposed model for two Multi-layer Feed-Forward Neural Network (MFFNN) to simulate and train the direct torque control data of three phase induction motor for estimation of electromagnetic torque, stator flux, and flux angle at two different sampling frequencies. The feed-forward neural networks proposed consist of three layers. The input layer consists of four neurons (stator voltages and currents) and the output layer consists of three neurons (electromagnetic torque, stator flux and flux angle). Quick back-propagation algorithm is used to train the proposed networks. Simulation model is performed using MATLAB. The results have been compared according to computation time and accuracy.
Dr. Azad Raheem Kareem
Volume 9, Issue 1 , December 2009, , Page 110-115
Abstract
Abstract :
In this paper, a proposed method to implement the image parameter filters is presented. It is based on cascading π-networks and using a proposed bisected-T m-derived matching section to the source and load impedances instead of the use of the cascaded T-networks and the classical bisected-π ...
Read More ...
Abstract :
In this paper, a proposed method to implement the image parameter filters is presented. It is based on cascading π-networks and using a proposed bisected-T m-derived matching section to the source and load impedances instead of the use of the cascaded T-networks and the classical bisected-π matching sections. The proposed method achieves the advantage of reducing the total number of the inductors in the circuit which is a great benefit for circuit implementation in the recent monolithic microwave integrated circuit (MMIC) technology. The method also finds application in broadband microwave distributed amplifiers design.
Al-kenany S.H
Volume 5, Issue 1 , June 2005, , Page 110-126
Abstract
Abstract:
The core objectives of this research are to identify, understand and describe
range of workable–based methods for quantitatively measuring the quality of an image
represented in various file formats. Moreover, it suggests methods for measuring an
image quality in varied graphic file formats. ...
Read More ...
Abstract:
The core objectives of this research are to identify, understand and describe
range of workable–based methods for quantitatively measuring the quality of an image
represented in various file formats. Moreover, it suggests methods for measuring an
image quality in varied graphic file formats. The research describes current popular and
available graphic file formats, and the compression methods are utilized as well as color
spaces, etc. The type of image display in use also affects the visual appearance of
images. Furthermore, the lower depth output and use of colors fail affects the
magnification features.
Fadel S. Hassen; Ahmed K. Hassan
Volume 7, Issue 1 , June 2007, , Page 111-124
Abstract
Abstract:
Digital images are widely used in computer applications. Uncompressed digital
images require considerable storage capacity and transmission bandwidth. Efficient image
compression solutions are becoming more critical with the recent growth of data intensive
and multimedia-based web application.
In ...
Read More ...
Abstract:
Digital images are widely used in computer applications. Uncompressed digital
images require considerable storage capacity and transmission bandwidth. Efficient image
compression solutions are becoming more critical with the recent growth of data intensive
and multimedia-based web application.
In this paper, Hybrid Differential Pulse Code Modulation (DPCM) in wavelet
domain and lossless methods (Huffman and Run length code) for image compression is
investigated. The image signal is composed into four scales (approximate, horizontal,
vertical and diagonal coefficients). The energy level of approximate is different from that of
detail information; therefore, the approximate is quantized alone and horizontal and vertical
are quantized alone by using the differential pulse code modulation (DPCM). In all
simulations the diagonal coefficients are discarded. Two types of coding are used, Huffman
code and run length coding (RLC) techniques. The results show that truncate horizontal
and vertical coefficients using hard threshold gives best performance than soft threshold
with gain about 3 dB to get the same compression ratio (CR). The wavelet based image
compression using Huffman code gives CR about 77% compared with RLC that gives CR
about 71% with suitable peak signal to noise ratio (PSNR).
Key words: image compression, discrete wavelet transforms (DWT), differential pulse
code modulation (DPCM), Huffman code and run length code (RLC)
Miss. Ameera Ali Salman
Volume 4, Issue 1 , December 2004, , Page 111-121
Dr. Akram Fajer Bati; Nabeel E. Adam
Volume 6, Issue 2 , August 2006, , Page 112-125
Abstract
Abstract:
Evolutionary algorithms, Genetic algorithms in particular, are known to be robust and have been increasing popularity in the field of numerical optimization. Neural networks and genetic algorithms demonstrate powerful problem solving ability. They are based on quite simple principles, but ...
Read More ...
Abstract:
Evolutionary algorithms, Genetic algorithms in particular, are known to be robust and have been increasing popularity in the field of numerical optimization. Neural networks and genetic algorithms demonstrate powerful problem solving ability. They are based on quite simple principles, but take advantage of their mathematical nature: non-linear iteration. Neural networks with back-propagation learning showed results by searching for various kinds of functions. However, the choice of the basic global performance index ( parameter weights) often already determines the success of the training process. The study presents a hybrid controller system; has been optimized by genetic algorithm optimization tool. GA based optimization scheme for simultaneous coordination of multiple power system damping controllers. Local measurements will be considered as input signals to the damping controller. The proposed algorithm will be applied to tuning controller of a single machine infinite bus power system . All simulations will be carried out using MATLAB based package for nonlinear simulations of power systems Controllers will be designed using MATLAB neural network functions and genetic algorithms optimization tool.