Hayder Ahmed Abdulmohsin
Volume 13, Issue 1 , April 2013, , Page 41-48
Abstract
Abstract – IEEE 802.15.4 is a standard designed for low data rate, low power
wireless personal area networks (WPANs) intended to provide interconnection of nodes
via radio communication. Such nodes have very limited computation, energy, and
communication capabilities. In order to extend the lifetime ...
Read More ...
Abstract – IEEE 802.15.4 is a standard designed for low data rate, low power
wireless personal area networks (WPANs) intended to provide interconnection of nodes
via radio communication. Such nodes have very limited computation, energy, and
communication capabilities. In order to extend the lifetime of the nodes, we propose a
fuzzy logic controller to adapt a duty cycle of each node by changing superframe order
(SO) based upon the network traffic and node's buffer occupation. Simulating the
proposed algorithm in Castalia simulator and comparing it with constant duty cycle
schemes are carried out in this paper. Simulation results show that the proposed
algorithm decreases drop packets in node's buffer, decreases packet latency and
increases energy efficiency.
Dr. Manal H. Jassim; Asaad Hameed Sahar
Volume 13, Issue 3 , December 2013, , Page 41-50
Abstract
Abstract-Depending on the response of the system, digital Filters can be designed
using frequency sampling or windowing methods; but these methods have a problem in
precise control of the critical frequencies. In the sampling method, the weighted
approximation error between the actual frequency response ...
Read More ...
Abstract-Depending on the response of the system, digital Filters can be designed
using frequency sampling or windowing methods; but these methods have a problem in
precise control of the critical frequencies. In the sampling method, the weighted
approximation error between the actual frequency response and the desired filter
response is spread across the pass-band and the stop-band and the maximum error is
minimized, resulting ripples in the pass-band and the stop-band. The frequency
sampling method has the same tolerance requirements as the windowing method. In this
work we implemented a digital FIR high pass filter using MATLAB program
(FDATools) using sampling and windowing methods, then the design in the FPGA kit
is downloaded by generating VHDL description. A comparison the amount of the
component has been used in the FPGA for both methods. The FIR filter is implemented
using Spartan 3AN- XC3S700a-4FG484FPGA and simulated with the help of Xilinx
ISE (Integrated Software Environment) Software WEBPACK Project Navigator 11i.
Shaymaa Mahmood Mahdi
Volume 12, Issue 1 , June 2012, , Page 42-52
Abstract
The purpose of this paper is to present the modeling and simulation of a servo
hydraulic system. Hydraulic systems are broadly used in the industry due to their
ability to adapt to a wide range of purposes and their proven robustness. First we
develop a mathematical model to obtain the system responses. ...
Read More ...
The purpose of this paper is to present the modeling and simulation of a servo
hydraulic system. Hydraulic systems are broadly used in the industry due to their
ability to adapt to a wide range of purposes and their proven robustness. First we
develop a mathematical model to obtain the system responses. These responses
represent the response of the servo hydraulic system with a sinusoidal input.
Secondly, we design a PID controller in order to improve the position transient
response and reach minimum steady state error in the output displacement. Then, we
use Genetic Algorithm technique to find the best (KP, KI and KD) gains for PID
controller to enhance the output of the servo hydraulic system.
The results have showed a higher improvement of the servo hydraulic system
response with minimizing the steady state error after using the PID controller gains
obtained from the Genetic Algorithm technique.
Dr. SIDDEEQ Y. AMEEN
Volume 5, Issue 1 , June 2005, , Page 42-57
Abstract
Abstract:
The paper attempts to provide most of the well-known security services through a
design and implementation of a client/server-based network security system. The system
is based on recommendation of the Advanced Encryption Standard (AES) together with
some secure techniques. These techniques ...
Read More ...
Abstract:
The paper attempts to provide most of the well-known security services through a
design and implementation of a client/server-based network security system. The system
is based on recommendation of the Advanced Encryption Standard (AES) together with
some secure techniques. These techniques include message digest (MD5), data
compression, data scrambling, traffic padding, novel PN sequence generator that is based
on AES and the RSA for secure key distribution.
The generator is based on the standard ANSI X9.17 with triple AES instead of
triple DES. Recommended statistical tests are carried out to check the randomness of the
new generator. The results of these tests show that the new generator passes all the
required tests successfully. The latter results being even better than those achieved by the
standard generator ANSI X9.17 using AES or triple DES.
Finally, the security system was implemented and tested between two PCs in a
local area network. The results clearly demonstrate the successful operation of the
security system through the secure transmission of data. The security of the proposed
system is shown to be efficient since all the combined techniques are well-established
and recommended. Furthermore, with the multi-keys required to perform the operation,
the tasks of cryptanalyst with available computing power will be difficult.
Dr. Amjad J. Humaid; Dr. Hamid M. Hasan; Dr. Firas A. Raheem
Volume 14, Issue 3 , December 2014, , Page 42-51
Abstract
Abstract— Nowadays congestion in computer networks is pointed out as an
important and a challenging problem. TCP (Transmission Control Protocol) has the
mechanism to avoid congestion in computer networks. TCP detects congestion by
checking acknowledgements or time-out processing and adjusts TCP ...
Read More ...
Abstract— Nowadays congestion in computer networks is pointed out as an
important and a challenging problem. TCP (Transmission Control Protocol) has the
mechanism to avoid congestion in computer networks. TCP detects congestion by
checking acknowledgements or time-out processing and adjusts TCP window sizes of
senders. However, this control method shows low efficiency in communications
because it is based on a mechanism that avoid congestion after congestion once appears
in computer networks. TCP random early detection RED is another popular congestion
control scheme. The fundamental idea behind this control algorithm randomly drops the
incoming packets proportional to the average queuing length and to keep the queuing
length to a minimum. To achieve high efficiency and high reliability of communications
in computer networks, many control strategies based on advanced control theories have
been introduced to tackle the congestion problem. Model Predictive Control (MPC) is
the only practical control method that takes account of system constraints explicitly, and
the only ‘advanced control’ method to have been adopted widely in industry. MPC is a
model-based method which uses online optimization in real time to determine control
signals. The solution to optimization problem is usually formulated with the help of a
process model and measurements. At each control interval, an optimization algorithm
attempts to determine the plant dynamics by computing a sequence of control input
values satisfying the control specifications. In this work, a planning strategy based on
MPC will be developed for congestion control problem. A "preset controllers" approach
will be introduced for such application. The effectiveness of considered controller will
assessed in terms of how well it could show good tracking performance, maximizing the
utilization of the available bandwidth and to what extent it could cope with system
uncertainties.
A. E. Abdelkareem
Volume 17, Issue 1 , December 2017, , Page 42-48
Abstract
In this paper, the performance of convolutional code constraint length for bandwidth efficient transmission over AWGN and Rayleigh fading channels is presented. Using intensive simulation and in terms of BER error floor, we evaluate the performance of binary phase shift keying (BPSK) mapping scheme. ...
Read More ...
In this paper, the performance of convolutional code constraint length for bandwidth efficient transmission over AWGN and Rayleigh fading channels is presented. Using intensive simulation and in terms of BER error floor, we evaluate the performance of binary phase shift keying (BPSK) mapping scheme. In addition, the hardware implementation considerations based on the Digital Signal Processor (DSP) platform of convolutional decoding are discussed. To be more specific, the code constraint length effect on both memory management and clock cycles are considered.
Sarmad Hassan Ahmed; Ali A. Ati
Volume 7, Issue 2 , December 2007, , Page 43-63
Abstract
Abstract:
This paper presents the design and practical implementation of a multi-channel PC based logic analyzer. The analyzer has16 input channels with memory depth of 4K snapshots/channel and capture rate of up to 5 MHz. The analyzer parameters such as internal or external trigger source, falling ...
Read More ...
Abstract:
This paper presents the design and practical implementation of a multi-channel PC based logic analyzer. The analyzer has16 input channels with memory depth of 4K snapshots/channel and capture rate of up to 5 MHz. The analyzer parameters such as internal or external trigger source, falling or rising edge capture clock, state or timing measuring mode, number of pre-trigger and post-trigger snapshots, are made to be programmable and could be changed manually. The analyzer prototype consists of hardware part represented by the development of the interface ISA card and the software part that involves the kernel mode driver and the GUI program development. The developed prototype analyzer has been tested under different configuration schemes using 8085 SDK.
Dr. Akram Fajer Bati; Ali Naser
Volume 6, Issue 1 , April 2006, , Page 43-55
Dr. Yousif I. Al-Mashhadany
Volume 11, Issue 2 , December 2011, , Page 44-55
Abstract
Abstract:
Surface electromyography (SEMG) measurement technique for the signal was produced through the contraction of muscles in a human body. The surface electrode is connected on the skin of the muscle. This paper presents an off-line design for the estimation of the actual joint angle of a human ...
Read More ...
Abstract:
Surface electromyography (SEMG) measurement technique for the signal was produced through the contraction of muscles in a human body. The surface electrode is connected on the skin of the muscle. This paper presents an off-line design for the estimation of the actual joint angle of a human leg obtained in performing flexion-extension of the leg at slow and high speeds movement. The design is composed of two phases. The first is measurement of real EMG signal of human leg performance by using SEMG technique and processing this signal with filtering, amplification and then normalized with maximum amplitude. The second phase is to design an artificial neural network (ANN) and train it to predict the joint angle from the parameters extracted from the SEMG signal. Three main parameters of EMG signal are used in the prediction process: Number of turns in a specific time period, duration of signal repetition and amplitude of signal. The design of ANN includes the identification of a performing human leg EMG signal with two speed levels (slow-fast) and estimation of knee joint angle by recognition process depending on the parameters of real measured EMG signal. The real EMG signal is measured from full leg-extension to full leg-flexion by (3 sec) with slow motion and (1 sec) at fast motion.
Root mean square (RMS) errors were calculated between the actual angle (measured by the trigonometric formula was applied with any human leg gives real EMG signal measurement) and the angle predicted by the neural network design. This design is simulated by using MATLAB Ver. R2010a, and satisfying results are obtained. That explains the ability of estimation of joint angle for human leg, where the RMS errors are obtained from (0.065) to (0.015) at fast speed leg flexion -extension and from (0.018) to (0.0026) at slow speed leg flexion-extension.
Mohammed Z. AL-FAIZ; Sawsan Kamal
Volume 5, Issue 2 , December 2005, , Page 44-51
Aqeel R. Farhan; Dr. Ali Y. Fattah
Volume 14, Issue 1 , April 2014, , Page 44-57
Abstract
Abstract –In this paper, different amplitude and phase modulation formats are investigated and compared to find the optimum one among them for high spectral efficiency (SE) Wavelength Division Multiplexing (WDM) systems with an acceptable value of the Bit Error Rate (BER). Also, the effectiveness of ...
Read More ...
Abstract –In this paper, different amplitude and phase modulation formats are investigated and compared to find the optimum one among them for high spectral efficiency (SE) Wavelength Division Multiplexing (WDM) systems with an acceptable value of the Bit Error Rate (BER). Also, the effectiveness of using the polarization interleaving scheme in minimizing the nonlinear effects in the optical fiber channel for the various modulation formats is investigated. (Optisystem v 7.0) A simulation package is used to simulate the system. The simulation results show the effectiveness of using the polarization interleaving in decreasing the nonlinear effects. RZ modulation formats are found to give a better BER value than the corresponding NRZ formats but with a smaller value of the SE. Among the compared modulation formats, RZ-AMI and the RZ-DQPSK are the only formats that are found to give the optimal performance for high capacity WDM networks.
Dr. Hana; a M. Salman
Volume 10, Issue 1 , December 2010, , Page 46-55
Abstract
Abstract:
Biometrics, is defined as the since of Human recognition based on his/her physical or behavioral traits, is beginning to used as Human added computer method for determining an individual’s identity. The human hand presents the sorce for a numerous of physiological biometric features. Palmprint, ...
Read More ...
Abstract:
Biometrics, is defined as the since of Human recognition based on his/her physical or behavioral traits, is beginning to used as Human added computer method for determining an individual’s identity. The human hand presents the sorce for a numerous of physiological biometric features. Palmprint, hand geometry, finger geometry and the vein pattern on the dorsum of the hand, are mostly used in many fields for different applications. Lines and points are extracted from palms for individual identification in original image or frequency space. In this paper, the normalized energy based spectral eigenpalms is used for human identification. The correlation distance is used as a similarity measure. A threshold value is used to prevent the imposter form being identified. The experimental results point up the effectiveness of the method in varying noisy types.
Wael H. Zayer; Prof. Dr. Majed E. Alneby; Prof. Dr. Walid A. Mahmoud
Volume 11, Issue 1 , June 2011, , Page 46-61
Abstract
Abstract :
The relatively new field of Multiwavelets shows promise in removing some of the limitations of wavelets. This paper introduces a new human face recognition using the combination of Multiwavelet transform (MWT) and multidimension-Two Activation Function Wavelet Network (MD-TAFWN). After taking ...
Read More ...
Abstract :
The relatively new field of Multiwavelets shows promise in removing some of the limitations of wavelets. This paper introduces a new human face recognition using the combination of Multiwavelet transform (MWT) and multidimension-Two Activation Function Wavelet Network (MD-TAFWN). After taking the MWT of the image, it is required to divide the approximate quarter into four parts and rearrange them in 3D form. Next, this 3D data will be fed into a proposed MD-Two Activation Function Wavelet Network. This is for face image. For the fingerprint image,it is required to divide the approximate quarter into four parts and rearrange them in 3D form. Next, this 3D data will be fed into a proposed MD-Two Activation Function Wavelet Network.The proposed transform is considered as a feature extractor of the decomposed reference images with different frequency sub bands, and amid-range frequency sub band for data image to the representation of the given image. Evaluations have generally shown that the technique of the combination for Discrete Multi-wavelet Transform (DMWT) and the Two Activation Function Wavelet Network (MD-TAFWN) is interesting and promising. The results obtained showed that the combination technique outperformed. other conventional methods that use a given transform with neural Network (NN). It results in a perfect recognition of 100% to a data base which consists of 100 human face images.
Jamal Mohammed Rasool; Mahdi Mohammed Mool
Volume 14, Issue 2 , August 2014, , Page 46-52
Abstract
Abstract:- There are many researches which study a design of antenna used in mobile communication. Adaptive arrays are expected to improve the performance of future wireless communication systems. The proposed reception system from mobile Satellite for handsets is an adaptive antenna system with a half ...
Read More ...
Abstract:- There are many researches which study a design of antenna used in mobile communication. Adaptive arrays are expected to improve the performance of future wireless communication systems. The proposed reception system from mobile Satellite for handsets is an adaptive antenna system with a half wave and a loop antenna. The proposed adaptive antenna array is capable of improving the quality of the service of wireless systems through the ability to steer the radiation pattern in the direction of a desired signal source and to receive signals at a constant level despite the variations in the elevation angle and the attitude of the mobile satellite station. Antenna system was tested in the libratory and the result showed a good agreement between the simulation and measurements. By using the field strength meter (FSM) and for different distances from (3-33) cm, antenna system showed good performance in receiving signals from a moving satellite. The received signal is 4.3 dB more in the direction vertical to the antenna system access.
Keywords – Antennas, Antenna array, Half wave dipole, Loop antenna.
Asst. Prof. Dr. Ahmed S. Al-Araji; M. Sc. Khulood E. Dagher
Volume 15, Issue 1 , April 2015, , Page 46-60
Abstract
Abstract – This paper proposes a cognitive neural controller to guide a nonholonomic mobile robot during continuous and non-continuous trajectory tracking and to navigate through static obstacles with collision-free and minimum tracking error. The structure of the controller consists of two layers; ...
Read More ...
Abstract – This paper proposes a cognitive neural controller to guide a nonholonomic mobile robot during continuous and non-continuous trajectory tracking and to navigate through static obstacles with collision-free and minimum tracking error. The structure of the controller consists of two layers; the first layer is a neural network topology that controls the mobile robot actuators in order to track a desired path based on back-stepping technique and posture identifier. The second layer of the controller is cognitive layer that collects information from the environment and plans the optimal path. In addition to this, it detects if there is any obstacle in the path so it can be avoided by re-planning the trajectory using particle swarm optimization (PSO) technique. The stability and convergence of control system are proved by using the Lyapunov criterion. Simulation results and experimental work show the effectiveness of the proposed cognitive neural control algorithm; this is demonstrated by minimizing tracking error and obtaining the smooth torque control signal, especially when the robot navigates through static obstacles with collision-free and the external disturbances applied.
Murtadha S. Al-Sabbagh; Salih Al-Qaraawi
Volume 16, Issue 1 , December 2016, , Page 46-53
Abstract
Abstract –The problems related to oil transportation are considered of the largest burdens that hinder the petroleum industry. Since the transportation of oil is mostly done using oil carrying vehicles or cargos, a system for monitoring those vehicles and tracking their position is needed. In this ...
Read More ...
Abstract –The problems related to oil transportation are considered of the largest burdens that hinder the petroleum industry. Since the transportation of oil is mostly done using oil carrying vehicles or cargos, a system for monitoring those vehicles and tracking their position is needed. In this work a GPS based tracking and monitoring system will be presented. Moreover, the system will be able to store data about different parameters in regard to the cargo, and it will send that data using GSM networks by GPRS technology. In addition to that, this system is designed to be ambient intelligent by the means of interacting with different individuals with mobile phone around it. The system will be supported with a location based security technique to provide its overall operation with more security and reliability.
This system has been simulated using Omnet++ network simulation software to be sure about its efficiency and scalability, which are affected by latency and back-off times.
A.M.S. Rahma; A. A. Hussein
Volume 6, Issue 2 , August 2006, , Page 47-57
Abstract
Abstract:
Adding colors to all pixels in monochrome image are difficulty performed. It
requires considerable user intervention and remains a tedious, time-consuming,
expensive task with no certain results.
The previous methods have not the wanted color-scale and the harmony in colors used.
This ...
Read More ...
Abstract:
Adding colors to all pixels in monochrome image are difficulty performed. It
requires considerable user intervention and remains a tedious, time-consuming,
expensive task with no certain results.
The previous methods have not the wanted color-scale and the harmony in colors used.
This paper presents semi-automatic image colorization, where the user only needs to
annotate the image with a few desirable color scribbles depending on the user’s choice
and the indicated colors are automatically diffused to produce a fully colorized image.
The execution depending on the geometry and structure of the monochrome luminance
input, given by its gradient information, The color is then diffused by solving a partial
differential equation (Anisotropic Diffusion Equation) that annotate a few color
scribbles provided by the user, with firmness in the original gradient information in
image.
The approach suggests an semi- automatic method that minimizes the amount of human
work and the results are of high efficiency from the previous methods.
Sufyan T. Faraj
Volume 6, Issue 3 , December 2006, , Page 47-63
Dr. W.A. Mahmoud; Dr. M. S. Abdul Wahab; H. N. Al-Taai
Volume 4, Issue 1 , December 2004, , Page 47-56
Raid R. Al-Nima
Volume 12, Issue 2 , December 2012, , Page 47-55
Abstract
Abstract: This paper describes the design and development of a prototype system for the automatic authentication of an individual based on the human ear patterns. Information at the feature extraction and at the confidence level, where the matching scores are reported by Probabilistic neural network, ...
Read More ...
Abstract: This paper describes the design and development of a prototype system for the automatic authentication of an individual based on the human ear patterns. Information at the feature extraction and at the confidence level, where the matching scores are reported by Probabilistic neural network, is discussed.
The system was tested with the template files. The test performance reaching False Rejection Rate (FRR) = 9% and False Acceptance Rate
(FAR) = 9%, suggests that the system can be used in telephone security environments.
Turki Y. Abdalla; Ziyad T. Allawi
Volume 15, Issue 2 , August 2015, , Page 47-57
Abstract
Abstract - In this paper, a new optimization method for the Reciprocal Velocity Obstacles (RVO) is proposed. It uses the Artificial Bee Colony Optimization (ABC) for navigation control of multiple mobile robots with kinematic constraints. RVO is used for collision avoidance between the robots, while ...
Read More ...
Abstract - In this paper, a new optimization method for the Reciprocal Velocity Obstacles (RVO) is proposed. It uses the Artificial Bee Colony Optimization (ABC) for navigation control of multiple mobile robots with kinematic constraints. RVO is used for collision avoidance between the robots, while ABC is used to choose the best path for the robot maneuver to avoid colliding with other robots and to get to its goal faster. This method is applied on 24 mobile robots facing each other. Simulation results have shown that this method outperformed the ordinary RVO when the path was arbitrarily chosen.
Assist. Prof. Suhad M. Kadhem; Yasir R. Nasir
Volume 15, Issue 3 , December 2015, , Page 47-63
Abstract
Abstract –The Example Based Machine Translation (EBMT) system retrieves
similar examples (pairs of source phrases, sentences, or texts and their translations) from
a database of examples, adapting the examples to translate new input. The Example Base
(EB) is an important component in an EBMT system. ...
Read More ...
Abstract –The Example Based Machine Translation (EBMT) system retrieves
similar examples (pairs of source phrases, sentences, or texts and their translations) from
a database of examples, adapting the examples to translate new input. The Example Base
(EB) is an important component in an EBMT system. It handles the storage to support the
translation process. Thus, an efficient EB must be capable of handling a massive volume
of examples at an adequately high speed.
In this research, a new approach to reduce the redundancy problem that some EBMT
systems suffer from is suggested by designing EB using B+ tree. The EB is used to store
the examples of a particular field in a manner that reduces the redundancy of these
examples (or even sub examples) in order to provide efficient memory usage and to
minimize the search time. The lexicon of the proposed method is represented by using
two databases. One database is used for storing the English words and another database is
used for storing the English transfer grammars.
Dr. Emad H. Al-Hemiary; Hayder R. Hamandi
Volume 13, Issue 1 , April 2013, , Page 49-54
Abstract
Abstract – As mobile computing is more and more widespread, mobility support for Internet devices becomes very important. Mobile IPv6 (MIPv6) is a promising technology that handles the mobility management and provides the seamless mobile communications. It is expected that MIPv6, as a standard for ...
Read More ...
Abstract – As mobile computing is more and more widespread, mobility support for Internet devices becomes very important. Mobile IPv6 (MIPv6) is a promising technology that handles the mobility management and provides the seamless mobile communications. It is expected that MIPv6, as a standard for mobile communication, will open the Mobile Internet Age. In this paper, we will discuss the basic principles of MIPv6 operation by means of handoff process and tunneling mechanism. We will also show how to simulate a proposed MIPv6 network scenario. This work is based on a specific simulator named OMNeT++ which includes simulation packages. Our simulation results include the throughput of each router in the proposed MIPv6 network; it also includes the handoff latency for each mobile node in the proposed MIPv6 network
Sara M. Motar; Ali O. Abid Noor
Volume 17, Issue 1 , December 2017, , Page 49-58
Abstract
This paper focuses on how to improve the performance of Acoustic Echo Cancellation AEC in voice communication systems. A variable step-size, dynamic affine projection algorithm named as DSVSSAPA is devised for this purpose. The proposed version combines the merits of the variable step size APA as well ...
Read More ...
This paper focuses on how to improve the performance of Acoustic Echo Cancellation AEC in voice communication systems. A variable step-size, dynamic affine projection algorithm named as DSVSSAPA is devised for this purpose. The proposed version combines the merits of the variable step size APA as well as uses dynamic selection of the input vectors to reduce its computational power, which has not been found in literature elsewhere. The version proposed in this paper overcomes drawbacks incorporated with the standard AP algorithm. These drawbacks are convergence speed-misalignment trade off problem and the high computational complexity of the algorithm. The proposed algorithm reduces the computational complexity by carrying the update after satisfying a specific criterion. Performance of the proposed echo canceller is evaluated and compared with those obtained from the same echo canceller but based on conventional algorithms such as the normalized least mean square algorithm NLMS and the original affine projection algorithm APA. The performance is measured in terms of misalignment and echo return loss enhancement ERLE. Simulation results showed superior ERL performance of the DSVSSAPA compared to other algorithms. It also achieves 17.73% reduction in computational complexity compared with conventional APA which is useful in portable communication applications.
Israa Hazem Ali
Volume 18, Issue 1 , April 2018, , Page 49-55
Abstract
The main aim with any modern digital communication systems is to provide error free data transmission. To achieve this aim, error control coding techniques are applied with these systems. In this paper, digital communication system was implemented based on convolutional code, aided by soft-bit decoding ...
Read More ...
The main aim with any modern digital communication systems is to provide error free data transmission. To achieve this aim, error control coding techniques are applied with these systems. In this paper, digital communication system was implemented based on convolutional code, aided by soft-bit decoding for error free transmission. Fixed length source encoder was represented with this work, and statistically described the output of the source encoder and save this description at the receiver as a priori knowledge about the source encode. These a priori knowledge were exploited at the receiver to improve the performance of the proposed system in term of BER by conceal the errors occurred through the transmission of information over AWGN channel, aided the convolutional encoder. Significant improvements were obtained with this proposed system.