首页 > 最新文献

Iraqi Journal for Electrical and Electronic Engineering最新文献

英文 中文
Analysis of Permanent Magnet Material Influence on Eddy Current Braking Efficiency 永磁材料对涡流制动效率的影响分析
Pub Date : 2024-07-27 DOI: 10.37917/ijeee.20.2.18
Ahmed M. Salman, Jamal A.-K. Mohammed, Farag M. Mohammed
Traditional friction brakes can generate problems such as high braking temperature and pressure, cracking, and wear, leading to braking failure and user damage. Eddy current brake systems (contactless magnetic brakes) are one method used in motion applications. They are wear-free, less temperature-sensitive, quick, easy, and less susceptible to wheel lock, resulting in less brake failure due to the absence of physical contact between the magnet and disc. Important factors that can affect the performance of the braking system are the type of materials manufactured for the permanent magnets. This paper examines the performance of the permanent magnetic eddy current braking (PMECB) system. Different kinds of permanent magnets are proposed in this system to create eddy currents, which provide braking for the braking system is simulated using FEA software to demonstrate the efficiency of braking in terms of force production, energy dissipation, and overall performance findings demonstrated that permanent magnets consisting of neodymium, iron, and boron consistently provided the maximum braking effectiveness. The lowest efficiency is found in ferrite, which has the second-lowest efficiency behind samarium cobalt. This is because ferrite has a weaker magnetic field. Because of this, the PMECBS based on NdFeB magnets has higher power dissipation values, particularly at higher speeds.
传统的摩擦制动器会产生制动温度和压力过高、开裂和磨损等问题,导致制动失灵和用户损坏。电涡流制动系统(非接触式磁性制动器)是运动应用中的一种方法。由于磁铁和制动盘之间没有物理接触,因此无磨损、对温度不敏感、快速、简便、不易发生车轮抱死,从而减少了制动故障。影响制动系统性能的重要因素是为永磁体制造的材料类型。本文研究了永磁涡流制动(PMECB)系统的性能。使用有限元分析软件模拟了制动系统中不同种类的永磁体产生的涡流,以证明制动系统在制动力、能量消耗和整体性能方面的效率。铁氧体的效率最低,仅次于钐钴。这是因为铁氧体的磁场较弱。因此,基于钕铁硼磁体的 PMECBS 具有更高的功率耗散值,尤其是在高速运转时。
{"title":"Analysis of Permanent Magnet Material Influence on Eddy Current Braking Efficiency","authors":"Ahmed M. Salman, Jamal A.-K. Mohammed, Farag M. Mohammed","doi":"10.37917/ijeee.20.2.18","DOIUrl":"https://doi.org/10.37917/ijeee.20.2.18","url":null,"abstract":"Traditional friction brakes can generate problems such as high braking temperature and pressure, cracking, and wear, leading to braking failure and user damage. Eddy current brake systems (contactless magnetic brakes) are one method used in motion applications. They are wear-free, less temperature-sensitive, quick, easy, and less susceptible to wheel lock, resulting in less brake failure due to the absence of physical contact between the magnet and disc. Important factors that can affect the performance of the braking system are the type of materials manufactured for the permanent magnets. This paper examines the performance of the permanent magnetic eddy current braking (PMECB) system. Different kinds of permanent magnets are proposed in this system to create eddy currents, which provide braking for the braking system is simulated using FEA software to demonstrate the efficiency of braking in terms of force production, energy dissipation, and overall performance findings demonstrated that permanent magnets consisting of neodymium, iron, and boron consistently provided the maximum braking effectiveness. The lowest efficiency is found in ferrite, which has the second-lowest efficiency behind samarium cobalt. This is because ferrite has a weaker magnetic field. Because of this, the PMECBS based on NdFeB magnets has higher power dissipation values, particularly at higher speeds.","PeriodicalId":159746,"journal":{"name":"Iraqi Journal for Electrical and Electronic Engineering","volume":"2 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141797313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative Long-Term Electricity Forecasting Analysis: A Case Study of Load Dispatch Centres in India 长期电力预测比较分析:印度负荷调度中心案例研究
Pub Date : 2024-07-27 DOI: 10.37917/ijeee.20.2.17
Saikat Gochhait, Deepak K. Sharma, Mrinal Bachute
Accurate long-term load forecasting (LTLF) is crucial for smart grid operations, but existing CNN-based methods face challenges in extracting essential features from electricity load data, resulting in diminished forecasting performance. To overcome this limitation, we propose a novel ensemble model that integrates a feature extraction module, densely connected residual block (DCRB), long short-term memory layer (LSTM), and ensemble thinking. The feature extraction module captures the randomness and trends in climate data, enhancing the accuracy of load data analysis. Leveraging the DCRB, our model demonstrates superior performance by extracting features from multi-scale input data, surpassing conventional CNN-based models. We evaluate our model using hourly load data from Odisha and day-wise data from Delhi, and the experimental results exhibit low root mean square error (RMSE) values of 0.952 and 0.864 for Odisha and Delhi, respectively. This research contributes to a comparative long-term electricity forecasting analysis, showcasing the efficiency of our proposed model in power system management. Moreover, the model holds the potential to sup-port decision making processes, making it a valuable tool for stakeholders in the electricity sector.
准确的长期负荷预测(LTLF)对智能电网运行至关重要,但现有的基于 CNN 的方法在从电力负荷数据中提取基本特征方面面临挑战,导致预测性能下降。为了克服这一局限,我们提出了一种新型集合模型,该模型集成了特征提取模块、密集连接残差块(DCRB)、长短期记忆层(LSTM)和集合思维。特征提取模块可捕捉气候数据中的随机性和趋势,从而提高负载数据分析的准确性。利用 DCRB,我们的模型从多尺度输入数据中提取特征,表现出优越的性能,超过了传统的基于 CNN 的模型。我们使用奥迪沙的每小时负荷数据和德里的逐日数据对我们的模型进行了评估,实验结果显示,奥迪沙和德里的均方根误差 (RMSE) 值分别为 0.952 和 0.864。这项研究有助于比较长期电力预测分析,展示了我们提出的模型在电力系统管理中的效率。此外,该模型还具有支持决策过程的潜力,是电力行业利益相关者的宝贵工具。
{"title":"Comparative Long-Term Electricity Forecasting Analysis: A Case Study of Load Dispatch Centres in India","authors":"Saikat Gochhait, Deepak K. Sharma, Mrinal Bachute","doi":"10.37917/ijeee.20.2.17","DOIUrl":"https://doi.org/10.37917/ijeee.20.2.17","url":null,"abstract":"Accurate long-term load forecasting (LTLF) is crucial for smart grid operations, but existing CNN-based methods face challenges in extracting essential features from electricity load data, resulting in diminished forecasting performance. To overcome this limitation, we propose a novel ensemble model that integrates a feature extraction module, densely connected residual block (DCRB), long short-term memory layer (LSTM), and ensemble thinking. The feature extraction module captures the randomness and trends in climate data, enhancing the accuracy of load data analysis. Leveraging the DCRB, our model demonstrates superior performance by extracting features from multi-scale input data, surpassing conventional CNN-based models. We evaluate our model using hourly load data from Odisha and day-wise data from Delhi, and the experimental results exhibit low root mean square error (RMSE) values of 0.952 and 0.864 for Odisha and Delhi, respectively. This research contributes to a comparative long-term electricity forecasting analysis, showcasing the efficiency of our proposed model in power system management. Moreover, the model holds the potential to sup-port decision making processes, making it a valuable tool for stakeholders in the electricity sector.","PeriodicalId":159746,"journal":{"name":"Iraqi Journal for Electrical and Electronic Engineering","volume":"70 19","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141798582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Algorithm Based on Pitting Corrosion for Engineering Design Optimization Problems 基于点蚀的工程设计优化问题新算法
Pub Date : 2024-07-27 DOI: 10.37917/ijeee.20.2.16
Hussien A. Al-mtory, Falih M. Alnahwi, Ramzy S. Ali
This paper presents a new optimization algorithm called corrosion diffusion optimization algorithm (CDOA). The proposed algorithm is based on the diffusion behavior of the pitting corrosion on the metal surface. CDOA utilizes the oxidation and reduction electrochemical reductions as well as the mathematical model of Gibbs free energy in its searching for the optimal solution of a certain problem. Unlike other algorithms, CDOA has the advantage of dispensing any parameter that need to be set for improving the convergence toward the optimal solution. The superiority of the proposed algorithm over the others is highlighted by applying them on some unimodal and multimodal benchmark functions. The results show that CDOA has better performance than the other algorithms in solving the unimodal equations regardless the dimension of the variable. On the other hand, CDOA provides the best multimodal optimization solution for dimensions less than or equal to (5, 10, 15, up to 20) but it fails in solving this type of equations for variable dimensions larger than 20. Moreover, the algorithm is also applied on two engineering application problems, namely the PID controller and the cantilever beam to accentuate its high performance in solving the engineering problems. The proposed algorithm results in minimized values for the settling time, rise time, and overshoot for the PID controller. Where the rise time, settling time, and maximum overshoot are reduced in the second order system to 0.0099, 0.0175 and 0.005 sec., in the fourth order system to 0.0129, 0.0129 and 0 sec, in the fifth order system to 0.2339, 0.7756 and 0, in the fourth system which contains time delays to 1.5683, 2.7102 and 1.80 E-4 sec., and in the simple mass-damper system to 0.403, 0.628 and 0 sec., respectively.In addition, it provides the best fitness function for the cantilever beam problem compared with some other well-known algorithms.
本文提出了一种新的优化算法,称为腐蚀扩散优化算法(CDOA)。该算法基于点状腐蚀在金属表面的扩散行为。CDOA 利用氧化和还原电化学还原以及吉布斯自由能数学模型来寻找某个问题的最优解。与其他算法不同的是,CDOA 的优势在于无需设置任何参数来提高最优解的收敛性。通过对一些单模态和多模态基准函数的应用,凸显了所提算法相对于其他算法的优越性。结果表明,在求解单模态方程时,无论变量的维度如何,CDOA 的性能都优于其他算法。另一方面,对于维数小于或等于(5、10、15,最多 20)的变量,CDOA 提供了最佳的多模态优化解决方案,但对于维数大于 20 的变量,CDOA 在求解这类方程时却失效了。此外,该算法还应用于两个工程应用问题,即 PID 控制器和悬臂梁,以突出其在解决工程问题方面的高性能。所提出的算法使 PID 控制器的稳定时间、上升时间和过冲值最小。在二阶系统中,上升时间、稳定时间和最大过冲分别减小到 0.0099、0.0175 和 0.005 秒;在四阶系统中,上升时间、稳定时间和最大过冲分别减小到 0.0129、0.0129 和 0 秒;在五阶系统中,上升时间、稳定时间和最大过冲分别减小到 0.2339、0.7756 和 0 秒;在包含时间延迟的四阶系统中,上升时间、稳定时间和最大过冲分别减小到 1.5683、2.7102 和 1.80 E-4 秒、此外,与其他一些著名算法相比,该算法为悬臂梁问题提供了最佳拟合函数。
{"title":"A New Algorithm Based on Pitting Corrosion for Engineering Design Optimization Problems","authors":"Hussien A. Al-mtory, Falih M. Alnahwi, Ramzy S. Ali","doi":"10.37917/ijeee.20.2.16","DOIUrl":"https://doi.org/10.37917/ijeee.20.2.16","url":null,"abstract":"This paper presents a new optimization algorithm called corrosion diffusion optimization algorithm (CDOA). The proposed algorithm is based on the diffusion behavior of the pitting corrosion on the metal surface. CDOA utilizes the oxidation and reduction electrochemical reductions as well as the mathematical model of Gibbs free energy in its searching for the optimal solution of a certain problem. Unlike other algorithms, CDOA has the advantage of dispensing any parameter that need to be set for improving the convergence toward the optimal solution. The superiority of the proposed algorithm over the others is highlighted by applying them on some unimodal and multimodal benchmark functions. The results show that CDOA has better performance than the other algorithms in solving the unimodal equations regardless the dimension of the variable. On the other hand, CDOA provides the best multimodal optimization solution for dimensions less than or equal to (5, 10, 15, up to 20) but it fails in solving this type of equations for variable dimensions larger than 20. Moreover, the algorithm is also applied on two engineering application problems, namely the PID controller and the cantilever beam to accentuate its high performance in solving the engineering problems. The proposed algorithm results in minimized values for the settling time, rise time, and overshoot for the PID controller. Where the rise time, settling time, and maximum overshoot are reduced in the second order system to 0.0099, 0.0175 and 0.005 sec., in the fourth order system to 0.0129, 0.0129 and 0 sec, in the fifth order system to 0.2339, 0.7756 and 0, in the fourth system which contains time delays to 1.5683, 2.7102 and 1.80 E-4 sec., and in the simple mass-damper system to 0.403, 0.628 and 0 sec., respectively.\u0000In addition, it provides the best fitness function for the cantilever beam problem compared with some other well-known algorithms.","PeriodicalId":159746,"journal":{"name":"Iraqi Journal for Electrical and Electronic Engineering","volume":"3 8","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141797548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design Efficient Vedic-Multiplier for Floating-Point MAC Module 为浮点 MAC 模块设计高效的吠陀乘法器
Pub Date : 2024-07-14 DOI: 10.37917/ijeee.20.2.15
Fatima Tariq Hussein, Fatemah K. AL-Assfor
Multiplication-accumulation (MAC) operation plays a crucial role in digital signal processing (DSP) applications, such as image convolution and filters, especially when performed on floating-point numbers to achieve high-level of accuracy. The performance of MAC module highly relies upon the performance of the multiplier utilized. This work offers a distinctive and efficient floating-point Vedic multiplier (VM) called adjusted-VM (AVM) to be utilized in MAC module to meet modern DSP demands. The proposed AVM is based on Urdhva-Tiryakbhyam-Sutra (UT-Sutra) approach and utilizes an enhanced design for the Brent-Kung carry-select adder (EBK-CSLA) to generate the final product. A (6*6)-bit AVM is designed first, then, it is extended to design (12*12)-bit AVM which in turns, utilized to design (24*24)-bit AVM. Moreover, the pipelining concept is used to optimize the speed of the offered (24*24)-bit AVM design. The proposed (24*24)-bit AVM can be used to achieve efficient multiplication for mantissa part in binary single-precision (BSP) floating-point MAC module. The proposed AVM architectures are modeled in VHDL, simulated, and synthesized by Xilinx-ISE14.7 tool using several FPGA families. The implementation results demonstrated a noticeable reduction in delay and area occupation by 33.16% and 42.42%, respectively compared with the most recent existing unpipelined design, and a reduction in delay of 44.78% compared with the existing pipelined design.
乘法累加(MAC)运算在图像卷积和滤波器等数字信号处理(DSP)应用中发挥着至关重要的作用,尤其是在对浮点数进行运算以实现高精度时。MAC 模块的性能高度依赖于所使用乘法器的性能。本研究提出了一种独特而高效的浮点吠陀乘法器(VM),称为调整后 VM(AVM),可用于 MAC 模块,以满足现代 DSP 的需求。所提出的 AVM 基于 Urdhva-Tiryakbhyam-Sutra (UT-Sutra)方法,并利用 Brent-Kung 带选加法器(EBK-CSLA)的增强设计来生成最终产品。首先设计一个 (6*6)-bit AVM,然后将其扩展到设计 (12*12)-bit AVM,最后再用于设计 (24*24)-bit AVM。此外,流水线概念被用来优化所提供的 (24*24)- 位 AVM 设计的速度。所提出的 (24*24)-bit AVM 可用于实现二进制单精度(BSP)浮点 MAC 模块中尾数部分的高效乘法。建议的 AVM 架构采用 VHDL 建模、仿真,并通过 Xilinx-ISE14.7 工具使用多个 FPGA 系列进行综合。实现结果表明,与现有的最新非流水线设计相比,延迟和面积占用分别明显减少了 33.16% 和 42.42%,与现有的流水线设计相比,延迟减少了 44.78%。
{"title":"Design Efficient Vedic-Multiplier for Floating-Point MAC Module","authors":"Fatima Tariq Hussein, Fatemah K. AL-Assfor","doi":"10.37917/ijeee.20.2.15","DOIUrl":"https://doi.org/10.37917/ijeee.20.2.15","url":null,"abstract":"Multiplication-accumulation (MAC) operation plays a crucial role in digital signal processing (DSP) applications, such as image convolution and filters, especially when performed on floating-point numbers to achieve high-level of accuracy. The performance of MAC module highly relies upon the performance of the multiplier utilized. This work offers a distinctive and efficient floating-point Vedic multiplier (VM) called adjusted-VM (AVM) to be utilized in MAC module to meet modern DSP demands. The proposed AVM is based on Urdhva-Tiryakbhyam-Sutra (UT-Sutra) approach and utilizes an enhanced design for the Brent-Kung carry-select adder (EBK-CSLA) to generate the final product. A (6*6)-bit AVM is designed first, then, it is extended to design (12*12)-bit AVM which in turns, utilized to design (24*24)-bit AVM. Moreover, the pipelining concept is used to optimize the speed of the offered (24*24)-bit AVM design. The proposed (24*24)-bit AVM can be used to achieve efficient multiplication for mantissa part in binary single-precision (BSP) floating-point MAC module. The proposed AVM architectures are modeled in VHDL, simulated, and synthesized by Xilinx-ISE14.7 tool using several FPGA families. The implementation results demonstrated a noticeable reduction in delay and area occupation by 33.16% and 42.42%, respectively compared with the most recent existing unpipelined design, and a reduction in delay of 44.78% compared with the existing pipelined design.","PeriodicalId":159746,"journal":{"name":"Iraqi Journal for Electrical and Electronic Engineering","volume":"27 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141650491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Advancements and Challenges in Hand Gesture Recognition: A Comprehensive Review 手势识别的进步与挑战:全面回顾
Pub Date : 2024-07-03 DOI: 10.37917/ijeee.20.2.13
Bothina Kareem Murad, Abbas H. Hassin Alasadi
Hand gesture recognition is a quickly developing field with many uses in human-computer interaction, sign language recognition, virtual reality, gaming, and robotics. This paper reviews different ways to model hands, such as vision-based, sensor-based, and data glove-based techniques. It emphasizes the importance of accurate hand modeling and feature extraction for capturing and analyzing gestures. Key features like motion, depth, color, shape, and pixel values and their relevance in gesture recognition are discussed. Challenges faced in hand gesture recognition include lighting variations, complex backgrounds, noise, and real-time performance. Machine learning algorithms are used to classify and recognize gestures based on extracted features. The paper emphasizes the need for further research and advancements to improve hand gesture recognition systems' robustness, accuracy, and usability. This review offers valuable insights into the current state of hand gesture recognition, its applications, and its potential to revolutionize human-computer interaction and enable natural and intuitive interactions between humans and machines. In simpler terms, hand gesture recognition is a way for computers to understand what people are saying with their hands. It has many potential applications, such as allowing people to control computers without touching them or helping people with disabilities communicate. The paper reviews different ways to develop hand gesture recognition systems and discusses the challenges and opportunities in this area.
手势识别是一个快速发展的领域,在人机交互、手语识别、虚拟现实、游戏和机器人等领域有很多应用。本文回顾了手部建模的不同方法,如基于视觉、基于传感器和基于数据手套的技术。它强调了准确的手部建模和特征提取对于捕捉和分析手势的重要性。文章讨论了运动、深度、颜色、形状和像素值等关键特征及其在手势识别中的相关性。手势识别面临的挑战包括光照变化、复杂背景、噪声和实时性。根据提取的特征,使用机器学习算法对手势进行分类和识别。论文强调了进一步研究和进步的必要性,以提高手势识别系统的鲁棒性、准确性和可用性。这篇综述对手势识别的现状、应用及其彻底改变人机交互和实现人机之间自然直观交互的潜力提供了宝贵的见解。简单地说,手势识别是一种让计算机理解人们用手在说什么的方法。它有许多潜在的应用领域,例如让人们无需触摸电脑就能控制电脑,或帮助残疾人进行交流。本文回顾了开发手势识别系统的不同方法,并讨论了这一领域的挑战和机遇。
{"title":"Advancements and Challenges in Hand Gesture Recognition: A Comprehensive Review","authors":"Bothina Kareem Murad, Abbas H. Hassin Alasadi","doi":"10.37917/ijeee.20.2.13","DOIUrl":"https://doi.org/10.37917/ijeee.20.2.13","url":null,"abstract":"Hand gesture recognition is a quickly developing field with many uses in human-computer interaction, sign language recognition, virtual reality, gaming, and robotics. This paper reviews different ways to model hands, such as vision-based, sensor-based, and data glove-based techniques. It emphasizes the importance of accurate hand modeling and feature extraction for capturing and analyzing gestures. Key features like motion, depth, color, shape, and pixel values and their relevance in gesture recognition are discussed. Challenges faced in hand gesture recognition include lighting variations, complex backgrounds, noise, and real-time performance. Machine learning algorithms are used to classify and recognize gestures based on extracted features. The paper emphasizes the need for further research and advancements to improve hand gesture recognition systems' robustness, accuracy, and usability. This review offers valuable insights into the current state of hand gesture recognition, its applications, and its potential to revolutionize human-computer interaction and enable natural and intuitive interactions between humans and machines. In simpler terms, hand gesture recognition is a way for computers to understand what people are saying with their hands. It has many potential applications, such as allowing people to control computers without touching them or helping people with disabilities communicate. The paper reviews different ways to develop hand gesture recognition systems and discusses the challenges and opportunities in this area.","PeriodicalId":159746,"journal":{"name":"Iraqi Journal for Electrical and Electronic Engineering","volume":"200 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141681411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of High-Secure Digital/Optical Double Color Image Encryption Assisted by 9D Chaos and DnCNN 由 9D 混沌和 DnCNN 辅助的高安全性数字/光学双色图像加密设计
Pub Date : 2024-07-03 DOI: 10.37917/ijeee.20.2.14
Rusul Abdulridha Muttashar, Raad Sami Fyath
With the rapid development of multimedia technology, securing the transfer of images becomes an urgent matter. Therefore, designing a high-speed/secure system for color images is a real challenge. A nine-dimensional (9D) chaotic-based digital/optical encryption schem is proposed for double-color images in this paper. The scheme consists of cascaded digital and optical encryption parts. The nine chaotic sequences are grouped into three sets, where each set is responsible for encryption one of the RGB channels independently. One of them controls the fusion, XOR operation, and scrambling-based digital part. The other two sets are used for controlling the optical part by constructing two independent chaotic phase masks in the optical Fourier transforms domain. A denoising convolution neural network (DnCNN) is designed to enhance the robustness of the decrypted images against the Gaussian noise. The simulation results prove the robustness of the proposed scheme as the entropy factor reaches an average of 7.997 for the encrypted color lena-baboon images with an infinite peak signal-to-noise ratio (PSNR) for the decrypted images. The designed DnCNN operates efficiently with the proposed encryption scheme as it enhances the performance against the Gaussian noise, where the PSNR of the decrypted Lena image is enhanced from 27.01 dB to 32.56 dB after applying the DnCNN.
随着多媒体技术的迅猛发展,确保图像传输安全已成为当务之急。因此,为彩色图像设计一个高速/安全的系统是一个真正的挑战。本文针对双色图像提出了一种基于九维(9D)混沌的数字/光学加密方案。该方案由级联数字和光学加密部分组成。九个混沌序列被分为三组,每组独立负责一个 RGB 通道的加密。其中一组控制融合、XOR 运算和基于扰码的数字部分。另外两组用于控制光学部分,在光学傅里叶变换域中构建两个独立的混沌相位掩码。设计了一个去噪卷积神经网络(DnCNN),以增强解密图像对高斯噪声的鲁棒性。仿真结果证明了所提方案的鲁棒性,加密的彩色莱纳-狒狒图像的熵因子平均达到 7.997,而解密图像的峰值信噪比(PSNR)为无限。所设计的 DnCNN 与所提出的加密方案配合使用,可有效提高抗高斯噪声的性能,应用 DnCNN 后,解密后的莱纳图像的 PSNR 从 27.01 dB 提高到 32.56 dB。
{"title":"Design of High-Secure Digital/Optical Double Color Image Encryption Assisted by 9D Chaos and DnCNN","authors":"Rusul Abdulridha Muttashar, Raad Sami Fyath","doi":"10.37917/ijeee.20.2.14","DOIUrl":"https://doi.org/10.37917/ijeee.20.2.14","url":null,"abstract":"With the rapid development of multimedia technology, securing the transfer of images becomes an urgent matter. Therefore, designing a high-speed/secure system for color images is a real challenge. A nine-dimensional (9D) chaotic-based digital/optical encryption schem is proposed for double-color images in this paper. The scheme consists of cascaded digital and optical encryption parts. The nine chaotic sequences are grouped into three sets, where each set is responsible for encryption one of the RGB channels independently. One of them controls the fusion, XOR operation, and scrambling-based digital part. The other two sets are used for controlling the optical part by constructing two independent chaotic phase masks in the optical Fourier transforms domain. A denoising convolution neural network (DnCNN) is designed to enhance the robustness of the decrypted images against the Gaussian noise. The simulation results prove the robustness of the proposed scheme as the entropy factor reaches an average of 7.997 for the encrypted color lena-baboon images with an infinite peak signal-to-noise ratio (PSNR) for the decrypted images. The designed DnCNN operates efficiently with the proposed encryption scheme as it enhances the performance against the Gaussian noise, where the PSNR of the decrypted Lena image is enhanced from 27.01 dB to 32.56 dB after applying the DnCNN.","PeriodicalId":159746,"journal":{"name":"Iraqi Journal for Electrical and Electronic Engineering","volume":"136 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141682547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study of Chaotic-based Audio Encryption Algorithms: A Review 基于混沌的音频加密算法研究:综述
Pub Date : 2024-06-11 DOI: 10.37917/ijeee.20.2.8
Alaa Shumran, Abdul-Basset A. Al-Hussein
Nowadays, multimedia communication has become very widespread and this requires it to be protected from attackers and transmitted securely for reliability. Encryption and decryption techniques are useful in providing effective security for speech signals to ensure that these signals are transmitted with secure data and prevent third parties or the public from reading private messages. Due to the rapid improvement in digital communications over the recent period up to the present, the security of voice data transmitted over various networks has been classified as a favored field of study in earlier years. The contributions to audio encryption are discussed in this review. This Comprehensive review mainly focuses on presenting several kinds of methods for audio encryption and decryption the analysis of these methods with their advantages and disadvantages have been investigated thoroughly. It will be classified into encryption based on traditional methods and encryption based on advanced chaotic systems. They are divided into two types, continuous-time system, and discrete-time system, and also classified based on the synchronization method and the implementation method. In the fields of information and communications security, system designers face many challenges in both cost, performance, and architecture design, Field Programmable gate arrays (FPGAs) provide an excellent balance between computational power and processing flexibility. In addition, encryption methods will be classified based on Chaos-based Pseudo Random Bit Generator, Fractional-order systems, and hybrid chaotic generator systems, which is an advantageous point for this review compared with previous ones. Audio algorithms are presented, discussed, and compared, highlighting important advantages and disadvantages. Audio signals have a large volume and a strong correlation between data samples. Therefore, if traditional cryptography systems are used to encrypt such huge data, they gain significant overhead. Standard symmetric encryption systems also have a small key-space, which makes them vulnerable to attacks. On the other hand, encryption by asymmetric algorithms is not ideal due to low processing speed and complexity. Therefore, great importance has been given to using chaotic theory to encode audio files. Therefore, when proposing an appropriate encryption method to ensure a high degree of security, the key space, which is the critical part of every encryption system, and the key sensitivity must be taken into account. The key sensitivity is related to the initial values and control variables of the chaotic system chosen as the audio encryption algorithm. In addition, the proposed algorithm should eliminate the problems of periodic windows, such as limited chaotic range and non-uniform distribution, and the quality of the recovered audio signal remains good, which confirms the convenience, reliability, and high security.
如今,多媒体通信已变得非常普遍,这就需要保护其不受攻击,并以安全可靠的方式进行传输。加密和解密技术可为语音信号提供有效的安全保护,确保这些信号传输的数据安全,防止第三方或公众读取私人信息。由于近年来数字通信技术的飞速发展,通过各种网络传输的语音数据的安全性在早些年已被列为热门研究领域。本综述讨论了对音频加密的贡献。本综述主要侧重于介绍几种音频加密和解密方法,并对这些方法的优缺点进行了深入分析。它将分为基于传统方法的加密和基于先进混沌系统的加密。它们分为连续时间系统和离散时间系统两种类型,还根据同步方法和实现方法进行了分类。在信息和通信安全领域,系统设计人员在成本、性能和结构设计方面都面临许多挑战,而现场可编程门阵列(FPGA)在计算能力和处理灵活性之间提供了极佳的平衡。此外,加密方法将根据基于混沌的伪随机比特发生器、分数阶系统和混合混沌发生器系统进行分类,这也是本综述与以往综述相比的优势所在。对音频算法进行了介绍、讨论和比较,突出了重要的优缺点。音频信号音量大,数据样本之间相关性强。因此,如果使用传统加密系统对如此庞大的数据进行加密,会产生巨大的开销。标准对称加密系统的密钥空间也很小,容易受到攻击。另一方面,由于处理速度低、复杂度高,使用非对称算法加密并不理想。因此,利用混沌理论对音频文件进行编码受到了高度重视。因此,在提出合适的加密方法以确保高度安全性时,必须考虑密钥空间(每个加密系统的关键部分)和密钥灵敏度。密钥敏感度与作为音频加密算法的混沌系统的初始值和控制变量有关。此外,所提出的算法应能消除周期性窗口的问题,如混沌范围有限、分布不均匀等,而且恢复的音频信号质量仍然很好,这证实了该算法的方便性、可靠性和高安全性。
{"title":"Study of Chaotic-based Audio Encryption Algorithms: A Review","authors":"Alaa Shumran, Abdul-Basset A. Al-Hussein","doi":"10.37917/ijeee.20.2.8","DOIUrl":"https://doi.org/10.37917/ijeee.20.2.8","url":null,"abstract":"Nowadays, multimedia communication has become very widespread and this requires it to be protected from attackers and transmitted securely for reliability. Encryption and decryption techniques are useful in providing effective security for speech signals to ensure that these signals are transmitted with secure data and prevent third parties or the public from reading private messages. Due to the rapid improvement in digital communications over the recent period up to the present, the security of voice data transmitted over various networks has been classified as a favored field of study in earlier years. The contributions to audio encryption are discussed in this review. This Comprehensive review mainly focuses on presenting several kinds of methods for audio encryption and decryption the analysis of these methods with their advantages and disadvantages have been investigated thoroughly. It will be classified into encryption based on traditional methods and encryption based on advanced chaotic systems. They are divided into two types, continuous-time system, and discrete-time system, and also classified based on the synchronization method and the implementation method. In the fields of information and communications security, system designers face many challenges in both cost, performance, and architecture design, Field Programmable gate arrays (FPGAs) provide an excellent balance between computational power and processing flexibility. In addition, encryption methods will be classified based on Chaos-based Pseudo Random Bit Generator, Fractional-order systems, and hybrid chaotic generator systems, which is an advantageous point for this review compared with previous ones. Audio algorithms are presented, discussed, and compared, highlighting important advantages and disadvantages. Audio signals have a large volume and a strong correlation between data samples. Therefore, if traditional cryptography systems are used to encrypt such huge data, they gain significant overhead. Standard symmetric encryption systems also have a small key-space, which makes them vulnerable to attacks. On the other hand, encryption by asymmetric algorithms is not ideal due to low processing speed and complexity. Therefore, great importance has been given to using chaotic theory to encode audio files. Therefore, when proposing an appropriate encryption method to ensure a high degree of security, the key space, which is the critical part of every encryption system, and the key sensitivity must be taken into account. The key sensitivity is related to the initial values and control variables of the chaotic system chosen as the audio encryption algorithm. In addition, the proposed algorithm should eliminate the problems of periodic windows, such as limited chaotic range and non-uniform distribution, and the quality of the recovered audio signal remains good, which confirms the convenience, reliability, and high security.","PeriodicalId":159746,"journal":{"name":"Iraqi Journal for Electrical and Electronic Engineering","volume":"30 7","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141358830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design a Power System of 1760W Based on a Twin Inverter and a Fuzzy Logic Controller 基于双逆变器和模糊逻辑控制器设计 1760W 电力系统
Pub Date : 2024-06-09 DOI: 10.37917/ijeee.20.2.6
Samhar Saeed Shukir
The increasing demand for electricity due to population expansion has led to frequent interruptions in electrical power, so there are backup power lines everywhere, especially in the sectors of education, health, banking, transportation and communications. DC sources are beginning to become widely spread in terms of low maintenance requirements, no need for refueling, and no pollutant emission in these institutions. The problems of DC systems are; losses in DC system components, and change in output voltage as loads change. This research presents a power system that generates 1760W AC power from batteries bank, the system consists of a twin inverter to reduce losses in switches and filters, and thus improving the efficiency and the power factor of the system, and fuzzy logic controllers to regulate the output voltage of the converter and inverter. Modeling and simulation in MATLAB / Simulink showed obtaining a constant load voltage with acceptable values of total harmonics distortion (THD) under different conditions of loads and batteries.
由于人口膨胀,电力需求不断增加,导致电力供应经常中断,因此到处都有备用电源线,特别是在教育、卫生、银行、交通和通信等部门。直流电源因其维护要求低、无需加油、在这些机构中无污染物排放而开始广泛普及。直流系统存在的问题是:直流系统组件的损耗,以及输出电压随负载变化而变化。本研究介绍了一种利用蓄电池组产生 1760W 交流电的电力系统,该系统由一个双逆变器组成,以减少开关和滤波器的损耗,从而提高系统的效率和功率因数,并采用模糊逻辑控制器来调节转换器和逆变器的输出电压。在 MATLAB / Simulink 中进行的建模和仿真显示,在不同的负载和电池条件下,可获得负载电压恒定且总谐波失真(THD)值可接受的系统。
{"title":"Design a Power System of 1760W Based on a Twin Inverter and a Fuzzy Logic Controller","authors":"Samhar Saeed Shukir","doi":"10.37917/ijeee.20.2.6","DOIUrl":"https://doi.org/10.37917/ijeee.20.2.6","url":null,"abstract":"The increasing demand for electricity due to population expansion has led to frequent interruptions in electrical power, so there are backup power lines everywhere, especially in the sectors of education, health, banking, transportation and communications. DC sources are beginning to become widely spread in terms of low maintenance requirements, no need for refueling, and no pollutant emission in these institutions. The problems of DC systems are; losses in DC system components, and change in output voltage as loads change. This research presents a power system that generates 1760W AC power from batteries bank, the system consists of a twin inverter to reduce losses in switches and filters, and thus improving the efficiency and the power factor of the system, and fuzzy logic controllers to regulate the output voltage of the converter and inverter. Modeling and simulation in MATLAB / Simulink showed obtaining a constant load voltage with acceptable values of total harmonics distortion (THD) under different conditions of loads and batteries.","PeriodicalId":159746,"journal":{"name":"Iraqi Journal for Electrical and Electronic Engineering","volume":" 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141366831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Handwritten Signature Verification Method Using Convolutional Neural Network 使用卷积神经网络的手写签名验证方法
Pub Date : 2024-06-09 DOI: 10.37917/ijeee.20.2.7
Wijdan Yassen A. AlKarem, Eman Thabet Khalid, Khawla H. Ali
Automatic signature verification methods play a significant role in providing a secure and authenticated handwritten signature in many applications, to prevent forgery problems, specifically institutions of finance, and transections of legal papers, etc. There are two types of handwritten signature verification methods: online verification (dynamic) and offline verification (static) methods. Besides, signature verification approaches can be categorized into two styles: writer dependent (WD), and writer independent (WI) styles. Offline signature verification methods demands a high representation features for the signature image. However, lots of studies have been proposed for WI offline signature verification. Yet, there is necessity to improve the overall accuracy measurements. Therefore, a proved solution in this paper is depended on deep learning via convolutional neural network (CNN) for signature verification and optimize the overall accuracy measurements. The introduced model is trained on English signature dataset. For model evaluation, the deployed model is utilized to make predictions on new data of Arabic signature dataset to classify whether the signature is real or forged. The overall obtained accuracy is 95.36% based on validation dataset.
自动签名验证方法在许多应用中,特别是在金融机构和法律文书的转录等方面,在提供安全、可验证的手写签名以防止伪造问题方面发挥着重要作用。手写签名验证方法有两类:在线验证(动态)和离线验证(静态)方法。此外,签名验证方法还可分为两种风格:依赖于书写者(WD)风格和独立于书写者(WI)风格。离线签名验证方法对签名图像的表示特征要求较高。然而,已有很多研究提出了 WI 离线签名验证方法。然而,有必要提高整体准确度测量。因此,本文提出了一种成熟的解决方案,即通过卷积神经网络(CNN)的深度学习进行签名验证,并优化整体准确度测量。引入的模型在英文签名数据集上进行了训练。为了对模型进行评估,利用部署的模型对阿拉伯语签名数据集的新数据进行预测,以分类签名是真实的还是伪造的。基于验证数据集的总体准确率为 95.36%。
{"title":"Handwritten Signature Verification Method Using Convolutional Neural Network","authors":"Wijdan Yassen A. AlKarem, Eman Thabet Khalid, Khawla H. Ali","doi":"10.37917/ijeee.20.2.7","DOIUrl":"https://doi.org/10.37917/ijeee.20.2.7","url":null,"abstract":"Automatic signature verification methods play a significant role in providing a secure and authenticated handwritten signature in many applications, to prevent forgery problems, specifically institutions of finance, and transections of legal papers, etc. There are two types of handwritten signature verification methods: online verification (dynamic) and offline verification (static) methods. Besides, signature verification approaches can be categorized into two styles: writer dependent (WD), and writer independent (WI) styles. Offline signature verification methods demands a high representation features for the signature image. However, lots of studies have been proposed for WI offline signature verification. Yet, there is necessity to improve the overall accuracy measurements. Therefore, a proved solution in this paper is depended on deep learning via convolutional neural network (CNN) for signature verification and optimize the overall accuracy measurements. The introduced model is trained on English signature dataset. For model evaluation, the deployed model is utilized to make predictions on new data of Arabic signature dataset to classify whether the signature is real or forged. The overall obtained accuracy is 95.36% based on validation dataset.","PeriodicalId":159746,"journal":{"name":"Iraqi Journal for Electrical and Electronic Engineering","volume":" 7","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141366818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Taguchi Method Based Node Performance Analysis of Generous TIT- for-TAT Cooperation of AD-HOC Networks 基于田口方法的 AD-HOC 网络通用 TIT- for-TAT 合作节点性能分析
Pub Date : 2024-04-24 DOI: 10.37917/ijeee.20.2.3
Noor Kareem Jumaa, Auday A.H. Mohamad, Abbas Muhammed Allawy, Ali A. Mohammed
Ad-Hoc networks have an adaptive architecture, temporarily configured to provide communication between wireless devices that provide network nodes. Forwarding packets from the source node to the remote destination node may require intermediate cooperative nodes (relay nodes), which may act selfishly because they are power-constrained. The nodes should exhibit cooperation even when faced with occasional selfish or non-cooperative behaviour from other nodes. Several factors affect the behaviour of nodes; those factors are the number of packets required to redirect, power consumption per node, and power constraints per node. Power constraints per node and grade of generosity. This article is based on a dynamic collaboration strategy, specifically the Generous Tit-for-Tat (GTFT), and it aims to represent an Ad-Hoc network operating with the Generous Tit-for-Tat (GTFT) cooperation strategy, measure statistics for the data, and then analyze these statistics using the Taguchi method. The transfer speed and relay node performance both have an impact on the factors that shape the network conditions and are subject to analysis using the Taguchi Method (TM). The analyzed parameters are node throughput, the amount of relay requested packets produced by a node per number of relays requested packets taken by a node, and the amount of accepted relay requested by a node per amount of relay requested by a node. A Taguchi L9 orthogonal array was used to analyze node behaviour, and the results show that the effect parameters were number of packets, power consumption, power constraint of the node, and grade of generosity. The tested parameters influence node cooperation in the following sequence: number of packets required to redirect (N) (effects on behaviour with a percent of 6.8491), power consumption per node (C) (effects on behaviour with a percent of 0.7467), power constraints per node (P) (effects on behaviour with a percent of 0.6831), and grade of generosity (ε) (effects on behaviour with a percent of 0.4530). Taguchi experiments proved that the grade of generosity (GoG) is not the influencing factor where the highest productivity level is, while the number of packets per second required to redirect also has an impact on node behaviour.
Ad-Hoc 网络具有自适应架构,临时配置用于提供网络节点的无线设备之间的通信。将数据包从源节点转发到远程目的地节点可能需要中间合作节点(中继节点),这些节点可能会因为功率受限而采取自私行为。即使偶尔遇到其他节点的自私或不合作行为,节点也应表现出合作精神。有几个因素会影响节点的行为;这些因素是重定向所需的数据包数量、每个节点的功耗和每个节点的功耗限制。每个节点的功率限制和慷慨程度。本文基于一种动态合作策略,特别是慷慨的Tit-for-Tat(GTFT),旨在表示一个采用慷慨的Tit-for-Tat(GTFT)合作策略运行的Ad-Hoc网络,测量数据的统计量,然后使用田口方法分析这些统计量。传输速度和中继节点性能都对形成网络条件的因素有影响,因此要使用田口方法(TM)进行分析。分析参数包括节点吞吐量、节点产生的中继请求数据包数量与节点接收的中继请求数据包数量之比,以及节点接受的中继请求数量与节点请求的中继数量之比。采用田口 L9 正交阵列分析节点行为,结果表明,影响参数为数据包数量、功耗、节点的功率约束和慷慨度等级。测试参数对节点合作的影响依次为:重定向所需的数据包数量(N)(对行为的影响为 6.8491)、每个节点的功耗(C)(对行为的影响为 0.7467)、每个节点的功率限制(P)(对行为的影响为 0.6831)和慷慨度等级(ε)(对行为的影响为 0.4530)。Taguchi 实验证明,慷慨程度 (GoG) 并不是影响最高生产率的因素,而每秒重定向所需的数据包数量也会对节点行为产生影响。
{"title":"Taguchi Method Based Node Performance Analysis of Generous TIT- for-TAT Cooperation of AD-HOC Networks","authors":"Noor Kareem Jumaa, Auday A.H. Mohamad, Abbas Muhammed Allawy, Ali A. Mohammed","doi":"10.37917/ijeee.20.2.3","DOIUrl":"https://doi.org/10.37917/ijeee.20.2.3","url":null,"abstract":"Ad-Hoc networks have an adaptive architecture, temporarily configured to provide communication between wireless devices that provide network nodes. Forwarding packets from the source node to the remote destination node may require intermediate cooperative nodes (relay nodes), which may act selfishly because they are power-constrained. The nodes should exhibit cooperation even when faced with occasional selfish or non-cooperative behaviour from other nodes. Several factors affect the behaviour of nodes; those factors are the number of packets required to redirect, power consumption per node, and power constraints per node. Power constraints per node and grade of generosity. This article is based on a dynamic collaboration strategy, specifically the Generous Tit-for-Tat (GTFT), and it aims to represent an Ad-Hoc network operating with the Generous Tit-for-Tat (GTFT) cooperation strategy, measure statistics for the data, and then analyze these statistics using the Taguchi method. The transfer speed and relay node performance both have an impact on the factors that shape the network conditions and are subject to analysis using the Taguchi Method (TM). The analyzed parameters are node throughput, the amount of relay requested packets produced by a node per number of relays requested packets taken by a node, and the amount of accepted relay requested by a node per amount of relay requested by a node. A Taguchi L9 orthogonal array was used to analyze node behaviour, and the results show that the effect parameters were number of packets, power consumption, power constraint of the node, and grade of generosity. The tested parameters influence node cooperation in the following sequence: number of packets required to redirect (N) (effects on behaviour with a percent of 6.8491), power consumption per node (C) (effects on behaviour with a percent of 0.7467), power constraints per node (P) (effects on behaviour with a percent of 0.6831), and grade of generosity (ε) (effects on behaviour with a percent of 0.4530). Taguchi experiments proved that the grade of generosity (GoG) is not the influencing factor where the highest productivity level is, while the number of packets per second required to redirect also has an impact on node behaviour.","PeriodicalId":159746,"journal":{"name":"Iraqi Journal for Electrical and Electronic Engineering","volume":"6 8","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140660312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Iraqi Journal for Electrical and Electronic Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1