Pub Date : 2022-03-16DOI: 10.1109/micest54286.2022.9790233
Nabil Rubaian, A. Al-Arainy
Nowadays the polymeric insulators with Nano fillers have a lot of attention of researchers and developers. Inorganic Nano-fillers are added to the polymer to improve some insulation properties. In the present work, the dissipation factor and volume resistivity of liner low-density polyethylene (LLDPE 324CN)-based SiO2 and Al2O3 Nano fillers were investigated. The two nanomaterials (SiO2, Al2O3) were separately added to the polymer with different concentrations (0.5%, 1.5%, 3%, 6%). Also the mixture of the two nanomaterials was also added together to the polymer. Based on the experimental measurements, it is found that the addition of inorganic Nano fillers on the polymer can improve the dissipation factor and volume resistivity. At 6% of SiO2, the volume resistivity can exceed three times that of unfilled polymer while. 6% of AL2O3 increases by more than 34% compared with unfiled polymer.
{"title":"Influence of Adding Nano Particles on Dissipation Factor and Volume Resistivity of Polymer","authors":"Nabil Rubaian, A. Al-Arainy","doi":"10.1109/micest54286.2022.9790233","DOIUrl":"https://doi.org/10.1109/micest54286.2022.9790233","url":null,"abstract":"Nowadays the polymeric insulators with Nano fillers have a lot of attention of researchers and developers. Inorganic Nano-fillers are added to the polymer to improve some insulation properties. In the present work, the dissipation factor and volume resistivity of liner low-density polyethylene (LLDPE 324CN)-based SiO2 and Al2O3 Nano fillers were investigated. The two nanomaterials (SiO2, Al2O3) were separately added to the polymer with different concentrations (0.5%, 1.5%, 3%, 6%). Also the mixture of the two nanomaterials was also added together to the polymer. Based on the experimental measurements, it is found that the addition of inorganic Nano fillers on the polymer can improve the dissipation factor and volume resistivity. At 6% of SiO2, the volume resistivity can exceed three times that of unfilled polymer while. 6% of AL2O3 increases by more than 34% compared with unfiled polymer.","PeriodicalId":222003,"journal":{"name":"2022 Muthanna International Conference on Engineering Science and Technology (MICEST)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132182616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-03-16DOI: 10.1109/MICEST54286.2022.9790277
Ammar Ismael Kadhim, Ahmed Ayad Abdalhameed
A huge amount of information is available in different fields like information technology and computer science. A new hybrid feature selection technique via using chi-square with genetic algorithm (GA). An automatic text categorization mechanism was required to identify whether the text is going to a specific category or not. Thus, this technique is used to select the importance and unimportance features via developing the training model. For the existing GA-based, terms and documents are used together as features in the training model and obtain the perfect weights for the features. To evaluate the efficiency of document categorization techniques on the suggested approach, experiments results are conducted utilizing the Naïve Bayes (NB) and C4.5 decision tree classifiers based on two different datasets (BBC sport and BBC news datasets) collection for text categorization. From the empirical findings, it can observed that the hybrid technique can allow to obtain high categorization efficiency depend on the performance evaluation metrics accuracy, precision, recall and F1-score.
{"title":"A hybrid feature selection technique using chi-square with genetic algorithm","authors":"Ammar Ismael Kadhim, Ahmed Ayad Abdalhameed","doi":"10.1109/MICEST54286.2022.9790277","DOIUrl":"https://doi.org/10.1109/MICEST54286.2022.9790277","url":null,"abstract":"A huge amount of information is available in different fields like information technology and computer science. A new hybrid feature selection technique via using chi-square with genetic algorithm (GA). An automatic text categorization mechanism was required to identify whether the text is going to a specific category or not. Thus, this technique is used to select the importance and unimportance features via developing the training model. For the existing GA-based, terms and documents are used together as features in the training model and obtain the perfect weights for the features. To evaluate the efficiency of document categorization techniques on the suggested approach, experiments results are conducted utilizing the Naïve Bayes (NB) and C4.5 decision tree classifiers based on two different datasets (BBC sport and BBC news datasets) collection for text categorization. From the empirical findings, it can observed that the hybrid technique can allow to obtain high categorization efficiency depend on the performance evaluation metrics accuracy, precision, recall and F1-score.","PeriodicalId":222003,"journal":{"name":"2022 Muthanna International Conference on Engineering Science and Technology (MICEST)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126968411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-03-16DOI: 10.1109/MICEST54286.2022.9790187
S. Hussein, Khawla H. Ali
This paper addresses a deep learning method for high-resolution semantic segmentation in aerial images. U-net architecture promises end-to-end learning from basic ideas, making hand feature design deserted. However, the problem is gradually collecting information over larger image regions, making separating donations from different pixels. To solve this problem, the proposed training strategy is based on U-net, which contains two parts: contraction and expansion to segment foreground and background pixels. In addition, the significance of conditional random field (CRF) is applied to improve the accuracy of semantic segmentation. The proposed algorithm was evaluated on the Semantic segmentation of aerial imagery (Satellite images of Dubai) dataset, containing six common resources Land, Building, Road, Vegetation, Water, Unlabeled. The experimental findings reveal that the suggested approach outperforms other algorithms by achieving 0.99 accuracies and loss function 0.58.
{"title":"Enhanced Semantic Segmentation of Aerial images with Spatial Smoothness Using CRF Model","authors":"S. Hussein, Khawla H. Ali","doi":"10.1109/MICEST54286.2022.9790187","DOIUrl":"https://doi.org/10.1109/MICEST54286.2022.9790187","url":null,"abstract":"This paper addresses a deep learning method for high-resolution semantic segmentation in aerial images. U-net architecture promises end-to-end learning from basic ideas, making hand feature design deserted. However, the problem is gradually collecting information over larger image regions, making separating donations from different pixels. To solve this problem, the proposed training strategy is based on U-net, which contains two parts: contraction and expansion to segment foreground and background pixels. In addition, the significance of conditional random field (CRF) is applied to improve the accuracy of semantic segmentation. The proposed algorithm was evaluated on the Semantic segmentation of aerial imagery (Satellite images of Dubai) dataset, containing six common resources Land, Building, Road, Vegetation, Water, Unlabeled. The experimental findings reveal that the suggested approach outperforms other algorithms by achieving 0.99 accuracies and loss function 0.58.","PeriodicalId":222003,"journal":{"name":"2022 Muthanna International Conference on Engineering Science and Technology (MICEST)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134645915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-03-16DOI: 10.1109/micest54286.2022.9790226
Mohammed Alaa Yousif Ali, E. A. Hussein, D. M. Abdulsahib
Due to the importance of security systems in our practice and daily lives for protecting companies, homes and other public and private facilities. In the last few years, these systems have received great attention from developers and researchers with the advancement of modern technology and the development of smart processing units and microelectronic units. Where an Internet of Things subscription constitutes a breakthrough in the world of communications and modern technology. Due to the correct use of mobile Internet networks like 4G or 5G, or fixed networks with a limited signal like LAN or Wi-Fi. While implementations of a unified security system adequately represent a waste of the resource's memory, network bandwidth, it is characterized by as well as real-time data processing and, to avoid software that takes time and cost to the processing. This specific proposal will adequately provide a multi-protection security system improperly using a fingerprint sensor, a Wi-Fi camera, Arduino micro controller board R3, in addition to the effective use of electric locks to properly enter used people from the principal doors through a unified security system via the Internet of Things. Finally, the proposed system properly administers and detects unauthorized persons and preventing them from authorized entry and detecting them when repeated attempts to enter.
{"title":"Multi-Security System Based on Fingerprint Biometric Sensor and Wi-Fi Camera","authors":"Mohammed Alaa Yousif Ali, E. A. Hussein, D. M. Abdulsahib","doi":"10.1109/micest54286.2022.9790226","DOIUrl":"https://doi.org/10.1109/micest54286.2022.9790226","url":null,"abstract":"Due to the importance of security systems in our practice and daily lives for protecting companies, homes and other public and private facilities. In the last few years, these systems have received great attention from developers and researchers with the advancement of modern technology and the development of smart processing units and microelectronic units. Where an Internet of Things subscription constitutes a breakthrough in the world of communications and modern technology. Due to the correct use of mobile Internet networks like 4G or 5G, or fixed networks with a limited signal like LAN or Wi-Fi. While implementations of a unified security system adequately represent a waste of the resource's memory, network bandwidth, it is characterized by as well as real-time data processing and, to avoid software that takes time and cost to the processing. This specific proposal will adequately provide a multi-protection security system improperly using a fingerprint sensor, a Wi-Fi camera, Arduino micro controller board R3, in addition to the effective use of electric locks to properly enter used people from the principal doors through a unified security system via the Internet of Things. Finally, the proposed system properly administers and detects unauthorized persons and preventing them from authorized entry and detecting them when repeated attempts to enter.","PeriodicalId":222003,"journal":{"name":"2022 Muthanna International Conference on Engineering Science and Technology (MICEST)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116444629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-03-16DOI: 10.1109/micest54286.2022.9790165
S. Ameen
{"title":"Communication Networks","authors":"S. Ameen","doi":"10.1109/micest54286.2022.9790165","DOIUrl":"https://doi.org/10.1109/micest54286.2022.9790165","url":null,"abstract":"","PeriodicalId":222003,"journal":{"name":"2022 Muthanna International Conference on Engineering Science and Technology (MICEST)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128267935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-03-16DOI: 10.1109/MICEST54286.2022.9790103
Rasha Khilkhal, Mustafa R. Ismael
The segmentation of brain tumors utilizing magnetic resonance imaging (MRI) is a critical step in medical image processing. This results from the valuable information obtained from MRI images that help the radiologist in brain diagnosis. Consequently, many researchers have suggested different methods to address the problem of tumor segmentation in brain MRI images. This paper proposes a brain tumor segmentation algorithm based on k-means clustering, thresholding, and morphological operations. First, K-means clusters the MRI slice into three segments, then a thresholding step converts the segmented image to black and white to separate the tumor from the non-tumor regions. K-means is utilized here as an intermediate step before thresholding to enhance the performance of the segmentation process. On the other hand, non-brain tissue is removed utilizing morphological operations. Four morphological operations have demonstrated significant improvements in the process suggested in this method, erosion, dilation, closing, and opening. The experiments were implemented on BRATS datasets utilizing high-grade (HGG) and low-grade (LGG) images. The results obtained from the simulated experiments demonstrated the powerful achievements of the suggested algorithm in terms of Dice, Jaccard, and F1 score. Furthermore, the suggested method outperforms a few other techniques when applied to the same images.
{"title":"Brain Tumor Segmentation Utilizing Thresholding and K-Means Clustering","authors":"Rasha Khilkhal, Mustafa R. Ismael","doi":"10.1109/MICEST54286.2022.9790103","DOIUrl":"https://doi.org/10.1109/MICEST54286.2022.9790103","url":null,"abstract":"The segmentation of brain tumors utilizing magnetic resonance imaging (MRI) is a critical step in medical image processing. This results from the valuable information obtained from MRI images that help the radiologist in brain diagnosis. Consequently, many researchers have suggested different methods to address the problem of tumor segmentation in brain MRI images. This paper proposes a brain tumor segmentation algorithm based on k-means clustering, thresholding, and morphological operations. First, K-means clusters the MRI slice into three segments, then a thresholding step converts the segmented image to black and white to separate the tumor from the non-tumor regions. K-means is utilized here as an intermediate step before thresholding to enhance the performance of the segmentation process. On the other hand, non-brain tissue is removed utilizing morphological operations. Four morphological operations have demonstrated significant improvements in the process suggested in this method, erosion, dilation, closing, and opening. The experiments were implemented on BRATS datasets utilizing high-grade (HGG) and low-grade (LGG) images. The results obtained from the simulated experiments demonstrated the powerful achievements of the suggested algorithm in terms of Dice, Jaccard, and F1 score. Furthermore, the suggested method outperforms a few other techniques when applied to the same images.","PeriodicalId":222003,"journal":{"name":"2022 Muthanna International Conference on Engineering Science and Technology (MICEST)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134633522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-03-16DOI: 10.1109/MICEST54286.2022.9790130
Mustafa Hussein, Mohannad M. Al-Yasiry
Over the years, the web has evolved from simple text content from one server to a complex ecosystem with different types of content from servers spread across several administrative domains. There is anecdotal evidence of users being frustrated with attempts to hack websites and steal accounts, money, ideas, or data from photos or documents. wherefore, websites need new techniques to increase security, reduce fraud, and reduce the risk of single point of failure. All these features can be found in Blockchain. Therefore, there is a need to propose a (refined) method as a countermeasure that keeps track of existing attacks. A framework is proposed for using blockchain as a technology to secure websites based on blockchain platform using steps: preparation, extraction, blockchain building, blockchain integration, and framework validation the results came in the form of a comparison table that helped us identify the main problem and the research path and we can get results by avoiding more than 80% of these attacks on websites.
{"title":"Study about the Ability to Secure Websites using Blockchain","authors":"Mustafa Hussein, Mohannad M. Al-Yasiry","doi":"10.1109/MICEST54286.2022.9790130","DOIUrl":"https://doi.org/10.1109/MICEST54286.2022.9790130","url":null,"abstract":"Over the years, the web has evolved from simple text content from one server to a complex ecosystem with different types of content from servers spread across several administrative domains. There is anecdotal evidence of users being frustrated with attempts to hack websites and steal accounts, money, ideas, or data from photos or documents. wherefore, websites need new techniques to increase security, reduce fraud, and reduce the risk of single point of failure. All these features can be found in Blockchain. Therefore, there is a need to propose a (refined) method as a countermeasure that keeps track of existing attacks. A framework is proposed for using blockchain as a technology to secure websites based on blockchain platform using steps: preparation, extraction, blockchain building, blockchain integration, and framework validation the results came in the form of a comparison table that helped us identify the main problem and the research path and we can get results by avoiding more than 80% of these attacks on websites.","PeriodicalId":222003,"journal":{"name":"2022 Muthanna International Conference on Engineering Science and Technology (MICEST)","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127564583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-03-16DOI: 10.1109/MICEST54286.2022.9790263
Mohammed Hazim ALShaker, S. A. Hassan
Past decades had witnessed many attempts to improve natural ventilation in buildings to reduce the energy consumption for cooling purpose, and enhance air quality for promote public health, thus by studying the environmental characteristics as well as the passive design strategies of buildings, the atrium is one of the design elements that can be environmentally improved to enhance natural ventilation in buildings, as shown by previous studies, it has different effects on the formation of air flow inside the building, there is a research gap in the study of the characteristics of the atrium retrofit design and its importance in promoting natural ventilation inside public buildings in hot arid climate, which represented the research problem. The atrium in the Ishtar Sheraton Hotel in Baghdad was studied; with propose different design solutions to the retrofit atrium ceiling and comparing their different effects on the natural ventilation. The results showed that the change in the shape and height of the ceiling of the central space increased the speed of air flow inside the space.
{"title":"The Effect Of Atrium Retrofit Design On Natural Ventilation For Hot Arid Climate","authors":"Mohammed Hazim ALShaker, S. A. Hassan","doi":"10.1109/MICEST54286.2022.9790263","DOIUrl":"https://doi.org/10.1109/MICEST54286.2022.9790263","url":null,"abstract":"Past decades had witnessed many attempts to improve natural ventilation in buildings to reduce the energy consumption for cooling purpose, and enhance air quality for promote public health, thus by studying the environmental characteristics as well as the passive design strategies of buildings, the atrium is one of the design elements that can be environmentally improved to enhance natural ventilation in buildings, as shown by previous studies, it has different effects on the formation of air flow inside the building, there is a research gap in the study of the characteristics of the atrium retrofit design and its importance in promoting natural ventilation inside public buildings in hot arid climate, which represented the research problem. The atrium in the Ishtar Sheraton Hotel in Baghdad was studied; with propose different design solutions to the retrofit atrium ceiling and comparing their different effects on the natural ventilation. The results showed that the change in the shape and height of the ceiling of the central space increased the speed of air flow inside the space.","PeriodicalId":222003,"journal":{"name":"2022 Muthanna International Conference on Engineering Science and Technology (MICEST)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127928278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-03-16DOI: 10.1109/micest54286.2022.9790223
Omer S. Hassan, B. Mahdi, R. Al-azawi, S. R. Tahhan
In this study, a sensor application based on the Mach-Zehnder modal interferometer MZI were employed to detect changes in the concentration values of heavy metals (zinc, cadmium). The Mach-Zehnder modal interferometer was used in all three applications. The basic structure of the sensor was implemented by the use of fusion splice PCF with a 2 cm length between two (SMF-25). At the fusion splice location, the air holes were completely compressed, allowing the core and cladding modes to be coupled and recombined with one another. The sensor immersed in a solution at different concentration levels of ranges (1-3,5,7-9) %. The Comsol Multiphysics (5.4v) program, was used to design the Photonic crystal fiber and test it with different concentrations of a mixture of zinc and cadmium. The sensitivity obtained was (78.02%).
{"title":"Design a Photonic Crystal iber for Zinc-Cadmium Detecting Using Comsol Multiphysics","authors":"Omer S. Hassan, B. Mahdi, R. Al-azawi, S. R. Tahhan","doi":"10.1109/micest54286.2022.9790223","DOIUrl":"https://doi.org/10.1109/micest54286.2022.9790223","url":null,"abstract":"In this study, a sensor application based on the Mach-Zehnder modal interferometer MZI were employed to detect changes in the concentration values of heavy metals (zinc, cadmium). The Mach-Zehnder modal interferometer was used in all three applications. The basic structure of the sensor was implemented by the use of fusion splice PCF with a 2 cm length between two (SMF-25). At the fusion splice location, the air holes were completely compressed, allowing the core and cladding modes to be coupled and recombined with one another. The sensor immersed in a solution at different concentration levels of ranges (1-3,5,7-9) %. The Comsol Multiphysics (5.4v) program, was used to design the Photonic crystal fiber and test it with different concentrations of a mixture of zinc and cadmium. The sensitivity obtained was (78.02%).","PeriodicalId":222003,"journal":{"name":"2022 Muthanna International Conference on Engineering Science and Technology (MICEST)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121258460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-03-16DOI: 10.1109/MICEST54286.2022.9790231
F. Raheemah, M. Hussein
Quadrotors are unmanned aerial vehicles capable of vertical takeoff, hovering, and landing. The quadrotor is distinguished by its small size, flexibility, and maneuverability. The small sensors and actuators used in these systems are effective enough in comparison with the larger systems. Quadrotor dynamic modeling was derived using the Newton-Euler formalization including aerodynamic effects. Also, a dynamic model has been identified that accurately describes the behavior of the quadrotor and can be applied to comparable configurations of multiengine aerial vehicles. The dynamic model and controllers (where used PID controller) established on the quadrotor. That are considered to be a trustworthy foundation for further complex applications. as well, this article outlines the technique of identifying and controlling a Parrot AR. Drone in a closed loop. The goal of the research is to establish position control movement of quadrotor (AR. Drone) by using the program LabVIEW. Here, the quadrotor will be controlled in two ways by using the joystick and the use of the keyboard. AR. Drone has been shaped in the hover path. The simulation results showed the correct path tracking and the success of the proposed controller unit by using MATLAB/SIMULINK. While the laboratory results showed the efficiency of using the LabView program in controlling this type of quadrotor.
{"title":"Simulations and Flight Test of AR. Drone Quadrotor using Lab VIEW","authors":"F. Raheemah, M. Hussein","doi":"10.1109/MICEST54286.2022.9790231","DOIUrl":"https://doi.org/10.1109/MICEST54286.2022.9790231","url":null,"abstract":"Quadrotors are unmanned aerial vehicles capable of vertical takeoff, hovering, and landing. The quadrotor is distinguished by its small size, flexibility, and maneuverability. The small sensors and actuators used in these systems are effective enough in comparison with the larger systems. Quadrotor dynamic modeling was derived using the Newton-Euler formalization including aerodynamic effects. Also, a dynamic model has been identified that accurately describes the behavior of the quadrotor and can be applied to comparable configurations of multiengine aerial vehicles. The dynamic model and controllers (where used PID controller) established on the quadrotor. That are considered to be a trustworthy foundation for further complex applications. as well, this article outlines the technique of identifying and controlling a Parrot AR. Drone in a closed loop. The goal of the research is to establish position control movement of quadrotor (AR. Drone) by using the program LabVIEW. Here, the quadrotor will be controlled in two ways by using the joystick and the use of the keyboard. AR. Drone has been shaped in the hover path. The simulation results showed the correct path tracking and the success of the proposed controller unit by using MATLAB/SIMULINK. While the laboratory results showed the efficiency of using the LabView program in controlling this type of quadrotor.","PeriodicalId":222003,"journal":{"name":"2022 Muthanna International Conference on Engineering Science and Technology (MICEST)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131023269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}