首页 > 最新文献

2022 4th International Conference on Advanced Science and Engineering (ICOASE)最新文献

英文 中文
Salp Swarm Algorithm-based Position Control of a BLDC Motor 基于Salp群算法的无刷直流电机位置控制
Pub Date : 2022-09-21 DOI: 10.1109/ICOASE56293.2022.10075598
O. M. Hussein, N. Yasin
The best P and PI controller parameters of the cascade control of the BLDC system are determined using a new artificial intelligence-based optimization method called the slap swarm algorithm (SSA) in this paper. The algorithm's simplicity allows for precise tuning of optimal P and PI controller values. The integral time absolute error (ITAE) was chosen as the fitness function to optimize the controller parameters. Compared with the classical control technique (PID), the SSA approach was found to have good tuning and obtained less rise time, also less (Approximately zero) overshoot, and is more efficient in increasing the step response of the BLDC system, according to the transient response study.
本文采用一种新的基于人工智能的优化方法——拍打群算法(SSA)确定无刷直流系统串级控制的最佳P和PI控制器参数。该算法的简单性允许精确调整最优P和PI控制器值。选择积分时间绝对误差(ITAE)作为适应度函数对控制器参数进行优化。通过对系统暂态响应的研究,发现与经典控制技术(PID)相比,SSA方法具有良好的可调谐性,上升时间短,超调量(近似为零)小,能更有效地提高无刷直流电机系统的阶跃响应。
{"title":"Salp Swarm Algorithm-based Position Control of a BLDC Motor","authors":"O. M. Hussein, N. Yasin","doi":"10.1109/ICOASE56293.2022.10075598","DOIUrl":"https://doi.org/10.1109/ICOASE56293.2022.10075598","url":null,"abstract":"The best P and PI controller parameters of the cascade control of the BLDC system are determined using a new artificial intelligence-based optimization method called the slap swarm algorithm (SSA) in this paper. The algorithm's simplicity allows for precise tuning of optimal P and PI controller values. The integral time absolute error (ITAE) was chosen as the fitness function to optimize the controller parameters. Compared with the classical control technique (PID), the SSA approach was found to have good tuning and obtained less rise time, also less (Approximately zero) overshoot, and is more efficient in increasing the step response of the BLDC system, according to the transient response study.","PeriodicalId":297211,"journal":{"name":"2022 4th International Conference on Advanced Science and Engineering (ICOASE)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130347794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Investigation of Healthcare Security Using Blockchain Technology: A review 基于区块链技术的医疗安全研究综述
Pub Date : 2022-09-21 DOI: 10.1109/ICOASE56293.2022.10075578
M. A. Omer, Shimal Sh. Taher, S. Ameen
Telemedicine and telehealth care system show the revolutionary and modern way to deal with the coronavirus 2019 pandemic. However, such systems are facing increased security risks. As a result, healthcare providers and academic institutions must be well-informed, safe, and prepared to respond to any cyber-attack. The aim of this paper is to conduct a review of healthcare information systems together with how security can be provided for such systems. The paper main focus is on the adoption of blockchain technology to support the security of the healthcare system. This adoption has been investigated and assessed to show its benefits compared with other conventional technologies. Finally, a recommendation was pointed out for the security of healthcare with the usage of blockchain technology.
远程医疗和远程医疗系统展示了应对2019年冠状病毒大流行的革命性和现代化方式。然而,这类系统面临着越来越大的安全风险。因此,医疗保健提供者和学术机构必须充分了解情况,确保安全,并准备好应对任何网络攻击。本文的目的是对医疗保健信息系统以及如何为此类系统提供安全性进行审查。本文的主要重点是采用区块链技术来支持医疗保健系统的安全性。与其他传统技术相比,这种采用已经进行了调查和评估,以显示其优势。最后,对区块链技术在医疗安全方面的应用提出了建议。
{"title":"Investigation of Healthcare Security Using Blockchain Technology: A review","authors":"M. A. Omer, Shimal Sh. Taher, S. Ameen","doi":"10.1109/ICOASE56293.2022.10075578","DOIUrl":"https://doi.org/10.1109/ICOASE56293.2022.10075578","url":null,"abstract":"Telemedicine and telehealth care system show the revolutionary and modern way to deal with the coronavirus 2019 pandemic. However, such systems are facing increased security risks. As a result, healthcare providers and academic institutions must be well-informed, safe, and prepared to respond to any cyber-attack. The aim of this paper is to conduct a review of healthcare information systems together with how security can be provided for such systems. The paper main focus is on the adoption of blockchain technology to support the security of the healthcare system. This adoption has been investigated and assessed to show its benefits compared with other conventional technologies. Finally, a recommendation was pointed out for the security of healthcare with the usage of blockchain technology.","PeriodicalId":297211,"journal":{"name":"2022 4th International Conference on Advanced Science and Engineering (ICOASE)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134206270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Diseases Diagnosis Using Machine Learning of Medical Images 使用医学图像的机器学习进行疾病诊断
Pub Date : 2022-09-21 DOI: 10.1109/ICOASE56293.2022.10075581
Shakir M. Abas, Omer Mohammed Salih Hassan, Imad Manaf Ali, Safin Saber Nori, Hamza Sardar Hassan
Recently, the various diseases are infecting the humans due to their living environmental and the changes of the environmental. It is much important to identification and prediction of such diseases at earlier stages to prevent the outbreak these diseases. The identification of these diseases manually by the doctors is difficult. There are many of the chronic diseases that affect human. One of these diseases is the brain tumors that arise by the abnormal growth and division of brain cells which leads to brain cancer. The computer vision plays important role in human health field which gives accurate results that helps the human to tack the true decision. In addition, traditional technics are time consuming, expensive and addressed problem requires expert knowledge. This research aims to focus on the using simple deep learning architecture with accurate results. Moreover, the Convolution Neural Network (CNN) algorithm is used for reliable Classification of the brain tumor Image. The proposed models are showed very good results and reached almost 96.4% accuracy on Brain MRI Images for Brain Tumor Detection1 dataset.
近年来,由于人类的生存环境和环境的变化,各种疾病正在感染人类。早期识别和预测这些疾病对预防这些疾病的爆发具有重要意义。由医生手动识别这些疾病是困难的。影响人类的慢性病有很多。其中一种疾病是脑肿瘤,它是由脑细胞的异常生长和分裂引起的,从而导致脑癌。计算机视觉在人类健康领域发挥着重要的作用,它能给出准确的结果,帮助人类做出真正的决策。此外,传统工艺耗时长,成本高,解决问题需要专业知识。本研究的重点是使用简单的深度学习架构并获得准确的结果。此外,采用卷积神经网络(CNN)算法对脑肿瘤图像进行可靠分类。所提出的模型在脑肿瘤检测1数据集的脑MRI图像上显示出非常好的结果,准确率接近96.4%。
{"title":"Diseases Diagnosis Using Machine Learning of Medical Images","authors":"Shakir M. Abas, Omer Mohammed Salih Hassan, Imad Manaf Ali, Safin Saber Nori, Hamza Sardar Hassan","doi":"10.1109/ICOASE56293.2022.10075581","DOIUrl":"https://doi.org/10.1109/ICOASE56293.2022.10075581","url":null,"abstract":"Recently, the various diseases are infecting the humans due to their living environmental and the changes of the environmental. It is much important to identification and prediction of such diseases at earlier stages to prevent the outbreak these diseases. The identification of these diseases manually by the doctors is difficult. There are many of the chronic diseases that affect human. One of these diseases is the brain tumors that arise by the abnormal growth and division of brain cells which leads to brain cancer. The computer vision plays important role in human health field which gives accurate results that helps the human to tack the true decision. In addition, traditional technics are time consuming, expensive and addressed problem requires expert knowledge. This research aims to focus on the using simple deep learning architecture with accurate results. Moreover, the Convolution Neural Network (CNN) algorithm is used for reliable Classification of the brain tumor Image. The proposed models are showed very good results and reached almost 96.4% accuracy on Brain MRI Images for Brain Tumor Detection1 dataset.","PeriodicalId":297211,"journal":{"name":"2022 4th International Conference on Advanced Science and Engineering (ICOASE)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133925234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automated Detection of Covid-19 from X-ray Using SVM 基于SVM的新型冠状病毒x射线自动检测
Pub Date : 2022-09-21 DOI: 10.1109/ICOASE56293.2022.10075586
D. A. Zebari, Dawlat Mustafa Sulaiman, Shereen S. Sadiq, Nechirvan Asaad Zebari, Merdin Shamal Salih
Earlier discovery of COVID-19 through precise diagnosis, particularly in instances with no evident symptoms, may reduce the mortality rate of patients. Chest X-ray images are the primary diagnostic tool for this condition. Patients exhibiting COVID-19 symptoms are causing hospitals to become overcrowded, which is becoming a big concern. The contribution that machine learning has made to big data medical research has been very helpful, opening up new ways to diagnose diseases. This study has developed a machine vision method to identify COVID-19 using X-ray images. The preprocessing stage has been applied to resize images and enhance the quality of X-ray images. The Gray-level co-occurrence matrix (GLCM) and Gray-Level Run Length Matrix (GLRLM) are then used to extract features from the X-ray images, and these features are combined to develop the performance classification via training by Support Vector Machine (SVM). The testing phase evaluated the model's performance using generalized data. This developed feature combination utilizing the GLCM and GLRLM algorithms assured a satisfactory evaluation performance based on COVID-19 detection compared to the immediate, single feature with a testing accuracy of 96.65%, a specificity of 99.54%, and a sensitivity of 97.98%.
通过准确诊断及早发现COVID-19,特别是在没有明显症状的情况下,可降低患者死亡率。胸部x线图像是该病的主要诊断工具。出现新冠肺炎症状的患者导致医院人满为患,这已成为一个大问题。机器学习对大数据医学研究的贡献非常有帮助,开辟了诊断疾病的新方法。本研究开发了一种利用x射线图像识别COVID-19的机器视觉方法。预处理阶段已应用于调整图像大小和提高x射线图像的质量。然后使用灰度共生矩阵(GLCM)和灰度运行长度矩阵(GLRLM)从x射线图像中提取特征,并将这些特征结合起来,通过支持向量机(SVM)的训练进行性能分类。测试阶段使用广义数据评估模型的性能。与直接的单一特征相比,利用GLCM和GLRLM算法开发的特征组合确保了基于COVID-19检测的令人满意的评估性能,测试准确率为96.65%,特异性为99.54%,灵敏度为97.98%。
{"title":"Automated Detection of Covid-19 from X-ray Using SVM","authors":"D. A. Zebari, Dawlat Mustafa Sulaiman, Shereen S. Sadiq, Nechirvan Asaad Zebari, Merdin Shamal Salih","doi":"10.1109/ICOASE56293.2022.10075586","DOIUrl":"https://doi.org/10.1109/ICOASE56293.2022.10075586","url":null,"abstract":"Earlier discovery of COVID-19 through precise diagnosis, particularly in instances with no evident symptoms, may reduce the mortality rate of patients. Chest X-ray images are the primary diagnostic tool for this condition. Patients exhibiting COVID-19 symptoms are causing hospitals to become overcrowded, which is becoming a big concern. The contribution that machine learning has made to big data medical research has been very helpful, opening up new ways to diagnose diseases. This study has developed a machine vision method to identify COVID-19 using X-ray images. The preprocessing stage has been applied to resize images and enhance the quality of X-ray images. The Gray-level co-occurrence matrix (GLCM) and Gray-Level Run Length Matrix (GLRLM) are then used to extract features from the X-ray images, and these features are combined to develop the performance classification via training by Support Vector Machine (SVM). The testing phase evaluated the model's performance using generalized data. This developed feature combination utilizing the GLCM and GLRLM algorithms assured a satisfactory evaluation performance based on COVID-19 detection compared to the immediate, single feature with a testing accuracy of 96.65%, a specificity of 99.54%, and a sensitivity of 97.98%.","PeriodicalId":297211,"journal":{"name":"2022 4th International Conference on Advanced Science and Engineering (ICOASE)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124539684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Blockchain for Big Data Security, Issues, Challenges and Future Directions 大数据安全,问题,挑战和未来方向
Pub Date : 2022-09-21 DOI: 10.1109/ICOASE56293.2022.10075570
Shimal Sh. Taher, S. Ameen, J. A. Ahmed
Over the last decade, worldwide data traffic has risen at an unprecedented rate, prompting a surge in interest in big data. manufacturing, entertainment, and media. With this interest, Blockchain Technology, appeared as a promising technology that enables the transaction record to be continuously stored, protected with the digital signature, and validated by consensus. It operates under the concept of a digital ledger that is distributed. In this article, recent growth in blockchain interest as an alternative to traditional centralized systems has been presented and considered the emerging implementations thereof. In particular, the key approaches needed for the introduction of the blockchain and security issues. This includes the general issue behind the blockchain, description of the component, and the blockchain importance and connection with the big data. Thus, the paper focuses on reviewing the research in blockchain applications in securing big data. The paper compares big data security techniques and mechanisms provided by the blockchain approach considering security attacks that might shed light on Blockchain enthusiasts and researchers. Finally, the paper evaluates the various challenges of blockchain and put some recommendations for future research.
在过去十年中,全球数据流量以前所未有的速度增长,促使人们对大数据的兴趣激增。制造业、娱乐和媒体。有了这种兴趣,区块链技术作为一种很有前途的技术出现了,它使交易记录能够连续存储,使用数字签名进行保护,并通过共识进行验证。它在分布式数字账本的概念下运作。在本文中,介绍了区块链作为传统集中式系统的替代方案的最新增长,并考虑了其新兴的实现。特别是引入区块链所需的关键方法和安全性问题。这包括区块链背后的一般问题,组件的描述,区块链的重要性以及与大数据的联系。因此,本文重点综述了区块链在大数据安全中的应用研究。本文比较了区块链方法提供的大数据安全技术和机制,考虑了可能对区块链爱好者和研究人员有所启发的安全攻击。最后,本文对区块链面临的各种挑战进行了评价,并对未来的研究提出了建议。
{"title":"Blockchain for Big Data Security, Issues, Challenges and Future Directions","authors":"Shimal Sh. Taher, S. Ameen, J. A. Ahmed","doi":"10.1109/ICOASE56293.2022.10075570","DOIUrl":"https://doi.org/10.1109/ICOASE56293.2022.10075570","url":null,"abstract":"Over the last decade, worldwide data traffic has risen at an unprecedented rate, prompting a surge in interest in big data. manufacturing, entertainment, and media. With this interest, Blockchain Technology, appeared as a promising technology that enables the transaction record to be continuously stored, protected with the digital signature, and validated by consensus. It operates under the concept of a digital ledger that is distributed. In this article, recent growth in blockchain interest as an alternative to traditional centralized systems has been presented and considered the emerging implementations thereof. In particular, the key approaches needed for the introduction of the blockchain and security issues. This includes the general issue behind the blockchain, description of the component, and the blockchain importance and connection with the big data. Thus, the paper focuses on reviewing the research in blockchain applications in securing big data. The paper compares big data security techniques and mechanisms provided by the blockchain approach considering security attacks that might shed light on Blockchain enthusiasts and researchers. Finally, the paper evaluates the various challenges of blockchain and put some recommendations for future research.","PeriodicalId":297211,"journal":{"name":"2022 4th International Conference on Advanced Science and Engineering (ICOASE)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127469751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Building a Real-Time System to Monitor Students Electronically Based on Digital Images of Face Movement 基于人脸运动数字图像的学生电子实时监控系统的构建
Pub Date : 2022-09-21 DOI: 10.1109/ICOASE56293.2022.10075587
Nagham Saeed, H. M. Ahmed
The spread of the Corona Virus pandemic on a global scale had a great impact on the trend towards e-learning. In the virtual exams the student can take his exams online without any papers, in addition to the correction and electronic monitoring of the exams. Tests are supervised and controlled by a camera and proven cheat-checking tools. This technology has opened the doors of academic institutions for distance learning to be wide spread without any problems at all. In this paper, a proposed model was built by linking a computer network using a server/client model because it is a system that distributes tasks between the two. The main computer that acts as a server (exam observer) is connected to a group of sub-computers (students) who are being tested and these devices are considered the set of clients. The proposed student face recognition system is run on each computer (client) in order to identify and verify the identity of the student. When another face is detected, the program sends a warning signal to the server. Thus, the concerned student is alerted. This mechanism helps examinees reduce cheating cases in early time. The results obtained from the face recognition showed high accuracy despite the large number of students' faces. The performance speed was in line with the test performance requirements, handling 1,081 real photos and adding 960 photos.
冠状病毒大流行在全球范围内的蔓延对电子学习的趋势产生了重大影响。在虚拟考试中,学生可以在没有任何试卷的情况下在线参加考试,除了考试的批改和电子监控。测试由摄像机和经过验证的作弊检查工具进行监督和控制。这项技术为远程教育的广泛传播打开了学术机构的大门,没有任何问题。在本文中,由于它是一个在两者之间分配任务的系统,因此通过使用服务器/客户端模型连接计算机网络建立了一个拟议的模型。作为服务器(考试观察员)的主计算机连接到一组被测试的子计算机(学生),这些设备被认为是一组客户端。所提出的学生人脸识别系统在每台计算机(客户端)上运行,以识别和验证学生的身份。当检测到另一张脸时,程序会向服务器发送警告信号。因此,有关的学生得到了警告。这一机制有助于考生尽早减少作弊事件。人脸识别结果显示,尽管学生的人脸数量较多,但准确率较高。性能速度符合测试性能要求,处理1081张真实照片,添加960张照片。
{"title":"Building a Real-Time System to Monitor Students Electronically Based on Digital Images of Face Movement","authors":"Nagham Saeed, H. M. Ahmed","doi":"10.1109/ICOASE56293.2022.10075587","DOIUrl":"https://doi.org/10.1109/ICOASE56293.2022.10075587","url":null,"abstract":"The spread of the Corona Virus pandemic on a global scale had a great impact on the trend towards e-learning. In the virtual exams the student can take his exams online without any papers, in addition to the correction and electronic monitoring of the exams. Tests are supervised and controlled by a camera and proven cheat-checking tools. This technology has opened the doors of academic institutions for distance learning to be wide spread without any problems at all. In this paper, a proposed model was built by linking a computer network using a server/client model because it is a system that distributes tasks between the two. The main computer that acts as a server (exam observer) is connected to a group of sub-computers (students) who are being tested and these devices are considered the set of clients. The proposed student face recognition system is run on each computer (client) in order to identify and verify the identity of the student. When another face is detected, the program sends a warning signal to the server. Thus, the concerned student is alerted. This mechanism helps examinees reduce cheating cases in early time. The results obtained from the face recognition showed high accuracy despite the large number of students' faces. The performance speed was in line with the test performance requirements, handling 1,081 real photos and adding 960 photos.","PeriodicalId":297211,"journal":{"name":"2022 4th International Conference on Advanced Science and Engineering (ICOASE)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128232223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Peak to Average Power Ratio Reduction for OFDM with IM System 具有IM系统的OFDM的峰值平均功率比降低
Pub Date : 2022-09-21 DOI: 10.1109/ICOASE56293.2022.10075595
Bana Shekh Faraj, A. Siddiq
This paper is interested in studying the Peak to Average Power Ratio (PAPR) reduction in Orthogonal Frequency Division Multiplexing with Index Modulation (OFDM-IM) system transmitter. PAPR is a common issue in multicarrier transmission techniques which is the result of adding independent multicarrier signals of different peak values on the same phases. The reduction schemes have been diversly examined for classical OFDM and the majority of them can be directly extended to OFDM-IM while some require slight changes to suit the OFDM-IM characteristics. Selective Mapping (SLM), Partial Transmit Sequence (PTS), Tone Reservation (TR), and Peak Insertion (PI) are some examples on the reduction schemes that will be investigated throughout this paper. As for PI, to the best knowledge of the authors is for the first time implemented in OFDM-IM. The system parameters effects, number of total subcarriers(N), number of subblocks (n), the active subcarriers (k), and the activation ratio (r) are studied to gain the lowest PAPR amount possible that reached (1.2 dB) at specified system parameters.
本文主要研究正交频分复用与指数调制(OFDM-IM)系统发射机的峰均功率比(PAPR)降低问题。PAPR是多载波传输技术中的一个常见问题,它是在同一相位上加入不同峰值的独立多载波信号的结果。对经典OFDM的降噪方案进行了不同的研究,其中大多数可以直接扩展到OFDM- im,而有些则需要稍微改变以适应OFDM- im的特性。选择性映射(SLM),部分传输序列(PTS),音调保留(TR)和峰值插入(PI)是本文将研究的一些减少方案的示例。至于PI,据作者所知是首次在OFDM-IM中实现的。研究了系统参数的影响、总子载波数(N)、子块数(N)、有效子载波数(k)和激活比(r),以获得在指定系统参数下可能达到(1.2 dB)的最低PAPR。
{"title":"Peak to Average Power Ratio Reduction for OFDM with IM System","authors":"Bana Shekh Faraj, A. Siddiq","doi":"10.1109/ICOASE56293.2022.10075595","DOIUrl":"https://doi.org/10.1109/ICOASE56293.2022.10075595","url":null,"abstract":"This paper is interested in studying the Peak to Average Power Ratio (PAPR) reduction in Orthogonal Frequency Division Multiplexing with Index Modulation (OFDM-IM) system transmitter. PAPR is a common issue in multicarrier transmission techniques which is the result of adding independent multicarrier signals of different peak values on the same phases. The reduction schemes have been diversly examined for classical OFDM and the majority of them can be directly extended to OFDM-IM while some require slight changes to suit the OFDM-IM characteristics. Selective Mapping (SLM), Partial Transmit Sequence (PTS), Tone Reservation (TR), and Peak Insertion (PI) are some examples on the reduction schemes that will be investigated throughout this paper. As for PI, to the best knowledge of the authors is for the first time implemented in OFDM-IM. The system parameters effects, number of total subcarriers(N), number of subblocks (n), the active subcarriers (k), and the activation ratio (r) are studied to gain the lowest PAPR amount possible that reached (1.2 dB) at specified system parameters.","PeriodicalId":297211,"journal":{"name":"2022 4th International Conference on Advanced Science and Engineering (ICOASE)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116754366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Angle Diversity Receiver for Indoor Optical Wireless Communication Systems 用于室内无线光通信系统的角度分集接收机
Pub Date : 2022-09-21 DOI: 10.1109/ICOASE56293.2022.10075573
Roua Muwafaq Younus, Mahmod Ahmed Al Zubaidy, Safwan Hafeedh Younus
Many factors, such as direct spotlights and multipath propagation, contribute to the deterioration of the optical wireless communication (OWC) system's performance in the interior environment. In this study, we look at angle diversity receiver (ADR) that can assist to mitigate these issues by rejecting direct pathways from the spotlights and allowing only reflected rays to reach the receiver. ADR also shortens the distance between the sender and the recipient, resulting in less path loss and delay spread. ADR consists of five photodetectors and each photodetector is directed in a precise direction to improve the system's performance by providing a specified field of view (FOV). Elevation angles are optimized to enhance the signal-to-noise ratio (SNR) by changing the angle in steps. Select the Best (SB) scheme is used to choose the detector with the greatest SNR. The computations are done with the help of the MATLAB program. The ADR's results are compared to the conventional diffuse system's (CDS) results, where the bit error rate (BER), and the delay spread are lowered greatly, and the 3-dB bandwidth of the channel is extended, according to the findings.
光无线通信(OWC)系统在室内环境下的性能下降主要是由于射灯直射、多径传播等因素造成的。在本研究中,我们研究了角度分集接收器(ADR),它可以通过拒绝来自聚光灯的直接路径,只允许反射光线到达接收器来帮助缓解这些问题。ADR还缩短了发送方和接收方之间的距离,从而减少了路径损耗和延迟传播。ADR由五个光电探测器组成,每个光电探测器都指向一个精确的方向,通过提供指定的视场(FOV)来提高系统的性能。优化仰角,通过逐步改变仰角来提高信噪比(SNR)。选择最佳(SB)方案用于选择信噪比最大的检测器。在MATLAB程序的帮助下进行计算。根据研究结果,ADR的结果与传统漫射系统(CDS)的结果进行了比较,后者的误码率(BER)和延迟扩展大大降低,并且通道的3db带宽得到了扩展。
{"title":"Angle Diversity Receiver for Indoor Optical Wireless Communication Systems","authors":"Roua Muwafaq Younus, Mahmod Ahmed Al Zubaidy, Safwan Hafeedh Younus","doi":"10.1109/ICOASE56293.2022.10075573","DOIUrl":"https://doi.org/10.1109/ICOASE56293.2022.10075573","url":null,"abstract":"Many factors, such as direct spotlights and multipath propagation, contribute to the deterioration of the optical wireless communication (OWC) system's performance in the interior environment. In this study, we look at angle diversity receiver (ADR) that can assist to mitigate these issues by rejecting direct pathways from the spotlights and allowing only reflected rays to reach the receiver. ADR also shortens the distance between the sender and the recipient, resulting in less path loss and delay spread. ADR consists of five photodetectors and each photodetector is directed in a precise direction to improve the system's performance by providing a specified field of view (FOV). Elevation angles are optimized to enhance the signal-to-noise ratio (SNR) by changing the angle in steps. Select the Best (SB) scheme is used to choose the detector with the greatest SNR. The computations are done with the help of the MATLAB program. The ADR's results are compared to the conventional diffuse system's (CDS) results, where the bit error rate (BER), and the delay spread are lowered greatly, and the 3-dB bandwidth of the channel is extended, according to the findings.","PeriodicalId":297211,"journal":{"name":"2022 4th International Conference on Advanced Science and Engineering (ICOASE)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134006405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Future Security Issues in Internet of Energy 未来能源互联网的安全问题
Pub Date : 2022-09-21 DOI: 10.1109/ICOASE56293.2022.10075597
Chahrazed Benrebbouh, Sarra Cherbal, Houssem Mansouri, A. Pathan
One of the most popular new technologies today is the Internet of Energy (IoE), which utilizes the Internet for collecting, organizing, optimizing and managing network energy information from various edge devices. In this way, a distributed smart energy infrastructure is developed. As IoE is essentially linked with the Internet, the cyber security concerns for this environment are also significant. Like any other technology connected with the Internet, IoE also is vulnerable to various kinds of attacks and threats. In this paper, we investigate the security issues in Internet of Energy. We study various security techniques proposed or developed for this environment during the recent years and discuss what to expect in the future.
当今最流行的新技术之一是能源互联网(IoE),它利用互联网收集、组织、优化和管理来自各种边缘设备的网络能源信息。通过这种方式,开发了分布式智能能源基础设施。由于物联网本质上与互联网相连,因此该环境的网络安全问题也很重要。与任何其他与互联网相连的技术一样,物联网也容易受到各种攻击和威胁。本文对能源互联网中的安全问题进行了研究。我们研究了近年来针对该环境提出或开发的各种安全技术,并讨论了未来的预期。
{"title":"Future Security Issues in Internet of Energy","authors":"Chahrazed Benrebbouh, Sarra Cherbal, Houssem Mansouri, A. Pathan","doi":"10.1109/ICOASE56293.2022.10075597","DOIUrl":"https://doi.org/10.1109/ICOASE56293.2022.10075597","url":null,"abstract":"One of the most popular new technologies today is the Internet of Energy (IoE), which utilizes the Internet for collecting, organizing, optimizing and managing network energy information from various edge devices. In this way, a distributed smart energy infrastructure is developed. As IoE is essentially linked with the Internet, the cyber security concerns for this environment are also significant. Like any other technology connected with the Internet, IoE also is vulnerable to various kinds of attacks and threats. In this paper, we investigate the security issues in Internet of Energy. We study various security techniques proposed or developed for this environment during the recent years and discuss what to expect in the future.","PeriodicalId":297211,"journal":{"name":"2022 4th International Conference on Advanced Science and Engineering (ICOASE)","volume":"149 S292","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120850530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Simulating the Wireless Sensor Networks Coverage Area in a Mesh Topology 网状拓扑下无线传感器网络覆盖区域的模拟
Pub Date : 2022-09-21 DOI: 10.1109/ICOASE56293.2022.10075584
Zainab Qassim Mohammed Ali, S. T. Hasson
Wireless Sensor Networks (WSNs) have many crucial applications. WSNs can be created from number of deployed sensor nodes in a certain area. These nodes can be deployed randomly. Sensors are mainly utilized to track or monitor any modifications in a surrounding area. They can be used to monitor, gather information then, process and transfer the sensed data to a certain sink node. One of the main objectives of any proposed WSNs is to safely transfer the sensed data with minimum energy consumption and with reduced packet losses. The data transmissions in WSNs are affected by the network topology. The network topology in this paper is mesh topology. Each sensor in such a topology can communicate directly with its neighbors if they are located in its transmission range. The data transmission is performed through the shortest path. The problem in this work is to analyze and evaluate the effects of mesh topology on the coverage area and evaluate the cases when many sensor nodes send messages at the same time. The simulation results showed an average of 33.8 messages are sent and received in scenario 1. Four selected nodes are tested and their sent messages are (359, 531, 197 and 145) respectively.
无线传感器网络(WSNs)有许多重要的应用。无线传感器网络可以通过在一定区域内部署的传感器节点数量来创建。这些节点可以随机部署。传感器主要用于跟踪或监测周围区域的任何变化。它们可以用来监测、收集信息,然后处理并将感知到的数据传输到某个汇聚节点。任何提出的无线传感器网络的主要目标之一是以最小的能量消耗和减少丢包的方式安全地传输感知数据。无线传感器网络中的数据传输受到网络拓扑结构的影响。本文的网络拓扑为网状拓扑。这种拓扑结构中的每个传感器都可以直接与位于其传输范围内的邻居进行通信。数据传输采用最短路径。本工作的问题是分析和评估网格拓扑对覆盖区域的影响,以及评估多个传感器节点同时发送消息的情况。仿真结果显示,场景1平均发送和接收消息为33.8条。选取4个节点进行测试,其发送的消息分别为(359,531,197,145)。
{"title":"Simulating the Wireless Sensor Networks Coverage Area in a Mesh Topology","authors":"Zainab Qassim Mohammed Ali, S. T. Hasson","doi":"10.1109/ICOASE56293.2022.10075584","DOIUrl":"https://doi.org/10.1109/ICOASE56293.2022.10075584","url":null,"abstract":"Wireless Sensor Networks (WSNs) have many crucial applications. WSNs can be created from number of deployed sensor nodes in a certain area. These nodes can be deployed randomly. Sensors are mainly utilized to track or monitor any modifications in a surrounding area. They can be used to monitor, gather information then, process and transfer the sensed data to a certain sink node. One of the main objectives of any proposed WSNs is to safely transfer the sensed data with minimum energy consumption and with reduced packet losses. The data transmissions in WSNs are affected by the network topology. The network topology in this paper is mesh topology. Each sensor in such a topology can communicate directly with its neighbors if they are located in its transmission range. The data transmission is performed through the shortest path. The problem in this work is to analyze and evaluate the effects of mesh topology on the coverage area and evaluate the cases when many sensor nodes send messages at the same time. The simulation results showed an average of 33.8 messages are sent and received in scenario 1. Four selected nodes are tested and their sent messages are (359, 531, 197 and 145) respectively.","PeriodicalId":297211,"journal":{"name":"2022 4th International Conference on Advanced Science and Engineering (ICOASE)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120960251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2022 4th International Conference on Advanced Science and Engineering (ICOASE)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1