Pub Date : 2022-09-21DOI: 10.1109/ICOASE56293.2022.10075600
A. A. Rasheed, Khalil H. Sayidmarie
Nanoantennas have attracted much attention because of their unique ability to collect light into subwavelength dimensions while enhancing a high electric field via localized surface plasmon resonance. Engineering the shape and size of the nanoantenna mostly focuses on improving the confined field or altering the resonance wavelength. This study focuses on improving the absorption and scattering properties of a circular-dipole nanoantenna by inserting circular holes in the two arms of the dipole. The influence of the dipole parameters on its properties such as resonance wavelength, reflection, and absorption, as well as the electric field in the gap was investigated. The proposed ring geometry can significantly increase the absorption while also inhibiting scattering, thus achieving an optimal operating state. The scattered power of a solid circular dipole nanoantenna can be up to 85%, while the remaining 15% of the incident power is absorbed. It is shown that the absorbed coupled power in the hollow circular dipole can be increased to 55%. This property results in optimal plasmonic localization of the field in the gap of the dipole nanoantenna. This finding can be deployed in photovoltaics, thermoplastics, fluorescence microscopy, and biosensing applications.
{"title":"A Circular Dipole Nanoantenna with Improved Performance","authors":"A. A. Rasheed, Khalil H. Sayidmarie","doi":"10.1109/ICOASE56293.2022.10075600","DOIUrl":"https://doi.org/10.1109/ICOASE56293.2022.10075600","url":null,"abstract":"Nanoantennas have attracted much attention because of their unique ability to collect light into subwavelength dimensions while enhancing a high electric field via localized surface plasmon resonance. Engineering the shape and size of the nanoantenna mostly focuses on improving the confined field or altering the resonance wavelength. This study focuses on improving the absorption and scattering properties of a circular-dipole nanoantenna by inserting circular holes in the two arms of the dipole. The influence of the dipole parameters on its properties such as resonance wavelength, reflection, and absorption, as well as the electric field in the gap was investigated. The proposed ring geometry can significantly increase the absorption while also inhibiting scattering, thus achieving an optimal operating state. The scattered power of a solid circular dipole nanoantenna can be up to 85%, while the remaining 15% of the incident power is absorbed. It is shown that the absorbed coupled power in the hollow circular dipole can be increased to 55%. This property results in optimal plasmonic localization of the field in the gap of the dipole nanoantenna. This finding can be deployed in photovoltaics, thermoplastics, fluorescence microscopy, and biosensing applications.","PeriodicalId":297211,"journal":{"name":"2022 4th International Conference on Advanced Science and Engineering (ICOASE)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114257499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-21DOI: 10.1109/ICOASE56293.2022.10075599
Hamzah Noori Fejer, Ali Hadi Hasan
The field of argumentation in Artificial Intelligence (AI) has witnessed a great increase an important cognitive to deal with uncertain information and conflicting opinions. This has led to a number of interesting lines of research in this field and related fields, giving rise to computational models of the argument as a promising research field. The remedies conflict problem is considered one of the challenges in the field of medicine the world. This paper makes use of Toulmin's argumentation model to deal with conflicting problems within the medicine field. In addition, inference rules were used for associating a patient's symptoms and patient history(premises) with remedies use, eventually leading to medications diagnosis for patient (claims). After that, several remedy features are used to compete for the support and the attack (pros and cons) for each remedy item. A decision is made during the qualifier phase in Toulmin's model about whether or not the drug should be used based on the highest value of support or attack. The dataset consists of 200 patients as samples for two heart diseases (hypertension, angina pectoris). It is collected from the Iraqi educational hospitals, annotated by a team of experts working in the medical field. The performance achieved in the proposed model in hypertension and angina pectoris diseases were 78% and 83%, respectively, using the confusion matrix method.
{"title":"The Use of Toulmin's Argumentation Model in Solving The Drug Conflict Problems","authors":"Hamzah Noori Fejer, Ali Hadi Hasan","doi":"10.1109/ICOASE56293.2022.10075599","DOIUrl":"https://doi.org/10.1109/ICOASE56293.2022.10075599","url":null,"abstract":"The field of argumentation in Artificial Intelligence (AI) has witnessed a great increase an important cognitive to deal with uncertain information and conflicting opinions. This has led to a number of interesting lines of research in this field and related fields, giving rise to computational models of the argument as a promising research field. The remedies conflict problem is considered one of the challenges in the field of medicine the world. This paper makes use of Toulmin's argumentation model to deal with conflicting problems within the medicine field. In addition, inference rules were used for associating a patient's symptoms and patient history(premises) with remedies use, eventually leading to medications diagnosis for patient (claims). After that, several remedy features are used to compete for the support and the attack (pros and cons) for each remedy item. A decision is made during the qualifier phase in Toulmin's model about whether or not the drug should be used based on the highest value of support or attack. The dataset consists of 200 patients as samples for two heart diseases (hypertension, angina pectoris). It is collected from the Iraqi educational hospitals, annotated by a team of experts working in the medical field. The performance achieved in the proposed model in hypertension and angina pectoris diseases were 78% and 83%, respectively, using the confusion matrix method.","PeriodicalId":297211,"journal":{"name":"2022 4th International Conference on Advanced Science and Engineering (ICOASE)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114334090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-21DOI: 10.1109/ICOASE56293.2022.10075567
F. E. Samann, S. Ameen, Shavan K. Askar
The existing Internet infrastructure cannot meet the demands of the exponential growth in data users need to access. Therefore, Fog Computing (FC), Internet of Things (IoT), and 5G are upgrading conventional data transfer with innovative solutions and intelligently processing data to improve performance. Fog computing is considered a central component in the growth of the new 5G networks and the Internet of Things. These advanced technologies allow the Internet to provide enhanced services through sensors, continually monitoring a wide range of information. The paper reviews the most recent studies that implemented fog computing in a 5G environment by defining the essential services and network-oriented functionality. Moreover, the surveyed study is also discussed and assessed through sum-up tables with general remarks about the followed trends. The mentioned studies presented legitimate solutions for issues in the Vehicular Network and improved the current network architecture.
{"title":"Fog Computing in 5G Mobile Networks: A Review","authors":"F. E. Samann, S. Ameen, Shavan K. Askar","doi":"10.1109/ICOASE56293.2022.10075567","DOIUrl":"https://doi.org/10.1109/ICOASE56293.2022.10075567","url":null,"abstract":"The existing Internet infrastructure cannot meet the demands of the exponential growth in data users need to access. Therefore, Fog Computing (FC), Internet of Things (IoT), and 5G are upgrading conventional data transfer with innovative solutions and intelligently processing data to improve performance. Fog computing is considered a central component in the growth of the new 5G networks and the Internet of Things. These advanced technologies allow the Internet to provide enhanced services through sensors, continually monitoring a wide range of information. The paper reviews the most recent studies that implemented fog computing in a 5G environment by defining the essential services and network-oriented functionality. Moreover, the surveyed study is also discussed and assessed through sum-up tables with general remarks about the followed trends. The mentioned studies presented legitimate solutions for issues in the Vehicular Network and improved the current network architecture.","PeriodicalId":297211,"journal":{"name":"2022 4th International Conference on Advanced Science and Engineering (ICOASE)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130071602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-21DOI: 10.1109/ICOASE56293.2022.10075586
D. A. Zebari, Dawlat Mustafa Sulaiman, Shereen S. Sadiq, Nechirvan Asaad Zebari, Merdin Shamal Salih
Earlier discovery of COVID-19 through precise diagnosis, particularly in instances with no evident symptoms, may reduce the mortality rate of patients. Chest X-ray images are the primary diagnostic tool for this condition. Patients exhibiting COVID-19 symptoms are causing hospitals to become overcrowded, which is becoming a big concern. The contribution that machine learning has made to big data medical research has been very helpful, opening up new ways to diagnose diseases. This study has developed a machine vision method to identify COVID-19 using X-ray images. The preprocessing stage has been applied to resize images and enhance the quality of X-ray images. The Gray-level co-occurrence matrix (GLCM) and Gray-Level Run Length Matrix (GLRLM) are then used to extract features from the X-ray images, and these features are combined to develop the performance classification via training by Support Vector Machine (SVM). The testing phase evaluated the model's performance using generalized data. This developed feature combination utilizing the GLCM and GLRLM algorithms assured a satisfactory evaluation performance based on COVID-19 detection compared to the immediate, single feature with a testing accuracy of 96.65%, a specificity of 99.54%, and a sensitivity of 97.98%.
{"title":"Automated Detection of Covid-19 from X-ray Using SVM","authors":"D. A. Zebari, Dawlat Mustafa Sulaiman, Shereen S. Sadiq, Nechirvan Asaad Zebari, Merdin Shamal Salih","doi":"10.1109/ICOASE56293.2022.10075586","DOIUrl":"https://doi.org/10.1109/ICOASE56293.2022.10075586","url":null,"abstract":"Earlier discovery of COVID-19 through precise diagnosis, particularly in instances with no evident symptoms, may reduce the mortality rate of patients. Chest X-ray images are the primary diagnostic tool for this condition. Patients exhibiting COVID-19 symptoms are causing hospitals to become overcrowded, which is becoming a big concern. The contribution that machine learning has made to big data medical research has been very helpful, opening up new ways to diagnose diseases. This study has developed a machine vision method to identify COVID-19 using X-ray images. The preprocessing stage has been applied to resize images and enhance the quality of X-ray images. The Gray-level co-occurrence matrix (GLCM) and Gray-Level Run Length Matrix (GLRLM) are then used to extract features from the X-ray images, and these features are combined to develop the performance classification via training by Support Vector Machine (SVM). The testing phase evaluated the model's performance using generalized data. This developed feature combination utilizing the GLCM and GLRLM algorithms assured a satisfactory evaluation performance based on COVID-19 detection compared to the immediate, single feature with a testing accuracy of 96.65%, a specificity of 99.54%, and a sensitivity of 97.98%.","PeriodicalId":297211,"journal":{"name":"2022 4th International Conference on Advanced Science and Engineering (ICOASE)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124539684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-21DOI: 10.1109/ICOASE56293.2022.10075570
Shimal Sh. Taher, S. Ameen, J. A. Ahmed
Over the last decade, worldwide data traffic has risen at an unprecedented rate, prompting a surge in interest in big data. manufacturing, entertainment, and media. With this interest, Blockchain Technology, appeared as a promising technology that enables the transaction record to be continuously stored, protected with the digital signature, and validated by consensus. It operates under the concept of a digital ledger that is distributed. In this article, recent growth in blockchain interest as an alternative to traditional centralized systems has been presented and considered the emerging implementations thereof. In particular, the key approaches needed for the introduction of the blockchain and security issues. This includes the general issue behind the blockchain, description of the component, and the blockchain importance and connection with the big data. Thus, the paper focuses on reviewing the research in blockchain applications in securing big data. The paper compares big data security techniques and mechanisms provided by the blockchain approach considering security attacks that might shed light on Blockchain enthusiasts and researchers. Finally, the paper evaluates the various challenges of blockchain and put some recommendations for future research.
{"title":"Blockchain for Big Data Security, Issues, Challenges and Future Directions","authors":"Shimal Sh. Taher, S. Ameen, J. A. Ahmed","doi":"10.1109/ICOASE56293.2022.10075570","DOIUrl":"https://doi.org/10.1109/ICOASE56293.2022.10075570","url":null,"abstract":"Over the last decade, worldwide data traffic has risen at an unprecedented rate, prompting a surge in interest in big data. manufacturing, entertainment, and media. With this interest, Blockchain Technology, appeared as a promising technology that enables the transaction record to be continuously stored, protected with the digital signature, and validated by consensus. It operates under the concept of a digital ledger that is distributed. In this article, recent growth in blockchain interest as an alternative to traditional centralized systems has been presented and considered the emerging implementations thereof. In particular, the key approaches needed for the introduction of the blockchain and security issues. This includes the general issue behind the blockchain, description of the component, and the blockchain importance and connection with the big data. Thus, the paper focuses on reviewing the research in blockchain applications in securing big data. The paper compares big data security techniques and mechanisms provided by the blockchain approach considering security attacks that might shed light on Blockchain enthusiasts and researchers. Finally, the paper evaluates the various challenges of blockchain and put some recommendations for future research.","PeriodicalId":297211,"journal":{"name":"2022 4th International Conference on Advanced Science and Engineering (ICOASE)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127469751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-21DOI: 10.1109/ICOASE56293.2022.10075587
Nagham Saeed, H. M. Ahmed
The spread of the Corona Virus pandemic on a global scale had a great impact on the trend towards e-learning. In the virtual exams the student can take his exams online without any papers, in addition to the correction and electronic monitoring of the exams. Tests are supervised and controlled by a camera and proven cheat-checking tools. This technology has opened the doors of academic institutions for distance learning to be wide spread without any problems at all. In this paper, a proposed model was built by linking a computer network using a server/client model because it is a system that distributes tasks between the two. The main computer that acts as a server (exam observer) is connected to a group of sub-computers (students) who are being tested and these devices are considered the set of clients. The proposed student face recognition system is run on each computer (client) in order to identify and verify the identity of the student. When another face is detected, the program sends a warning signal to the server. Thus, the concerned student is alerted. This mechanism helps examinees reduce cheating cases in early time. The results obtained from the face recognition showed high accuracy despite the large number of students' faces. The performance speed was in line with the test performance requirements, handling 1,081 real photos and adding 960 photos.
{"title":"Building a Real-Time System to Monitor Students Electronically Based on Digital Images of Face Movement","authors":"Nagham Saeed, H. M. Ahmed","doi":"10.1109/ICOASE56293.2022.10075587","DOIUrl":"https://doi.org/10.1109/ICOASE56293.2022.10075587","url":null,"abstract":"The spread of the Corona Virus pandemic on a global scale had a great impact on the trend towards e-learning. In the virtual exams the student can take his exams online without any papers, in addition to the correction and electronic monitoring of the exams. Tests are supervised and controlled by a camera and proven cheat-checking tools. This technology has opened the doors of academic institutions for distance learning to be wide spread without any problems at all. In this paper, a proposed model was built by linking a computer network using a server/client model because it is a system that distributes tasks between the two. The main computer that acts as a server (exam observer) is connected to a group of sub-computers (students) who are being tested and these devices are considered the set of clients. The proposed student face recognition system is run on each computer (client) in order to identify and verify the identity of the student. When another face is detected, the program sends a warning signal to the server. Thus, the concerned student is alerted. This mechanism helps examinees reduce cheating cases in early time. The results obtained from the face recognition showed high accuracy despite the large number of students' faces. The performance speed was in line with the test performance requirements, handling 1,081 real photos and adding 960 photos.","PeriodicalId":297211,"journal":{"name":"2022 4th International Conference on Advanced Science and Engineering (ICOASE)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128232223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-21DOI: 10.1109/ICOASE56293.2022.10075595
Bana Shekh Faraj, A. Siddiq
This paper is interested in studying the Peak to Average Power Ratio (PAPR) reduction in Orthogonal Frequency Division Multiplexing with Index Modulation (OFDM-IM) system transmitter. PAPR is a common issue in multicarrier transmission techniques which is the result of adding independent multicarrier signals of different peak values on the same phases. The reduction schemes have been diversly examined for classical OFDM and the majority of them can be directly extended to OFDM-IM while some require slight changes to suit the OFDM-IM characteristics. Selective Mapping (SLM), Partial Transmit Sequence (PTS), Tone Reservation (TR), and Peak Insertion (PI) are some examples on the reduction schemes that will be investigated throughout this paper. As for PI, to the best knowledge of the authors is for the first time implemented in OFDM-IM. The system parameters effects, number of total subcarriers(N), number of subblocks (n), the active subcarriers (k), and the activation ratio (r) are studied to gain the lowest PAPR amount possible that reached (1.2 dB) at specified system parameters.
{"title":"Peak to Average Power Ratio Reduction for OFDM with IM System","authors":"Bana Shekh Faraj, A. Siddiq","doi":"10.1109/ICOASE56293.2022.10075595","DOIUrl":"https://doi.org/10.1109/ICOASE56293.2022.10075595","url":null,"abstract":"This paper is interested in studying the Peak to Average Power Ratio (PAPR) reduction in Orthogonal Frequency Division Multiplexing with Index Modulation (OFDM-IM) system transmitter. PAPR is a common issue in multicarrier transmission techniques which is the result of adding independent multicarrier signals of different peak values on the same phases. The reduction schemes have been diversly examined for classical OFDM and the majority of them can be directly extended to OFDM-IM while some require slight changes to suit the OFDM-IM characteristics. Selective Mapping (SLM), Partial Transmit Sequence (PTS), Tone Reservation (TR), and Peak Insertion (PI) are some examples on the reduction schemes that will be investigated throughout this paper. As for PI, to the best knowledge of the authors is for the first time implemented in OFDM-IM. The system parameters effects, number of total subcarriers(N), number of subblocks (n), the active subcarriers (k), and the activation ratio (r) are studied to gain the lowest PAPR amount possible that reached (1.2 dB) at specified system parameters.","PeriodicalId":297211,"journal":{"name":"2022 4th International Conference on Advanced Science and Engineering (ICOASE)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116754366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-21DOI: 10.1109/ICOASE56293.2022.10075573
Roua Muwafaq Younus, Mahmod Ahmed Al Zubaidy, Safwan Hafeedh Younus
Many factors, such as direct spotlights and multipath propagation, contribute to the deterioration of the optical wireless communication (OWC) system's performance in the interior environment. In this study, we look at angle diversity receiver (ADR) that can assist to mitigate these issues by rejecting direct pathways from the spotlights and allowing only reflected rays to reach the receiver. ADR also shortens the distance between the sender and the recipient, resulting in less path loss and delay spread. ADR consists of five photodetectors and each photodetector is directed in a precise direction to improve the system's performance by providing a specified field of view (FOV). Elevation angles are optimized to enhance the signal-to-noise ratio (SNR) by changing the angle in steps. Select the Best (SB) scheme is used to choose the detector with the greatest SNR. The computations are done with the help of the MATLAB program. The ADR's results are compared to the conventional diffuse system's (CDS) results, where the bit error rate (BER), and the delay spread are lowered greatly, and the 3-dB bandwidth of the channel is extended, according to the findings.
{"title":"Angle Diversity Receiver for Indoor Optical Wireless Communication Systems","authors":"Roua Muwafaq Younus, Mahmod Ahmed Al Zubaidy, Safwan Hafeedh Younus","doi":"10.1109/ICOASE56293.2022.10075573","DOIUrl":"https://doi.org/10.1109/ICOASE56293.2022.10075573","url":null,"abstract":"Many factors, such as direct spotlights and multipath propagation, contribute to the deterioration of the optical wireless communication (OWC) system's performance in the interior environment. In this study, we look at angle diversity receiver (ADR) that can assist to mitigate these issues by rejecting direct pathways from the spotlights and allowing only reflected rays to reach the receiver. ADR also shortens the distance between the sender and the recipient, resulting in less path loss and delay spread. ADR consists of five photodetectors and each photodetector is directed in a precise direction to improve the system's performance by providing a specified field of view (FOV). Elevation angles are optimized to enhance the signal-to-noise ratio (SNR) by changing the angle in steps. Select the Best (SB) scheme is used to choose the detector with the greatest SNR. The computations are done with the help of the MATLAB program. The ADR's results are compared to the conventional diffuse system's (CDS) results, where the bit error rate (BER), and the delay spread are lowered greatly, and the 3-dB bandwidth of the channel is extended, according to the findings.","PeriodicalId":297211,"journal":{"name":"2022 4th International Conference on Advanced Science and Engineering (ICOASE)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134006405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-21DOI: 10.1109/ICOASE56293.2022.10075597
Chahrazed Benrebbouh, Sarra Cherbal, Houssem Mansouri, A. Pathan
One of the most popular new technologies today is the Internet of Energy (IoE), which utilizes the Internet for collecting, organizing, optimizing and managing network energy information from various edge devices. In this way, a distributed smart energy infrastructure is developed. As IoE is essentially linked with the Internet, the cyber security concerns for this environment are also significant. Like any other technology connected with the Internet, IoE also is vulnerable to various kinds of attacks and threats. In this paper, we investigate the security issues in Internet of Energy. We study various security techniques proposed or developed for this environment during the recent years and discuss what to expect in the future.
{"title":"Future Security Issues in Internet of Energy","authors":"Chahrazed Benrebbouh, Sarra Cherbal, Houssem Mansouri, A. Pathan","doi":"10.1109/ICOASE56293.2022.10075597","DOIUrl":"https://doi.org/10.1109/ICOASE56293.2022.10075597","url":null,"abstract":"One of the most popular new technologies today is the Internet of Energy (IoE), which utilizes the Internet for collecting, organizing, optimizing and managing network energy information from various edge devices. In this way, a distributed smart energy infrastructure is developed. As IoE is essentially linked with the Internet, the cyber security concerns for this environment are also significant. Like any other technology connected with the Internet, IoE also is vulnerable to various kinds of attacks and threats. In this paper, we investigate the security issues in Internet of Energy. We study various security techniques proposed or developed for this environment during the recent years and discuss what to expect in the future.","PeriodicalId":297211,"journal":{"name":"2022 4th International Conference on Advanced Science and Engineering (ICOASE)","volume":"149 S292","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120850530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-21DOI: 10.1109/ICOASE56293.2022.10075608
L. Mohammed, Salsabeel H. Taha
This work uses green energy to solve the problem of lacking electrical energy in agricultural areas. Thus, it suggests using photovoltaic systems to supply the engines used in irrigation in these areas where the load is variable. In addition, this work uses a three-phase inverter to achieve the lowest possible total harmonic distortion. Furthermore, the motor's torque is fixed at all speeds, while the volt-to-hertz ratio speed control of the induction motor is discussed in this paper. By varying the modulation index of the space-vector-pulse-width, the stator voltage of the induction motor can differ correspondingly. The time duration of gate pulses is changed to maintain the constant voltage-to-hertz ratio. Space-vector-pulse-width-modulation technique delivers the simulation and theoretical analysis. Moreover, PV cells drive the induction motors with a wide speed range. Simulation results were validated with practical outcomes.
{"title":"PV System Based Speed Control of Induction Motor by Space Vector Pulse Width Modulation","authors":"L. Mohammed, Salsabeel H. Taha","doi":"10.1109/ICOASE56293.2022.10075608","DOIUrl":"https://doi.org/10.1109/ICOASE56293.2022.10075608","url":null,"abstract":"This work uses green energy to solve the problem of lacking electrical energy in agricultural areas. Thus, it suggests using photovoltaic systems to supply the engines used in irrigation in these areas where the load is variable. In addition, this work uses a three-phase inverter to achieve the lowest possible total harmonic distortion. Furthermore, the motor's torque is fixed at all speeds, while the volt-to-hertz ratio speed control of the induction motor is discussed in this paper. By varying the modulation index of the space-vector-pulse-width, the stator voltage of the induction motor can differ correspondingly. The time duration of gate pulses is changed to maintain the constant voltage-to-hertz ratio. Space-vector-pulse-width-modulation technique delivers the simulation and theoretical analysis. Moreover, PV cells drive the induction motors with a wide speed range. Simulation results were validated with practical outcomes.","PeriodicalId":297211,"journal":{"name":"2022 4th International Conference on Advanced Science and Engineering (ICOASE)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123593191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}