Ahmed K. Hannan, Zainab A. Kadhum, Anmar K. Ali, Abdelrahman Farghly, Ibtisam K. Hanan
The modular multilevel converters (MMC) utilization has brought about a transformative impact on high voltage direct current (HVDC) transmission relying on voltage-sourced converters (VSC). However, their application in medium-voltage (MV) variable-speed motor drives has not achieved broad acceptance due to the substantial voltage fluctuation in the capacitor, especially at lower frequencies. The present study introduces a hybrid MMC (HMMC) aimed at markedly limiting capacitor voltage fluctuations, particularly during low motor speeds. Vector control was used to achieve the required motor speed. The proposed HMMC validity was confirmed through the MATLAB/ SIMULINK environment. The results were compared with conventional MMC from the standpoint of the capacitor voltage fluctuation at low frequencies.
{"title":"Suppression of the Capacitor Voltage ripple in Modular Multilevel Converter for Variable-Speed Drive Applications","authors":"Ahmed K. Hannan, Zainab A. Kadhum, Anmar K. Ali, Abdelrahman Farghly, Ibtisam K. Hanan","doi":"10.25130/tjes.31.1.6","DOIUrl":"https://doi.org/10.25130/tjes.31.1.6","url":null,"abstract":"The modular multilevel converters (MMC) utilization has brought about a transformative impact on high voltage direct current (HVDC) transmission relying on voltage-sourced converters (VSC). However, their application in medium-voltage (MV) variable-speed motor drives has not achieved broad acceptance due to the substantial voltage fluctuation in the capacitor, especially at lower frequencies. The present study introduces a hybrid MMC (HMMC) aimed at markedly limiting capacitor voltage fluctuations, particularly during low motor speeds. Vector control was used to achieve the required motor speed. The proposed HMMC validity was confirmed through the MATLAB/ SIMULINK environment. The results were compared with conventional MMC from the standpoint of the capacitor voltage fluctuation at low frequencies.","PeriodicalId":30589,"journal":{"name":"Tikrit Journal of Engineering Sciences","volume":"748 ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139841214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ahmed K. Hannan, Zainab A. Kadhum, Anmar K. Ali, Abdelrahman Farghly, Ibtisam K. Hanan
The modular multilevel converters (MMC) utilization has brought about a transformative impact on high voltage direct current (HVDC) transmission relying on voltage-sourced converters (VSC). However, their application in medium-voltage (MV) variable-speed motor drives has not achieved broad acceptance due to the substantial voltage fluctuation in the capacitor, especially at lower frequencies. The present study introduces a hybrid MMC (HMMC) aimed at markedly limiting capacitor voltage fluctuations, particularly during low motor speeds. Vector control was used to achieve the required motor speed. The proposed HMMC validity was confirmed through the MATLAB/ SIMULINK environment. The results were compared with conventional MMC from the standpoint of the capacitor voltage fluctuation at low frequencies.
{"title":"Suppression of the Capacitor Voltage ripple in Modular Multilevel Converter for Variable-Speed Drive Applications","authors":"Ahmed K. Hannan, Zainab A. Kadhum, Anmar K. Ali, Abdelrahman Farghly, Ibtisam K. Hanan","doi":"10.25130/tjes.31.1.6","DOIUrl":"https://doi.org/10.25130/tjes.31.1.6","url":null,"abstract":"The modular multilevel converters (MMC) utilization has brought about a transformative impact on high voltage direct current (HVDC) transmission relying on voltage-sourced converters (VSC). However, their application in medium-voltage (MV) variable-speed motor drives has not achieved broad acceptance due to the substantial voltage fluctuation in the capacitor, especially at lower frequencies. The present study introduces a hybrid MMC (HMMC) aimed at markedly limiting capacitor voltage fluctuations, particularly during low motor speeds. Vector control was used to achieve the required motor speed. The proposed HMMC validity was confirmed through the MATLAB/ SIMULINK environment. The results were compared with conventional MMC from the standpoint of the capacitor voltage fluctuation at low frequencies.","PeriodicalId":30589,"journal":{"name":"Tikrit Journal of Engineering Sciences","volume":"84 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139781294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
For performing an assessment of the volume estimation accuracy using Digital Elevation Models (DEMs) generated by Unmanned Aerial Vehicles (UAVs), an evaluation of suitability has been made. The study was operated at Tikrit University, on a man-made topographic depression in the form of fishponds. The generated DEM by using the images of the UAV followed by accuracy assessment using Ground Control Points (GCPs), the points distributed evenly throughout the pond. The results showed that the Root Mean Square Error (RMSE) calculated for the DEM at the optimum flight plane ranged between 0.14 to 0.45. Comparing the pond's predicted volume utilizing UAV DEMs to the ground truth volume obtained using GNSS RTK surveying, it was discovered that the UAV DEM calculation was 97% accurate. The study came to the conclusion that the UAV Structure from Motion (SFM) method and the generated DEMs are appropriate for precisely surveying the volumes utilizing the appropriate range of flying parameters based on prior knowledge.
为评估使用无人机生成的数字高程模型(DEM)进行体积估算的准确性,对其适用性进行了评估。这项研究是在提克里特大学的一个人工鱼塘地形凹陷处进行的。使用无人机图像生成 DEM,然后使用地面控制点(GCP)进行精度评估,这些点均匀分布在整个池塘中。结果显示,在最佳飞行平面上计算出的 DEM 均方根误差(RMSE)在 0.14 至 0.45 之间。将利用无人机 DEM 预测的池塘体积与利用 GNSS RTK 测量获得的地面实况体积进行比较后发现,无人机 DEM 计算的准确率为 97%。研究得出的结论是,无人机运动结构(SFM)方法和生成的 DEM 适合于利用基于先验知识的适当飞行参数范围精确测量体积。
{"title":"Quantifying the Reliability of Volumetric and Areal Calculation with UAV-Generated DEMs: A Comparative Study with Ground Truth Data","authors":"Ahmed J. Hussein, Sabbar A. Salih","doi":"10.25130/tjes.31.1.5","DOIUrl":"https://doi.org/10.25130/tjes.31.1.5","url":null,"abstract":"For performing an assessment of the volume estimation accuracy using Digital Elevation Models (DEMs) generated by Unmanned Aerial Vehicles (UAVs), an evaluation of suitability has been made. The study was operated at Tikrit University, on a man-made topographic depression in the form of fishponds. The generated DEM by using the images of the UAV followed by accuracy assessment using Ground Control Points (GCPs), the points distributed evenly throughout the pond. The results showed that the Root Mean Square Error (RMSE) calculated for the DEM at the optimum flight plane ranged between 0.14 to 0.45. Comparing the pond's predicted volume utilizing UAV DEMs to the ground truth volume obtained using GNSS RTK surveying, it was discovered that the UAV DEM calculation was 97% accurate. The study came to the conclusion that the UAV Structure from Motion (SFM) method and the generated DEMs are appropriate for precisely surveying the volumes utilizing the appropriate range of flying parameters based on prior knowledge.","PeriodicalId":30589,"journal":{"name":"Tikrit Journal of Engineering Sciences","volume":"92 ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140462127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In electrodialysis, an ion exchange membrane removes unwanted ions from wastewater and toxic metal ions from effluents. Montmorillonite-based modified "polyethersulfone membranes" have been studied as a potential small-scale electrodialysis approach for removing ions from wastewater. The study featured several steps, including solid polymerization, electrolyte balance, and removal of each component from the water. The study used three distinct “cation-exchange membranes (CEM)" types. The selected water body was diluted 100 times before being added to the electrodialysis cell in amounts of the center, cathodic, and anodic chambers, each containing 55, 30, and 40 mL. The initial pH for the real solutions of the water body was 7.16 at 25°C. Compared to "Sulfonated poly arylene ether sulfone (S-PESOS)" (23.23%) and Nafion® (35.34%), "hexamethylenediamine (HEXCl)" stands out as the only cross-linked material with significantly high-water content. When the membrane water content is too high, the membrane may lose its mechanical strength and cannot provide enough ionic conductivity. The semi-empirical model's parameters were estimated to simulate the elimination of Na+, K+, Ca2+, and Mg2+ by three membranes. HEXCl and S-PESOS were electrodialyzed and used to treat the serial dilution from the water with cationics. The removal rate gradually rose after the electrodialysis started.
{"title":"Removal of Monovalent and Divalent Cations from Brine Water by Electrodialysis Using Modified Polyethersulfone Membranes","authors":"Z. A. Khalaf, Sarah S. Mohammed Jawad","doi":"10.25130/tjes.31.1.3","DOIUrl":"https://doi.org/10.25130/tjes.31.1.3","url":null,"abstract":"In electrodialysis, an ion exchange membrane removes unwanted ions from wastewater and toxic metal ions from effluents. Montmorillonite-based modified \"polyethersulfone membranes\" have been studied as a potential small-scale electrodialysis approach for removing ions from wastewater. The study featured several steps, including solid polymerization, electrolyte balance, and removal of each component from the water. The study used three distinct “cation-exchange membranes (CEM)\" types. The selected water body was diluted 100 times before being added to the electrodialysis cell in amounts of the center, cathodic, and anodic chambers, each containing 55, 30, and 40 mL. The initial pH for the real solutions of the water body was 7.16 at 25°C. Compared to \"Sulfonated poly arylene ether sulfone (S-PESOS)\" (23.23%) and Nafion® (35.34%), \"hexamethylenediamine (HEXCl)\" stands out as the only cross-linked material with significantly high-water content. When the membrane water content is too high, the membrane may lose its mechanical strength and cannot provide enough ionic conductivity. The semi-empirical model's parameters were estimated to simulate the elimination of Na+, K+, Ca2+, and Mg2+ by three membranes. HEXCl and S-PESOS were electrodialyzed and used to treat the serial dilution from the water with cationics. The removal rate gradually rose after the electrodialysis started.","PeriodicalId":30589,"journal":{"name":"Tikrit Journal of Engineering Sciences","volume":"8 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140509460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abstract: Image deblurring is a common issue in low-level computer vision aiming to restore a clear image from a blurred input image. Deep learning innovations have significantly advanced the solution to this issue, and numerous deblurring networks have been presented to recover high-quality images. This study aims to investigate the impact of Blind deconvolution and Non-Blind Deconvolution (Weiner Filter, Regularized Filter, and lucky Richardson) deblurring techniques and blind deconvolution to retrieve the original image from the blurring and the noisy images. Point Spread Function (PSF) is required to perform the deconvolution process. MATLAB program is utilized in this study as a suitable tool for image processing. Peak to Signal Ratio (PSNR) and structural index similarity (SSIM) are the major parameters used to examine image quality. The results showed that the Regularized Filter was an effective technique to deblur the blurry image, and it achieved the largest PSNR and best SSIM with the prior information about the PSF for different degrees of blurring angle. These four deblurring techniques were unsuccessful in restoring the original image from the image with Gaussian noise.
{"title":"Blind and Non-Blind Deconvolution-Based Image Deblurring Techniques for Blurred and Noisy Image","authors":"S. W. Nourildean","doi":"10.25130/tjes.31.1.2","DOIUrl":"https://doi.org/10.25130/tjes.31.1.2","url":null,"abstract":"Abstract: Image deblurring is a common issue in low-level computer vision aiming to restore a clear image from a blurred input image. Deep learning innovations have significantly advanced the solution to this issue, and numerous deblurring networks have been presented to recover high-quality images. This study aims to investigate the impact of Blind deconvolution and Non-Blind Deconvolution (Weiner Filter, Regularized Filter, and lucky Richardson) deblurring techniques and blind deconvolution to retrieve the original image from the blurring and the noisy images. Point Spread Function (PSF) is required to perform the deconvolution process. MATLAB program is utilized in this study as a suitable tool for image processing. Peak to Signal Ratio (PSNR) and structural index similarity (SSIM) are the major parameters used to examine image quality. The results showed that the Regularized Filter was an effective technique to deblur the blurry image, and it achieved the largest PSNR and best SSIM with the prior information about the PSF for different degrees of blurring angle. These four deblurring techniques were unsuccessful in restoring the original image from the image with Gaussian noise.","PeriodicalId":30589,"journal":{"name":"Tikrit Journal of Engineering Sciences","volume":" 19","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139628327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kian Raheem Qasim, Yousif Al Mashhadany, E. T. Yassen
For the first time, dual-performance perfection technologies were used to kinematically operate sophisticated robots. In this study, the trajectory development of a robot arm is optimized using a dual-performance perfection technique. The proposed approach alters the robot arm's Kinematics by creating virtual points even if the robotic system is not redundant to make it kinematically suitable for biomedical applications. In the suggested method, an appropriate objective function is chosen to raise one or maybe more performance measures while lowering one or more kinematic characteristics of a robot arm. The robot arm's end effector is set in place at the crucial locations, and the dual performance precision algorithm changes the joints and virtual points due to the robot arm's self-motion. As a result, the ideal values for the virtual points are established, and the robot arm's design is changed. Accordingly, this method's ability to visualize modifications made to the processor's design during the optimization problem is one of its benefits. The active robotic arm is used as a case study in this article. The task is defined as choosing the best path based on the input target's position and direction and is used in X-ray robot systems. The outcomes demonstrate the viability of the suggested approach and can serve as a useful prototype for an intelligent X-ray robot.
双性能完善技术首次被用于复杂机器人的运动学操作。在这项研究中,使用双性能完善技术对机械臂的轨迹发展进行了优化。即使机器人系统没有冗余,建议的方法也能通过创建虚拟点来改变机械臂的运动学,使其在运动学上适合生物医学应用。在建议的方法中,选择一个适当的目标函数来提高一个或多个性能指标,同时降低机械臂的一个或多个运动学特性。机器人手臂的末端效应器设置在关键位置,双性能精度算法会因机器人手臂的自我运动而改变关节和虚拟点。因此,虚拟点的理想值得以确定,机械臂的设计也随之改变。因此,这种方法的优点之一是能够直观地显示在优化问题过程中对处理器设计所做的修改。本文以主动机械臂为案例进行研究。该任务被定义为根据输入目标的位置和方向选择最佳路径,可用于 X 射线机器人系统。研究结果证明了所建议方法的可行性,并可作为智能 X 射线机器人的有用原型。
{"title":"Dual Performance Optimization of 6-DOF Robotic Arm Trajectories in Biomedical Applications","authors":"Kian Raheem Qasim, Yousif Al Mashhadany, E. T. Yassen","doi":"10.25130/tjes.31.1.1","DOIUrl":"https://doi.org/10.25130/tjes.31.1.1","url":null,"abstract":"For the first time, dual-performance perfection technologies were used to kinematically operate sophisticated robots. In this study, the trajectory development of a robot arm is optimized using a dual-performance perfection technique. The proposed approach alters the robot arm's Kinematics by creating virtual points even if the robotic system is not redundant to make it kinematically suitable for biomedical applications. In the suggested method, an appropriate objective function is chosen to raise one or maybe more performance measures while lowering one or more kinematic characteristics of a robot arm. The robot arm's end effector is set in place at the crucial locations, and the dual performance precision algorithm changes the joints and virtual points due to the robot arm's self-motion. As a result, the ideal values for the virtual points are established, and the robot arm's design is changed. Accordingly, this method's ability to visualize modifications made to the processor's design during the optimization problem is one of its benefits. The active robotic arm is used as a case study in this article. The task is defined as choosing the best path based on the input target's position and direction and is used in X-ray robot systems. The outcomes demonstrate the viability of the suggested approach and can serve as a useful prototype for an intelligent X-ray robot.","PeriodicalId":30589,"journal":{"name":"Tikrit Journal of Engineering Sciences","volume":"14 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139630666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ahamd Khader Habboush, Bassam Mohammed Elzaghmouri, B. K. Pattanayak, Saumendra Pattnaik, Rami Ahmad Habboush
The Internet of Things (IoT) technology has recently emerged as a potential global communication medium that efficiently facilitates human-to-human, human-to-machine, and machine-to-machine communications. Most importantly, unlike the traditional Internet, it supports machine-to-machine communication without human intervention. However, billions of devices connected to the IoT environment are mostly wireless, small, hand-held, and resourced-constrained devices with limited storage capacities. Such devices are highly prone to external attacks. These days, cybercriminals often attempt to launch attacks on these devices, which imposes the major challenge of efficiently implementing communications across the IoT environment. In this paper, the issue of cyber-attacks in the IoT environment is addressed. An end-to-end encryption scheme was proposed to protect IoT devices from cyber-attacks.
{"title":"An End-to-End Security Scheme for Protection from Cyber Attacks on Internet of Things (IoT) Environment","authors":"Ahamd Khader Habboush, Bassam Mohammed Elzaghmouri, B. K. Pattanayak, Saumendra Pattnaik, Rami Ahmad Habboush","doi":"10.25130/tjes.30.4.16","DOIUrl":"https://doi.org/10.25130/tjes.30.4.16","url":null,"abstract":"The Internet of Things (IoT) technology has recently emerged as a potential global communication medium that efficiently facilitates human-to-human, human-to-machine, and machine-to-machine communications. Most importantly, unlike the traditional Internet, it supports machine-to-machine communication without human intervention. However, billions of devices connected to the IoT environment are mostly wireless, small, hand-held, and resourced-constrained devices with limited storage capacities. Such devices are highly prone to external attacks. These days, cybercriminals often attempt to launch attacks on these devices, which imposes the major challenge of efficiently implementing communications across the IoT environment. In this paper, the issue of cyber-attacks in the IoT environment is addressed. An end-to-end encryption scheme was proposed to protect IoT devices from cyber-attacks.","PeriodicalId":30589,"journal":{"name":"Tikrit Journal of Engineering Sciences","volume":"26 12","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139171271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents a direct algorithm for fast real discrete Fourier transform (RDFT) computing, using the discrete Fourier transform (DFT) conjugate symmetric property to reduce redundancies. In RDFT, all the input and output signals were real, which differed from complex DFT. Therefore, the structure of the proposed algorithm showed only real-data operations. The developed algorithm showed the desired properties, such as in-place computation, regularity, simplicity, and arithmetic operations reduction. The RFFT performance was compared with other related transforms, such as the fast Hartley transform (FHT) for the computation in the radix-2 algorithm. It was found that FHT showed the best performance in terms of arithmetic complexity.
{"title":"New Algorithm for Real-Valued Fourier Transform","authors":"Sukaina K. Salih, M. Hamood","doi":"10.25130/tjes.30.4.13","DOIUrl":"https://doi.org/10.25130/tjes.30.4.13","url":null,"abstract":"This paper presents a direct algorithm for fast real discrete Fourier transform (RDFT) computing, using the discrete Fourier transform (DFT) conjugate symmetric property to reduce redundancies. In RDFT, all the input and output signals were real, which differed from complex DFT. Therefore, the structure of the proposed algorithm showed only real-data operations. The developed algorithm showed the desired properties, such as in-place computation, regularity, simplicity, and arithmetic operations reduction. The RFFT performance was compared with other related transforms, such as the fast Hartley transform (FHT) for the computation in the radix-2 algorithm. It was found that FHT showed the best performance in terms of arithmetic complexity.","PeriodicalId":30589,"journal":{"name":"Tikrit Journal of Engineering Sciences","volume":"54 1-2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139185397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abstract: This paper introduces the mathematical model of the leader-follower electric vehicle (EV). Consequently, the system was analyzed to obtain stability and performance. Model Predictive Control (MPC) is also proposed to fix the EV system issues. Moreover, two optimization algorithms are applied to optimize the performance of the MPC: electrically charged particle optimization (ECPO) and improved chaotic electromagnetic field optimization (ICEFO). The MPC scheme is based on the Adaptive Cruise Control System (ACCS), applied to two vehicles: the leader and follower. In this context, the simulation results of both optimization methods with the MPC scheme are presented in the result section. Finally, a comparison is made to show the proposed controller’s effectiveness with the improved optimization algorithms. Also, the ACC electric vehicle tracking system was achieved at 98% with the reference input.
{"title":"Model Predictive Control Design for Electric Vehicle Based on Improved Physics-Inspired Optimization Algorithms","authors":"M. S. Alkreem, N. H. Abbas","doi":"10.25130/tjes.30.4.12","DOIUrl":"https://doi.org/10.25130/tjes.30.4.12","url":null,"abstract":"Abstract: This paper introduces the mathematical model of the leader-follower electric vehicle (EV). Consequently, the system was analyzed to obtain stability and performance. Model Predictive Control (MPC) is also proposed to fix the EV system issues. Moreover, two optimization algorithms are applied to optimize the performance of the MPC: electrically charged particle optimization (ECPO) and improved chaotic electromagnetic field optimization (ICEFO). The MPC scheme is based on the Adaptive Cruise Control System (ACCS), applied to two vehicles: the leader and follower. In this context, the simulation results of both optimization methods with the MPC scheme are presented in the result section. Finally, a comparison is made to show the proposed controller’s effectiveness with the improved optimization algorithms. Also, the ACC electric vehicle tracking system was achieved at 98% with the reference input.","PeriodicalId":30589,"journal":{"name":"Tikrit Journal of Engineering Sciences","volume":"24 8","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139186473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cooperative None Orthogonal Multiple Access (C-NOMA) is a promising approach for 5G and beyond communication networks. Users will benefit from the full bandwidth of the channel without time constraints. NOMA’s features are incomplete without efficient power allocation that ensures power distribution among users fairly. Integrating power management (allocation) with Cooperative-NOMA (C-NOMA) may improve the system metrics. In addition, a physical layer security (PLS) is added to make the process of sending and receiving safe, and the system works in an integrated manner, preventing any interrupting or eavesdropping inside or outside the network. This paper demonstrates the user and channel performance of C-NOMA with Amplify-and-forward (AF) and Decode-and-forward (DF) approaches. The analysis is performed by varying the power allocation techniques to derive the best system configurations. The simulation results confirmed the analytic findings and showed that the proposed system outperforms orthogonal multiple access (OMA), conventional NOMA, and conventional cooperative NOMA, enhancing the performance metrics in terms of throughput, sum rate, and outage probability. The bit-error-rate (BER) of the far user can be identical to that of the near user if power allocation is properly set. All techniques excelled except for the fixed power allocation, which had the same BER. The Channel capacity and outage probability were also considered. A slight variation in the channel capacity in all the experiments for different numbers of users was found. The generalized power allocation for AF and DF models had the optimum channel capacity close to 14 bps/Hz. Moreover, far users always had a higher outage probability than near users and channels, and generalized power allocation was the highest outage probability technique when the transmit power was close to (4 dB).
{"title":"Performance Analysis of Cooperative NOMA for Different Power Allocation Strategies","authors":"S. H. Saeed, Ibrahim Khalil Sileh","doi":"10.25130/tjes.30.4.11","DOIUrl":"https://doi.org/10.25130/tjes.30.4.11","url":null,"abstract":"Cooperative None Orthogonal Multiple Access (C-NOMA) is a promising approach for 5G and beyond communication networks. Users will benefit from the full bandwidth of the channel without time constraints. NOMA’s features are incomplete without efficient power allocation that ensures power distribution among users fairly. Integrating power management (allocation) with Cooperative-NOMA (C-NOMA) may improve the system metrics. In addition, a physical layer security (PLS) is added to make the process of sending and receiving safe, and the system works in an integrated manner, preventing any interrupting or eavesdropping inside or outside the network. This paper demonstrates the user and channel performance of C-NOMA with Amplify-and-forward (AF) and Decode-and-forward (DF) approaches. The analysis is performed by varying the power allocation techniques to derive the best system configurations. The simulation results confirmed the analytic findings and showed that the proposed system outperforms orthogonal multiple access (OMA), conventional NOMA, and conventional cooperative NOMA, enhancing the performance metrics in terms of throughput, sum rate, and outage probability. The bit-error-rate (BER) of the far user can be identical to that of the near user if power allocation is properly set. All techniques excelled except for the fixed power allocation, which had the same BER. The Channel capacity and outage probability were also considered. A slight variation in the channel capacity in all the experiments for different numbers of users was found. The generalized power allocation for AF and DF models had the optimum channel capacity close to 14 bps/Hz. Moreover, far users always had a higher outage probability than near users and channels, and generalized power allocation was the highest outage probability technique when the transmit power was close to (4 dB).","PeriodicalId":30589,"journal":{"name":"Tikrit Journal of Engineering Sciences","volume":"161 1-3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139194871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}