Pub Date : 2016-05-09DOI: 10.1109/AIC-MITCSA.2016.7759906
A. I. Majeed, A. Ali
Building successful applications using mimicked robotic fish required a comprehensive study to the various parameters affecting fish's performance during swimming in water, such as thrusting force, swimming speed, manoeuvrability, etc. during various swimming behaviour including straight swimming, c-turn escape and s-shape maneuver. The high complexity of the underwater environments pushed the researchers to find new techniques for underwater robots modelling. Among these techniques, video model prediction technique plays an important role in describing the rules covering the relationships between the fish and its environment. This paper introduces an experimental method to model and then simulate, using Matlab, the main swimming modes of a carangiform Carp fish swimming based on the continuous video monitoring. The suggested models may be used in the future to build and control a real counterpart robotic fish and to produce the important autonomous navigation commands that govern the robotic fish locomotion. The realistic results of fish swimming simulation prove the validity of suggested models.
{"title":"Fish locomotion modeling and simulation based on carp fish monitoring","authors":"A. I. Majeed, A. Ali","doi":"10.1109/AIC-MITCSA.2016.7759906","DOIUrl":"https://doi.org/10.1109/AIC-MITCSA.2016.7759906","url":null,"abstract":"Building successful applications using mimicked robotic fish required a comprehensive study to the various parameters affecting fish's performance during swimming in water, such as thrusting force, swimming speed, manoeuvrability, etc. during various swimming behaviour including straight swimming, c-turn escape and s-shape maneuver. The high complexity of the underwater environments pushed the researchers to find new techniques for underwater robots modelling. Among these techniques, video model prediction technique plays an important role in describing the rules covering the relationships between the fish and its environment. This paper introduces an experimental method to model and then simulate, using Matlab, the main swimming modes of a carangiform Carp fish swimming based on the continuous video monitoring. The suggested models may be used in the future to build and control a real counterpart robotic fish and to produce the important autonomous navigation commands that govern the robotic fish locomotion. The realistic results of fish swimming simulation prove the validity of suggested models.","PeriodicalId":315179,"journal":{"name":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122446002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-09DOI: 10.1109/AIC-MITCSA.2016.7759935
Alaa Kadhim, Rand Mahmoud Mohamed
Visual cryptography is proposed in 1994 by Naor and Shamir who introduced a simple but perfectly secure way that allows secret sharing without any complex cryptographic computation, which they termed as Visual Cryptography Scheme. This proposal shows a new visual cryptography for color image by proposing special table for both IP and IP-1 in a way to increase the diffusion then putting the plain image into blocks each block represent share after applying encryption algorithm on it, The outcome of these operations nine shares, some of blocks encrypted by using RSA algorithm so other blocks encrypted by AlGamal algorithm, producing multiple shares in order to increase security for image during transferring it over the network. This proposed system can be used in medical imaging, financial and military fields.
{"title":"Visual cryptography for image depend on RSA & AlGamal algorithms","authors":"Alaa Kadhim, Rand Mahmoud Mohamed","doi":"10.1109/AIC-MITCSA.2016.7759935","DOIUrl":"https://doi.org/10.1109/AIC-MITCSA.2016.7759935","url":null,"abstract":"Visual cryptography is proposed in 1994 by Naor and Shamir who introduced a simple but perfectly secure way that allows secret sharing without any complex cryptographic computation, which they termed as Visual Cryptography Scheme. This proposal shows a new visual cryptography for color image by proposing special table for both IP and IP-1 in a way to increase the diffusion then putting the plain image into blocks each block represent share after applying encryption algorithm on it, The outcome of these operations nine shares, some of blocks encrypted by using RSA algorithm so other blocks encrypted by AlGamal algorithm, producing multiple shares in order to increase security for image during transferring it over the network. This proposed system can be used in medical imaging, financial and military fields.","PeriodicalId":315179,"journal":{"name":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125274483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-09DOI: 10.1109/AIC-MITCSA.2016.7759938
A. Altaee, H. K. Hoomod, Khalid Ali Hussein
The root-finding problem is one of the most important computational problems and applications. In this paper we introduced the modify artificial neural network is represented depending on radial basis function networks which have been three layers: input layer, hidden layer and output layer, where the hidden layer based on Gaussian function, these neural network techniques are developed to obtain the real approximate roots of single nonlinear equation with high accurate ratio. This modify RBFNN was used to proposed parallel environment for several intervals to compute approximate real roots.
{"title":"Parallel radial basis function neural networks to solve the polynomials equations","authors":"A. Altaee, H. K. Hoomod, Khalid Ali Hussein","doi":"10.1109/AIC-MITCSA.2016.7759938","DOIUrl":"https://doi.org/10.1109/AIC-MITCSA.2016.7759938","url":null,"abstract":"The root-finding problem is one of the most important computational problems and applications. In this paper we introduced the modify artificial neural network is represented depending on radial basis function networks which have been three layers: input layer, hidden layer and output layer, where the hidden layer based on Gaussian function, these neural network techniques are developed to obtain the real approximate roots of single nonlinear equation with high accurate ratio. This modify RBFNN was used to proposed parallel environment for several intervals to compute approximate real roots.","PeriodicalId":315179,"journal":{"name":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","volume":"391 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134430645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-09DOI: 10.1109/AIC-MITCSA.2016.7759901
Mushtaq A. Alqaisy, Mahmoud T. Yassen, F. S. Khalifa, A. Salim
A Filter block has been highly attention due to it's highly importance in wireless communication systems. High harmonic level normally companies with the performance of the filter block. The use of both low-pass or band-stop filter and the step-impedance lines methods to reduce the spurious characteristics of the filter are not a practical solutions since that adds more complexity and large in size. On the other hand, multiband components are preferable in most modern wireless system applications. In this paper, a single unit cell of a complementary split ring resonator designed on the ground plane of the conventional five pole bandpass filter has been proposed and considered as more practical method to excite the second bandpass frequency band and to solve the important filter problem in terms of third order harmonic characteristic suppression (3fo). The final structure has been simulated using the CST Microwave Studio. The simulated result for the proposed construction was extracted and displayed together with the measured result of the conventional five pole prototype structure. The outputs showed good agreement between them also return loss enhancement is very clear through the combination between the complementary split ring resonators and band pass filter. Other advantages no complexity adds, and low in effective cost.
{"title":"A dual-band bandpass filter using single unit cell of complementary split ring resonator with third harmonic reduction","authors":"Mushtaq A. Alqaisy, Mahmoud T. Yassen, F. S. Khalifa, A. Salim","doi":"10.1109/AIC-MITCSA.2016.7759901","DOIUrl":"https://doi.org/10.1109/AIC-MITCSA.2016.7759901","url":null,"abstract":"A Filter block has been highly attention due to it's highly importance in wireless communication systems. High harmonic level normally companies with the performance of the filter block. The use of both low-pass or band-stop filter and the step-impedance lines methods to reduce the spurious characteristics of the filter are not a practical solutions since that adds more complexity and large in size. On the other hand, multiband components are preferable in most modern wireless system applications. In this paper, a single unit cell of a complementary split ring resonator designed on the ground plane of the conventional five pole bandpass filter has been proposed and considered as more practical method to excite the second bandpass frequency band and to solve the important filter problem in terms of third order harmonic characteristic suppression (3fo). The final structure has been simulated using the CST Microwave Studio. The simulated result for the proposed construction was extracted and displayed together with the measured result of the conventional five pole prototype structure. The outputs showed good agreement between them also return loss enhancement is very clear through the combination between the complementary split ring resonators and band pass filter. Other advantages no complexity adds, and low in effective cost.","PeriodicalId":315179,"journal":{"name":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125570013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-09DOI: 10.1109/AIC-MITCSA.2016.7759917
Salam Al-augby, Sebastian Majewski, K. Nermend, A. Majewska
This work aims to design a proposed decision support system (DSS) for helping investors in making investment decision by using rule text-mining based algorithm to analyze news headline and implement analyzing pro-gram based on a manual analyzed headlines. The news analysis program (NAP) was used as an important stage in making investment decision on sample of the Gulf Cooperation Council (GCC) stock markets using Alarabia.net and Reuters.com which treated as a source of media noise that has an influence on the value of stock quoted stock market. The second kind of data that proposed to use in this system is the financial data of GCC stock market. The resulted data can be used in further steps to make better understanding of stock market companies behavior such as the statistical, data mining calculation for choosing the best period of time that give the best reaction of stock market ratios to the news indicators and using the vector measure construction method (VMCM) for classifying companies according to their response to the news.
{"title":"Proposed investment decision support system for stock exchange using text mining method","authors":"Salam Al-augby, Sebastian Majewski, K. Nermend, A. Majewska","doi":"10.1109/AIC-MITCSA.2016.7759917","DOIUrl":"https://doi.org/10.1109/AIC-MITCSA.2016.7759917","url":null,"abstract":"This work aims to design a proposed decision support system (DSS) for helping investors in making investment decision by using rule text-mining based algorithm to analyze news headline and implement analyzing pro-gram based on a manual analyzed headlines. The news analysis program (NAP) was used as an important stage in making investment decision on sample of the Gulf Cooperation Council (GCC) stock markets using Alarabia.net and Reuters.com which treated as a source of media noise that has an influence on the value of stock quoted stock market. The second kind of data that proposed to use in this system is the financial data of GCC stock market. The resulted data can be used in further steps to make better understanding of stock market companies behavior such as the statistical, data mining calculation for choosing the best period of time that give the best reaction of stock market ratios to the news indicators and using the vector measure construction method (VMCM) for classifying companies according to their response to the news.","PeriodicalId":315179,"journal":{"name":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133182387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-09DOI: 10.1109/AIC-MITCSA.2016.7759914
S. M. Ali, S. Salman
The expected increase in world population requires a redoubling of efforts to increase agricultural yields including rice crop which is the main food of many countries of the world and in particular the countries of the Middle East. Therefore, estimating the size of the agricultural yield should be one of the first tasks of governments in the promotion of research to achieve food security and to study the obstacles resulting from environmental degradation. The Vegetation Indices (VIs) and the Tasseled Cap Transformation (TCT) features are particularly used to evaluate the presence and condition of vegetation, using satellite images. In this paper, new classification will introduced to harness these features to calculate the acreage of rice and compare them with the declared areas by the Ministry of Agriculture to make sure of their precisions. Typically, rice cultivation begins in the study area (Najaf Province) in mid-June and up to the top of the vegetative phase after 3 to 3.5 months (i.e. between September and October), then up to the harvest stage in thirty days (i.e. November). So, the present research will use Landsat-8 (Operational Land Imager OLI) images captured in September for the years 2013 and 2014 to ensure the validity of measurements. Among the many algorithms which have been developed for monitoring the biophysical characteristics of vegetation, only two of the six features of TCT (i.e. Brightness and Greenness have been adopted to use because they spectrally behave similarly like the Red and Infrared bands of the OLI images.
预期的世界人口增加要求加倍努力提高农业产量,包括作为世界上许多国家,特别是中东国家的主要粮食的水稻作物。因此,估计农业产量的大小应该是政府在促进研究以实现粮食安全和研究环境退化造成的障碍时的首要任务之一。植被指数(VIs)和流苏帽变换(TCT)特征特别用于利用卫星图像评估植被的存在和状况。本文将引入新的分类方法,利用这些特征来计算水稻种植面积,并与农业部公布的面积进行比较,以确保其精度。通常,研究地区(纳杰夫省)的水稻种植始于6月中旬,3至3.5个月后(即9月至10月之间)进入营养阶段的顶端,然后在30天内(即11月)进入收获阶段。因此,本研究将使用2013年和2014年9月拍摄的Landsat-8 (Operational Land Imager OLI)图像来确保测量的有效性。在已经开发的用于监测植被生物物理特征的许多算法中,由于TCT的六个特征(即亮度和绿色)在光谱上的行为与OLI图像的红色和红外波段相似,因此只有两个特征(即亮度和绿色)被采用。
{"title":"Landsat-8 (OLI) classification method based on tasseled cap transformation features","authors":"S. M. Ali, S. Salman","doi":"10.1109/AIC-MITCSA.2016.7759914","DOIUrl":"https://doi.org/10.1109/AIC-MITCSA.2016.7759914","url":null,"abstract":"The expected increase in world population requires a redoubling of efforts to increase agricultural yields including rice crop which is the main food of many countries of the world and in particular the countries of the Middle East. Therefore, estimating the size of the agricultural yield should be one of the first tasks of governments in the promotion of research to achieve food security and to study the obstacles resulting from environmental degradation. The Vegetation Indices (VIs) and the Tasseled Cap Transformation (TCT) features are particularly used to evaluate the presence and condition of vegetation, using satellite images. In this paper, new classification will introduced to harness these features to calculate the acreage of rice and compare them with the declared areas by the Ministry of Agriculture to make sure of their precisions. Typically, rice cultivation begins in the study area (Najaf Province) in mid-June and up to the top of the vegetative phase after 3 to 3.5 months (i.e. between September and October), then up to the harvest stage in thirty days (i.e. November). So, the present research will use Landsat-8 (Operational Land Imager OLI) images captured in September for the years 2013 and 2014 to ensure the validity of measurements. Among the many algorithms which have been developed for monitoring the biophysical characteristics of vegetation, only two of the six features of TCT (i.e. Brightness and Greenness have been adopted to use because they spectrally behave similarly like the Red and Infrared bands of the OLI images.","PeriodicalId":315179,"journal":{"name":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121062367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-09DOI: 10.1109/AIC-MITCSA.2016.7759934
Tareq Emad Ali, Layth A. Khalil al Dulaimi, Yamaan E. Majeed
In this paper a fast review and comparative study of the adhoc routing protocols used in VANET will be presented. The research filed in Vehicular adhoc network (VANET) is developing very fast. An extensive variety of utilizations has been served under various situation (Highway, urban, and Cities). Many protocols have been adopted to serve different topology and scenarios, these protocols faced various challenges. VANETs provide communication between vehicles moving on the roads. The routing protocols in VANET are affected by the vehicle high speed which leads to frequently link breaks between the communicated vehicles, so the adhoc routing protocols are adapted with the VANET characteristics to deliver the data between vehicles in short time. The main goal of VANET is to assemble a data system among vehicles that are moving on the roads, which enables the vehicles to communicate with each other for the safety manners. In this paper, an endeavor has been made to compare six surely understood protocols AODV, DSR, OLSR, DSDV, ZRP and DSDV. Used in VANET from the (packet deliver ratio, end to end delay, throughput, routing algorithm load, received packets, routing packets, dropped packets, ratio of packet loss, Average Jitter) point of view.
{"title":"Review and performance comparison of VANET protocols: AODV, DSR, OLSR, DYMO, DSDV & ZRP","authors":"Tareq Emad Ali, Layth A. Khalil al Dulaimi, Yamaan E. Majeed","doi":"10.1109/AIC-MITCSA.2016.7759934","DOIUrl":"https://doi.org/10.1109/AIC-MITCSA.2016.7759934","url":null,"abstract":"In this paper a fast review and comparative study of the adhoc routing protocols used in VANET will be presented. The research filed in Vehicular adhoc network (VANET) is developing very fast. An extensive variety of utilizations has been served under various situation (Highway, urban, and Cities). Many protocols have been adopted to serve different topology and scenarios, these protocols faced various challenges. VANETs provide communication between vehicles moving on the roads. The routing protocols in VANET are affected by the vehicle high speed which leads to frequently link breaks between the communicated vehicles, so the adhoc routing protocols are adapted with the VANET characteristics to deliver the data between vehicles in short time. The main goal of VANET is to assemble a data system among vehicles that are moving on the roads, which enables the vehicles to communicate with each other for the safety manners. In this paper, an endeavor has been made to compare six surely understood protocols AODV, DSR, OLSR, DSDV, ZRP and DSDV. Used in VANET from the (packet deliver ratio, end to end delay, throughput, routing algorithm load, received packets, routing packets, dropped packets, ratio of packet loss, Average Jitter) point of view.","PeriodicalId":315179,"journal":{"name":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125471411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-09DOI: 10.1109/AIC-MITCSA.2016.7759907
I. Abed, S. P. Koh, K. Sahari, S. Tiong, Hameed A. Younis, Ali A. Abed
The Pendulum-like algorithm is based on the concepts of the pendulum. All the ideas that are derived have been embedded into the suggested method. The Pendulum-like algorithm introduced, is expected to provide very good results in solving the optimization problems. This is due to the fact that Pendulum-like algorithm is a method with directed force which is reduced gradually with approximation to the global solution and it also uses the idea of back and forth movement to enhance the solution. Thus, the Pendulum-like algorithm would be integrated with the attraction-repulsion mechanism to introduce a very promising problem solving algorithm. The parameters of the proposed algorithm are evaluated and tested to prove the effect of each one on the algorithm. Also, the results of the algorithm are simulated the same behavior for the parameters of physical pendulum.
{"title":"Pendulum-like algorithm as a local search technique","authors":"I. Abed, S. P. Koh, K. Sahari, S. Tiong, Hameed A. Younis, Ali A. Abed","doi":"10.1109/AIC-MITCSA.2016.7759907","DOIUrl":"https://doi.org/10.1109/AIC-MITCSA.2016.7759907","url":null,"abstract":"The Pendulum-like algorithm is based on the concepts of the pendulum. All the ideas that are derived have been embedded into the suggested method. The Pendulum-like algorithm introduced, is expected to provide very good results in solving the optimization problems. This is due to the fact that Pendulum-like algorithm is a method with directed force which is reduced gradually with approximation to the global solution and it also uses the idea of back and forth movement to enhance the solution. Thus, the Pendulum-like algorithm would be integrated with the attraction-repulsion mechanism to introduce a very promising problem solving algorithm. The parameters of the proposed algorithm are evaluated and tested to prove the effect of each one on the algorithm. Also, the results of the algorithm are simulated the same behavior for the parameters of physical pendulum.","PeriodicalId":315179,"journal":{"name":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129168365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-09DOI: 10.1109/AIC-MITCSA.2016.7759916
T. Jamel
This paper presents a new study of the performance evaluation of Fast Euclidean Direction Search (FEDS) adaptive beamforming algorithm for mobile communications application. The performance evaluation focuses on the effect of window length parameter (L) of the FEDS algorithm on the FEDS performance in terms of interference suppression capability, Mean Square coefficients Deviation (MSD), and Mean Square Error (MSE). The performance evaluation was evaluated in an Additive White Gaussian Noise (AWGN) model. Moreover, the performance evaluation was carried out using other adaptive algorithms beside the FEDS. These are LMS, NLMS, and RLS algorithms. The simulation results of adaptive beamforming with eight elements in the array showed that the best window length parameter (L) is ten and when the window length parameter (L) has increased more than ten or less, then the performance begins to deteriorate. In addition, the FEDS had better performance in terms of interference suppression capability, minimum Mean Square coefficients Deviation (MSD) and minimum Mean Square Error (MSE) compared with LMS, NLMS algorithms and similar to the RLS algorithm.
{"title":"Performance evaluation of the fast euclidean direction search algorithm for adaptive beamforming applications","authors":"T. Jamel","doi":"10.1109/AIC-MITCSA.2016.7759916","DOIUrl":"https://doi.org/10.1109/AIC-MITCSA.2016.7759916","url":null,"abstract":"This paper presents a new study of the performance evaluation of Fast Euclidean Direction Search (FEDS) adaptive beamforming algorithm for mobile communications application. The performance evaluation focuses on the effect of window length parameter (L) of the FEDS algorithm on the FEDS performance in terms of interference suppression capability, Mean Square coefficients Deviation (MSD), and Mean Square Error (MSE). The performance evaluation was evaluated in an Additive White Gaussian Noise (AWGN) model. Moreover, the performance evaluation was carried out using other adaptive algorithms beside the FEDS. These are LMS, NLMS, and RLS algorithms. The simulation results of adaptive beamforming with eight elements in the array showed that the best window length parameter (L) is ten and when the window length parameter (L) has increased more than ten or less, then the performance begins to deteriorate. In addition, the FEDS had better performance in terms of interference suppression capability, minimum Mean Square coefficients Deviation (MSD) and minimum Mean Square Error (MSE) compared with LMS, NLMS algorithms and similar to the RLS algorithm.","PeriodicalId":315179,"journal":{"name":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131494429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-09DOI: 10.1109/AIC-MITCSA.2016.7759908
K. A. Abbas, Haroutuon A. Hairik
The modelling of sliding mode (SM) based controlled DC-DC buck-boost converter operating in continuous conduction mode (CCM) with pulse-width modulation (PWM) based is represented in this paper. The model is simulated by Matlab/Simulink software package. The system is modelled and the SM equations for the PWM implementation are illustrated. The performances of the system are tested for the static and dynamic performance is investigated. The simulation results show good and accepted values for voltage regulation which makes the model suitable for common DC-DC conversion purposes.
{"title":"Checking the robustness of a PWM sliding mode controlled DC/DC buck-boost converter using its Matlab/Simulink model","authors":"K. A. Abbas, Haroutuon A. Hairik","doi":"10.1109/AIC-MITCSA.2016.7759908","DOIUrl":"https://doi.org/10.1109/AIC-MITCSA.2016.7759908","url":null,"abstract":"The modelling of sliding mode (SM) based controlled DC-DC buck-boost converter operating in continuous conduction mode (CCM) with pulse-width modulation (PWM) based is represented in this paper. The model is simulated by Matlab/Simulink software package. The system is modelled and the SM equations for the PWM implementation are illustrated. The performances of the system are tested for the static and dynamic performance is investigated. The simulation results show good and accepted values for voltage regulation which makes the model suitable for common DC-DC conversion purposes.","PeriodicalId":315179,"journal":{"name":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116127455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}