Pub Date : 2016-05-01DOI: 10.1109/AIC-MITCSA.2016.7759932
Mohammad Hameed Khazaal, Isam M. Abdulbaqi, R. Thejel
This research deals with the design and simulation of induction furnace power source (inverter) using MATLAB package. This source designed to lock on the resonant frequency of the load by using self-oscillating technique, also it has the capability to control the power supplied to the load using phase shift pulse width modulation (PSPWM) technique. These characteristics used to overcome the load nonlinear behavior during the brazing process and to achieve soft switching of the inverter elements. Also, the inverter has the capability to operate with or without load (workpiece). The implemented prototype operates at a frequency range (50-100)kHz and 10kW was successfully used for brazing two copper workpieces.
{"title":"Design, simulation and implementation of a self-oscillating control circuit to drive series resonant inverter feeding a brazing induction furnace","authors":"Mohammad Hameed Khazaal, Isam M. Abdulbaqi, R. Thejel","doi":"10.1109/AIC-MITCSA.2016.7759932","DOIUrl":"https://doi.org/10.1109/AIC-MITCSA.2016.7759932","url":null,"abstract":"This research deals with the design and simulation of induction furnace power source (inverter) using MATLAB package. This source designed to lock on the resonant frequency of the load by using self-oscillating technique, also it has the capability to control the power supplied to the load using phase shift pulse width modulation (PSPWM) technique. These characteristics used to overcome the load nonlinear behavior during the brazing process and to achieve soft switching of the inverter elements. Also, the inverter has the capability to operate with or without load (workpiece). The implemented prototype operates at a frequency range (50-100)kHz and 10kW was successfully used for brazing two copper workpieces.","PeriodicalId":315179,"journal":{"name":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125246259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-01DOI: 10.1109/AIC-MITCSA.2016.7759940
S. Sadkhan, Ashwaq Q. Hameed, H. A. Hamed
Automatic identification of digitally modulated signal has to be able to identify the digitally modulated signal correctly and accurately. Importance of automatic identification of digitally modulated signals are rising increasingly. In this paper an advanced technique is presented, that automatically identifies the multi-user chirp modulated signals in Additive White Gaussian Noise (AWGN) channel. The proposed technique is implementing high order moments (fourth, sixth, and eighth) of detail coefficients of discrete wavelet transform (DWT) as a feature extraction set. Adaptive Neural-Fuzzy Inference System (ANFIS) is proposed as a classifier. The proposed identification procedure is capable of identifying multi-user chirp modulated signals with high accuracy at 0dB, 5dB, and 10dB Signal to Noise Ratio (SNR), over AWGN channel.
{"title":"A proposed identification method for multi-user chirp spread spectrum signals based on adaptive Neural-Fuzzy Inference System (ANFIS)","authors":"S. Sadkhan, Ashwaq Q. Hameed, H. A. Hamed","doi":"10.1109/AIC-MITCSA.2016.7759940","DOIUrl":"https://doi.org/10.1109/AIC-MITCSA.2016.7759940","url":null,"abstract":"Automatic identification of digitally modulated signal has to be able to identify the digitally modulated signal correctly and accurately. Importance of automatic identification of digitally modulated signals are rising increasingly. In this paper an advanced technique is presented, that automatically identifies the multi-user chirp modulated signals in Additive White Gaussian Noise (AWGN) channel. The proposed technique is implementing high order moments (fourth, sixth, and eighth) of detail coefficients of discrete wavelet transform (DWT) as a feature extraction set. Adaptive Neural-Fuzzy Inference System (ANFIS) is proposed as a classifier. The proposed identification procedure is capable of identifying multi-user chirp modulated signals with high accuracy at 0dB, 5dB, and 10dB Signal to Noise Ratio (SNR), over AWGN channel.","PeriodicalId":315179,"journal":{"name":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125244564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-01DOI: 10.1109/AIC-MITCSA.2016.7759939
Hameed R. Farhan, Mahmuod H. Al-Muifraje, Thamir R. Saeed
This paper presents a simple and fast face recognition system based on two states of discrete Hidden Markov Model (HMM). The minimization in the number of states leads to high processing speed and less memory occupation. Median filter is applied to each image under process, where it is the most suitable filter used to eliminate the effect of noise on images, and thereby enhancing the performance of the system. The features are extracted from reduced size images using a combination of maximum variance and Singular Value Decomposition (SVD). More reduction in processing data is achieved by assigning a single value to each feature vector. This process greatly speeds up the training and classification steps, where a discrete type of left-to-right HMM is used in this work. Experimental results verify that the proposed work is superior to previous approaches of HMM face recognition, where it achieves 100% recognition rate, high speed, and extremely low memory usage.
{"title":"Using only two states of discrete HMM for high-speed face recognition","authors":"Hameed R. Farhan, Mahmuod H. Al-Muifraje, Thamir R. Saeed","doi":"10.1109/AIC-MITCSA.2016.7759939","DOIUrl":"https://doi.org/10.1109/AIC-MITCSA.2016.7759939","url":null,"abstract":"This paper presents a simple and fast face recognition system based on two states of discrete Hidden Markov Model (HMM). The minimization in the number of states leads to high processing speed and less memory occupation. Median filter is applied to each image under process, where it is the most suitable filter used to eliminate the effect of noise on images, and thereby enhancing the performance of the system. The features are extracted from reduced size images using a combination of maximum variance and Singular Value Decomposition (SVD). More reduction in processing data is achieved by assigning a single value to each feature vector. This process greatly speeds up the training and classification steps, where a discrete type of left-to-right HMM is used in this work. Experimental results verify that the proposed work is superior to previous approaches of HMM face recognition, where it achieves 100% recognition rate, high speed, and extremely low memory usage.","PeriodicalId":315179,"journal":{"name":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125690969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-01DOI: 10.1109/AIC-MITCSA.2016.7759909
Mohammed E. Safi, E. Abbas
This paper introduced an approach to design and implement a system to control opening of security door by means of the human voice to recognize the password. The aim of this paper is to recognize the speaker and the word to open the door to obtain more security by high recognition rate. This paper proposes Mel-Frequency Cepstral Coefficient (MFCC) technique as feature extraction combined with its first and second derivative including power computation of the speech frames that yields the total multi-dimensional of features, and classification or features matching using Dynamic Time Warping (DTW) which is a good method for computing the similarity between two sequences. The system was trained with three speakers each one have a private password and the test was conducted at twenty two different speakers. The recognition rate performance properly is 100 percent in the real time tests.
{"title":"Microcontroller — Controlled security door based on speech recognition","authors":"Mohammed E. Safi, E. Abbas","doi":"10.1109/AIC-MITCSA.2016.7759909","DOIUrl":"https://doi.org/10.1109/AIC-MITCSA.2016.7759909","url":null,"abstract":"This paper introduced an approach to design and implement a system to control opening of security door by means of the human voice to recognize the password. The aim of this paper is to recognize the speaker and the word to open the door to obtain more security by high recognition rate. This paper proposes Mel-Frequency Cepstral Coefficient (MFCC) technique as feature extraction combined with its first and second derivative including power computation of the speech frames that yields the total multi-dimensional of features, and classification or features matching using Dynamic Time Warping (DTW) which is a good method for computing the similarity between two sequences. The system was trained with three speakers each one have a private password and the test was conducted at twenty two different speakers. The recognition rate performance properly is 100 percent in the real time tests.","PeriodicalId":315179,"journal":{"name":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129007757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-01DOI: 10.1109/AIC-MITCSA.2016.7759952
Aya N. Alkhafaji, A. Salim
A new compact wideband Substrate Integrated Waveguide (SIW) band pass filter utilizing of a helical-shaped slot is presented. This filter is consisting of four slots such that each one occupies a corner. Construction and evaluation of the proposed model have been done using the EM simulator of microwave studio suite from computer simulation technology (CST). The overall size of filter is 10 mm × 10 mm using a substrate with relative permittivity of 6 and height of 0.254 mm. This filter is designed to meet compact size, good return loss and low insertion loss. The obtained results exhibit a return loss below -40 dB and insertion loss approaching to 0 dB over the passband with a -3 dB fractional bandwidth of about 70% centered at 2.4 GHz. The simplicity gained with this structure led to freely control the position of the pass band through doing simple alterations of the helical-slots dimensions. As a result, this make the proposed filter candidate for operating in wireless applications like wireless local area network (WLAN) and Bluetooth applications.
{"title":"A helical-shaped slot microstrip band pass filter based on SIW technology for WLAN and Bluetooth applications","authors":"Aya N. Alkhafaji, A. Salim","doi":"10.1109/AIC-MITCSA.2016.7759952","DOIUrl":"https://doi.org/10.1109/AIC-MITCSA.2016.7759952","url":null,"abstract":"A new compact wideband Substrate Integrated Waveguide (SIW) band pass filter utilizing of a helical-shaped slot is presented. This filter is consisting of four slots such that each one occupies a corner. Construction and evaluation of the proposed model have been done using the EM simulator of microwave studio suite from computer simulation technology (CST). The overall size of filter is 10 mm × 10 mm using a substrate with relative permittivity of 6 and height of 0.254 mm. This filter is designed to meet compact size, good return loss and low insertion loss. The obtained results exhibit a return loss below -40 dB and insertion loss approaching to 0 dB over the passband with a -3 dB fractional bandwidth of about 70% centered at 2.4 GHz. The simplicity gained with this structure led to freely control the position of the pass band through doing simple alterations of the helical-slots dimensions. As a result, this make the proposed filter candidate for operating in wireless applications like wireless local area network (WLAN) and Bluetooth applications.","PeriodicalId":315179,"journal":{"name":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129801145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-01DOI: 10.1109/AIC-MITCSA.2016.7759937
N. Abbas, S. M. S. Ahmad, Abd Rahman Bin Ramli, S. Parveen
This paper introduces a new multi-purpose image watermarking algorithm which based on a hybrid of lifting wavelet transform (LWT) and Arnold transform for copyright protection and image authentication. In the proposed scheme, the original image is first decomposed by LWT into four subbands. Then the robust watermark which is a binary logo image is decomposed by Discrete Wavelet Transform (DWT) as such only the high frequency subband of the watermark are embedded in the low frequency subband of the original image. The fragile watermark is block wise self-generated from the original image and scrambled using Arnold transform which is later embedded in the spatial domain of the robust watermarked image. Self-generated fragile watermark supports self-authentication with high localization, whereas scrambling the fragile watermark increases the security of the algorithm. On the other hand, the lifting scheme approaches have almost one half the amounts of operations compared to the DWT based approaches. The overall system has been tested against various attacks and the results demonstrated that the robust watermark can be decoded successively under each attack. In addition, the proposed algorithm can detect any tampering attempts.
{"title":"A multi-purpose watermarking scheme based on hybrid of lifting wavelet transform and Arnold transform","authors":"N. Abbas, S. M. S. Ahmad, Abd Rahman Bin Ramli, S. Parveen","doi":"10.1109/AIC-MITCSA.2016.7759937","DOIUrl":"https://doi.org/10.1109/AIC-MITCSA.2016.7759937","url":null,"abstract":"This paper introduces a new multi-purpose image watermarking algorithm which based on a hybrid of lifting wavelet transform (LWT) and Arnold transform for copyright protection and image authentication. In the proposed scheme, the original image is first decomposed by LWT into four subbands. Then the robust watermark which is a binary logo image is decomposed by Discrete Wavelet Transform (DWT) as such only the high frequency subband of the watermark are embedded in the low frequency subband of the original image. The fragile watermark is block wise self-generated from the original image and scrambled using Arnold transform which is later embedded in the spatial domain of the robust watermarked image. Self-generated fragile watermark supports self-authentication with high localization, whereas scrambling the fragile watermark increases the security of the algorithm. On the other hand, the lifting scheme approaches have almost one half the amounts of operations compared to the DWT based approaches. The overall system has been tested against various attacks and the results demonstrated that the robust watermark can be decoded successively under each attack. In addition, the proposed algorithm can detect any tampering attempts.","PeriodicalId":315179,"journal":{"name":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131169571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-01DOI: 10.1109/AIC-MITCSA.2016.7759958
Ali A. Abed
IoT means making some of the things that we are using has the ability of Internet access (smart things). Anything that can be joined to it processing unit (microcontroller) and connected to the Internet is considered as things in the world of IoT. In IoT, the interconnected products should always be low-cost, so that we can flood the planet with IoT devices. The first step in building an IoT device is to figure out how it will communicate with the rest of the world. For example: A factory would need a large number of connected sensors and actuators scattered over a wide area. A wireless technology would be the best fit.
{"title":"Internet of Things (IoT): Architecture and design","authors":"Ali A. Abed","doi":"10.1109/AIC-MITCSA.2016.7759958","DOIUrl":"https://doi.org/10.1109/AIC-MITCSA.2016.7759958","url":null,"abstract":"IoT means making some of the things that we are using has the ability of Internet access (smart things). Anything that can be joined to it processing unit (microcontroller) and connected to the Internet is considered as things in the world of IoT. In IoT, the interconnected products should always be low-cost, so that we can flood the planet with IoT devices. The first step in building an IoT device is to figure out how it will communicate with the rest of the world. For example: A factory would need a large number of connected sensors and actuators scattered over a wide area. A wireless technology would be the best fit.","PeriodicalId":315179,"journal":{"name":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115436759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-01DOI: 10.1109/AIC-MITCSA.2016.7759955
S. Sadkhan, F. Abdulraheem
Cloud networking is the next generation architecture of IT. Clouds are very complex architectures. They have a replicated thousands of times, and common functional units and can be reduced to simple primitives. many issues related to security were created by complexity of cloud networking as well as all aspects of Cloud networking. Data security is one of the most important issues. The Cloud usually has a one security architecture but has many customers with variety requests. There are new risks introduced by clouds, like multi-tenancy, virtualization and data outsourcing in additional to existing security risks related to Cloud service providers (CSPs) and cloud customers (CCs). information security and their conformity with cloud networking security challenges targeted by Several international and industrial standards. Since there is a continuous increase in the field of communication regarding advanced data, there is an increase in need for time and statistical overhead that is associated with the application of cryptographic. Parallelizing the computation of cryptographic algorithms on many-core computing platforms can be a promising approach to reduce the execution time and eventually the energy consumption of such algorithms. In this paper we will analyze and compare a some of cryptosystems security evaluation approaches worked in cloud networking environment and depended on variety parameters to explain these approaches and show how it work in the few last years with the great modifying in cloud and great data growing.
{"title":"Security evaluation of cryptosystems used in cloud networks","authors":"S. Sadkhan, F. Abdulraheem","doi":"10.1109/AIC-MITCSA.2016.7759955","DOIUrl":"https://doi.org/10.1109/AIC-MITCSA.2016.7759955","url":null,"abstract":"Cloud networking is the next generation architecture of IT. Clouds are very complex architectures. They have a replicated thousands of times, and common functional units and can be reduced to simple primitives. many issues related to security were created by complexity of cloud networking as well as all aspects of Cloud networking. Data security is one of the most important issues. The Cloud usually has a one security architecture but has many customers with variety requests. There are new risks introduced by clouds, like multi-tenancy, virtualization and data outsourcing in additional to existing security risks related to Cloud service providers (CSPs) and cloud customers (CCs). information security and their conformity with cloud networking security challenges targeted by Several international and industrial standards. Since there is a continuous increase in the field of communication regarding advanced data, there is an increase in need for time and statistical overhead that is associated with the application of cryptographic. Parallelizing the computation of cryptographic algorithms on many-core computing platforms can be a promising approach to reduce the execution time and eventually the energy consumption of such algorithms. In this paper we will analyze and compare a some of cryptosystems security evaluation approaches worked in cloud networking environment and depended on variety parameters to explain these approaches and show how it work in the few last years with the great modifying in cloud and great data growing.","PeriodicalId":315179,"journal":{"name":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114777557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-01DOI: 10.1109/AIC-MITCSA.2016.7759947
Zainab T. Alisa, Hussein A. Nassrullah
Clustering model in wireless sensor network is an efficient way to reduce the consumed power during the transmission of sensed data to the Base Station (BS). In this paper, an intelligent clustering protocol is proposed to minimize energy consumption and prolong network lifetime. The proposed protocol performs clustering with dynamic number of clusters depending on the nodes distribution and the field dimensions. The process of selecting the optimum number of clusters and electing the suitable cluster heads (CH) is done by using modified genetic algorithm. This work proposed a method to modify the genetic algorithm. The target of the genetic algorithm (fitness function) is to minimize the total energy consumed by all nodes in the round. Balancing the residual energy between the nodes is an important factor to prolong network lifetime. To ensure balancing in the sensors network, an energy filter was proposed to block low energy nodes from acting as cluster heads and select the remaining nodes as candidate CHs then the modified genetic system chooses the optimum CHs from the candidate CHs. The simulation results demonstrate that the proposed algorithm outperform the common clustering protocol in terms of network lifetime and energy consumption.
{"title":"Minimizing energy consumption in wireless sensor networks using modified genetic algorithm and an energy balance filter","authors":"Zainab T. Alisa, Hussein A. Nassrullah","doi":"10.1109/AIC-MITCSA.2016.7759947","DOIUrl":"https://doi.org/10.1109/AIC-MITCSA.2016.7759947","url":null,"abstract":"Clustering model in wireless sensor network is an efficient way to reduce the consumed power during the transmission of sensed data to the Base Station (BS). In this paper, an intelligent clustering protocol is proposed to minimize energy consumption and prolong network lifetime. The proposed protocol performs clustering with dynamic number of clusters depending on the nodes distribution and the field dimensions. The process of selecting the optimum number of clusters and electing the suitable cluster heads (CH) is done by using modified genetic algorithm. This work proposed a method to modify the genetic algorithm. The target of the genetic algorithm (fitness function) is to minimize the total energy consumed by all nodes in the round. Balancing the residual energy between the nodes is an important factor to prolong network lifetime. To ensure balancing in the sensors network, an energy filter was proposed to block low energy nodes from acting as cluster heads and select the remaining nodes as candidate CHs then the modified genetic system chooses the optimum CHs from the candidate CHs. The simulation results demonstrate that the proposed algorithm outperform the common clustering protocol in terms of network lifetime and energy consumption.","PeriodicalId":315179,"journal":{"name":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116967443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-01DOI: 10.1109/AIC-MITCSA.2016.7759923
M. Hafiz
The most effective method to overcome corrosion problem is Cathodic Protection (CP) which represents a control method in the steel piling corrosion. In this work the response surface methodology (RSM) of Intelligent Programming Technique is used to model the Cathodic Protection System (CPS) to predict the potential protected by finding the optimum factor levels of protection potential in Umm-Qasr port which satisfy the maximum potential protected. The RSM suggested Box-Behnken (BB) Design matrix structure for protection potential is output dependent variable and four input independent variables (resistivity, sacrificial anode alloy, distance between anode and cathode and cathode surface area), this matrix structure is statistically chosen. The optimum design of experiment (DOE) for steel wall was to carry out 27 experiment runs. This design can be used to assess the effect of factors on protection potential for SCPS and its reliable. This design can be used to predict the potential protected with optimum factor levels. The results shown the values of predicted potential which is obtained by the current technique less than the ideal value which required to protect the steel pilling of the port.
{"title":"Optimization of continuous sacrificial protection based using intelligent programming technique","authors":"M. Hafiz","doi":"10.1109/AIC-MITCSA.2016.7759923","DOIUrl":"https://doi.org/10.1109/AIC-MITCSA.2016.7759923","url":null,"abstract":"The most effective method to overcome corrosion problem is Cathodic Protection (CP) which represents a control method in the steel piling corrosion. In this work the response surface methodology (RSM) of Intelligent Programming Technique is used to model the Cathodic Protection System (CPS) to predict the potential protected by finding the optimum factor levels of protection potential in Umm-Qasr port which satisfy the maximum potential protected. The RSM suggested Box-Behnken (BB) Design matrix structure for protection potential is output dependent variable and four input independent variables (resistivity, sacrificial anode alloy, distance between anode and cathode and cathode surface area), this matrix structure is statistically chosen. The optimum design of experiment (DOE) for steel wall was to carry out 27 experiment runs. This design can be used to assess the effect of factors on protection potential for SCPS and its reliable. This design can be used to predict the potential protected with optimum factor levels. The results shown the values of predicted potential which is obtained by the current technique less than the ideal value which required to protect the steel pilling of the port.","PeriodicalId":315179,"journal":{"name":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133722389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}