Claim Missing Document
Check
Articles

Found 8 Documents
Search

Enhancing Multilevel Inverter Performance: A Novel Dung Beetle Optimizer-based Selective Harmonic Elimination Approach Taha, Taha A.; Neamah, Muthanna Ibrahim; Ahmed, Saadaldeen Rashid; Taha, Faris Hassan; Bektaş, Yasin; Desa, Hazry; Yassin, Khalil Farhan; Ibrahim, Marwa; Hashim, Abdulghafor Mohammed
Journal of Robotics and Control (JRC) Vol 5, No 4 (2024)
Publisher : Universitas Muhammadiyah Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.18196/jrc.v5i4.21722

Abstract

This paper introduces a novel approach for enhancing the performance of multilevel inverters by applying a dung beetle optimizer (DBO)-based Selective Harmonic Elimination (SHE) technique. Focusing on a 3-phase multilevel inverter (MLI) with a non-H-bridge structure, the proposed method offers advantages such as cost-effective hardware implementation and eliminating the traditional H-bridge inverter requirement. To assess its efficacy, we compare the presented DBO-based SHE technique (DBOSHE) with Genetic Algorithm (GA) and Particle Swarm Optimization (PSO), evaluating their ability to determine optimal switching angles for achieving low-distorted load voltage. Unlike methods reliant on time-consuming calculations or fixed solutions, DBO provides a flexible approach, considering multiple possibilities to yield accurate switching angles. Using Simulink, harmonic component values and Total Harmonic Distortion (THD) are obtained for each optimization technique, specifically emphasizing on 9-level and 11-level MLI topologies. Our study aims to identify the most effective optimization technique for achieving lower THD and THDe values while eliminating odd-order harmonics from the 3-phase load voltage. Finally, we demonstrate the effectiveness of employing DBO for THD and THDe optimization within the SHE technique.
Unlocking Solar Potential: Advancements in Automated Solar Tracking Systems for Enhanced Energy Utilization Hussain, Abadal-Salam T.; Hakim, Baqer A; Ahmed, Saadaldeen Rashid; Abed, Tareq Hamad; Taha, Taha A.; Hasan, Taif. S.; Hasan, Raed Abdulkareem; Hashim, Abdulghafor Mohammed; Tawfeq, Jamal Fadhil
Journal of Robotics and Control (JRC) Vol 5, No 4 (2024)
Publisher : Universitas Muhammadiyah Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.18196/jrc.v5i4.19931

Abstract

The use of solar tracking systems has become vital and has established itself as a vital element in the generation of solar energy by enhancing the collection efficiency. This paper seeks to understand the necessity of shifting from conventional energy sources and why issues like scarcity of fossil fuel, and pollution are some of the hurdles toward achieving sustainable energy. Solar power, in particular, is one of the lights at the end of this tunnel since it pioneers a shift towards the usage of clean energy in the world. The subject of interests of the study is on how tracking systems help in maximizing energy collection from solar systems by interchanging it with the movement of sun’s path. It discusses the method that was followed, which involves selecting component, designing circuit and developing software together with presenting empirical data that was obtained from a three-day, Twenty-four-hour experiment. Outcomes show that there is an improvement on voltage stability, the level of solar irradiation and temperature regulation when the system is applied as compared to static system and its applicability for the enhancement of the renewable energy harnessing methods by using the solar tracking technology. Finally, it outlines the future research directions to continue exploring the proposed methods and its wider impact on renewable energy generation.
Enhancing Harmonic Reduction in Multilevel Inverters using the Weevil Damage Optimization Algorithm Bektaş, Enes; Aldabbagh, Mohammed M; Ahmed, Saadaldeen Rashid; Hussain, Abadal-Salam T.; Taha, Taha A.; Ahmed, Omer K; Ezzat, Sarah B.; Hashim, Abdulghafor Mohammed
Journal of Robotics and Control (JRC) Vol 5, No 3 (2024)
Publisher : Universitas Muhammadiyah Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.18196/jrc.v5i3.21544

Abstract

In this study, we investigate the efficacy of the newly developed Weevil Damage Optimization Algorithm (WDOA) for addressing harmonic distortion in multilevel inverters. Specifically, harmonics of the fifth and seventh orders are targeted for elimination in a seven-level cascaded multilevel inverter, while harmonics of the fifth, seventh, eleventh, and thirteenth orders are addressed in an eleven-level cascaded multilevel inverter. Through simulation studies encompassing different modulation index values, we demonstrate the effectiveness of the WDOA optimization algorithm in selectively removing harmonics and reducing overall harmonic distortion. While the results showcase promising outcomes, further quantitative metrics and comparative analysis are warranted to fully evaluate the algorithm's performance and its potential implications for practical applications in multilevel inverter systems.
Towards Resilient Machine Learning Models: Addressing Adversarial Attacks in Wireless Sensor Network Shihab, Mustafa Abdmajeed; Marhoon, Haydar Abdulameer; Ahmed, Saadaldeen Rashid; Radhi, Ahmed Dheyaa; Sekhar, Ravi
Journal of Robotics and Control (JRC) Vol 5, No 5 (2024)
Publisher : Universitas Muhammadiyah Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.18196/jrc.v5i5.23214

Abstract

Adversarial attacks represent a substantial threat to the security and reliability of machine learning models employed in wireless sensor networks (WSNs). This study tries to solve this difficulty by evaluating the efficiency of different defensive mechanisms in minimizing the effects of evasion assaults, which try to mislead ML models into misclassification. We employ the Edge-IIoTset dataset, a comprehensive cybersecurity dataset particularly built for IoT and IIoT applications, to train and assess our models. Our study reveals that employing adversarial training, robust optimization, and feature transformations dramatically enhances the resistance of machine learning models against evasion attempts. Specifically, our defensive model obtains a significant accuracy boost of 12% compared to baseline models. Furthermore, we study the possibilities of combining alternative generative adversarial networks (GANs), random forest ensembles, and hybrid techniques to further boost model resilience against a broader spectrum of adversarial assaults. This study underlines the need for proactive methods in preserving machine learning systems in real-world WSN contexts and stresses the need for continued research and development in this quickly expanding area.
Optimizing Network Security with Machine Learning and Multi-Factor Authentication for Enhanced Intrusion Detection Mahmood, Rafah Kareem; Mahameed, Ans Ibrahim; Lateef, Noor Q.; Jasim, Hasanain M.; Radhi, Ahmed Dheyaa; Ahmed, Saadaldeen Rashid; Tupe-Waghmare, Priyanka
Journal of Robotics and Control (JRC) Vol 5, No 5 (2024)
Publisher : Universitas Muhammadiyah Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.18196/jrc.v5i5.22508

Abstract

This study examines the utilization of machine learning methodologies and multi-factor authentication (MFA) to bolster network security, specifically targeting network intrusion detection. We analyze the way in which the integration of these technologies effectively tackles existing security concerns and constraints. The research highlights the importance of incorporating energy conservation and environmental impact reduction into security solutions, in addition to traditional cryptography and biometric methods. In addition, we tackle the limitations of centralized systems, such as vulnerabilities to security breaches and instances of system failures. The study examines different security models, encompassing categories, frameworks, consensus protocols, applications, services, and deployment goals in order to determine their impact on network security. In addition, we offer a detailed comparison of seven machine learning models, showcasing their effectiveness in enhancing network intrusion detection and overall security. The objective of this study is to provide in-depth understanding and actionable suggestions for utilizing machine learning with MFA (Multi-Factor Authentication) to enhance network defensive tactics.
Optimizing Network Security with Machine Learning and Multi-Factor Authentication for Enhanced Intrusion Detection Mahmood, Rafah Kareem; Mahameed, Ans Ibrahim; Lateef, Noor Q.; Jasim, Hasanain M.; Radhi, Ahmed Dheyaa; Ahmed, Saadaldeen Rashid; Tupe-Waghmare, Priyanka
Journal of Robotics and Control (JRC) Vol. 5 No. 5 (2024)
Publisher : Universitas Muhammadiyah Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.18196/jrc.v5i5.22508

Abstract

This study examines the utilization of machine learning methodologies and multi-factor authentication (MFA) to bolster network security, specifically targeting network intrusion detection. We analyze the way in which the integration of these technologies effectively tackles existing security concerns and constraints. The research highlights the importance of incorporating energy conservation and environmental impact reduction into security solutions, in addition to traditional cryptography and biometric methods. In addition, we tackle the limitations of centralized systems, such as vulnerabilities to security breaches and instances of system failures. The study examines different security models, encompassing categories, frameworks, consensus protocols, applications, services, and deployment goals in order to determine their impact on network security. In addition, we offer a detailed comparison of seven machine learning models, showcasing their effectiveness in enhancing network intrusion detection and overall security. The objective of this study is to provide in-depth understanding and actionable suggestions for utilizing machine learning with MFA (Multi-Factor Authentication) to enhance network defensive tactics.
Towards Resilient Machine Learning Models: Addressing Adversarial Attacks in Wireless Sensor Network Shihab, Mustafa Abdmajeed; Marhoon, Haydar Abdulameer; Ahmed, Saadaldeen Rashid; Radhi, Ahmed Dheyaa; Sekhar, Ravi
Journal of Robotics and Control (JRC) Vol. 5 No. 5 (2024)
Publisher : Universitas Muhammadiyah Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.18196/jrc.v5i5.23214

Abstract

Adversarial attacks represent a substantial threat to the security and reliability of machine learning models employed in wireless sensor networks (WSNs). This study tries to solve this difficulty by evaluating the efficiency of different defensive mechanisms in minimizing the effects of evasion assaults, which try to mislead ML models into misclassification. We employ the Edge-IIoTset dataset, a comprehensive cybersecurity dataset particularly built for IoT and IIoT applications, to train and assess our models. Our study reveals that employing adversarial training, robust optimization, and feature transformations dramatically enhances the resistance of machine learning models against evasion attempts. Specifically, our defensive model obtains a significant accuracy boost of 12% compared to baseline models. Furthermore, we study the possibilities of combining alternative generative adversarial networks (GANs), random forest ensembles, and hybrid techniques to further boost model resilience against a broader spectrum of adversarial assaults. This study underlines the need for proactive methods in preserving machine learning systems in real-world WSN contexts and stresses the need for continued research and development in this quickly expanding area.
Optimizing Mobile Robot Path Planning with a Hybrid Crocodile Hunting and Falcon Optimization Algorithm Hashim, Wassan Adnan; Ahmed, Saadaldeen Rashid; Mahmood, Mohammed Thakir; Almaiah, Mohammed Amin; Shehab, Rami; AlAli, Rommel
Journal of Robotics and Control (JRC) Vol. 6 No. 2 (2025)
Publisher : Universitas Muhammadiyah Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.18196/jrc.v6i2.25586

Abstract

Thorough path planning is critical in unmanned ground vehicle control to reduce path length, computational time, and the number of collisions. This paper aims to introduce a new metaheuristic method called the Hybrid Crocodile Hunting-SearcH and Falcon Optimization (CHS-FO) algorithm. This method combines CHS's exploration and exploitation abilities with FO's rapid convergence rate. In this way, the use of both metaheuristic techniques limits the disadvantage of the individual approach, guaranteeing a high level of both global and local search. We conduct several simulations to compare the performance of the CHS-FO algorithm with conventional algorithms such as A* and Genetic Algorithms (GA). It is found The results show that the CHS-FO algorithm performs 30–50% better in terms of computation time, involves shorter path planning, and improves obstacle avoidance. Eristic also suggests that the path generation algorithm can adapt to environmental constraints and be used in real-world scenarios, such as automating product movement in a warehouse or conducting search and rescue operations for lost vehicles. The primary The proposed CHS-FO architecture makes the robot more independent and better at making choices, which makes it a good choice for developing the next generation of mobile robotic platforms. Goals will encompass the improvement of the algorithm's scalability for use in multiple robots, as well as the integration of the algorithm in a real environment in real time.