NTU Journal of Engineering and Technology
https://journals.ntu.edu.iq/index.php/NTU-JET
The NTU Journal of Engineering and Technology (P-ISSN: 2788-9971 E-ISSN:2788-998X) is an interdisciplinary peer-reviewed journal reinforcement research activities in all experimental and theoretical aspects of engineering science and technology.Northern Technical University en-USNTU Journal of Engineering and Technology2788-9971ARTIFICIAL INTELLIGENCE BASED HELIPAD DETECTION WITH CONVOLUTIONAL NEURAL NETWORK
https://journals.ntu.edu.iq/index.php/NTU-JET/article/view/799
<p>When a malfunction occurs in the helicopter or the pilot faints during a flight or performing a duty, and in order to ensure the safety of the pilot and the helicopter, a system must be available to detect the helicopter landing pads, so that the helicopter can land at the airport. Closest safe place immediately. This study focuses on helicopter landing pad detection using YOLOv8 and YOLOv5 models. A dataset of 1877 images collected from the Internet was used to evaluate the performance of the models. YOLOv8 showed good performance in helipad detection with 96.7% accuracy and 95.8% recall, resulting in an average accuracy (mAP@0.5) of 98.8%. As for YOLOv5, it reached 95.1% precision, 95.8% recall, and 97.5% mAP@0.5. Both models showed good results, but YOLOv8 outperformed it by a small percent.</p>Emad Ahmed MohammedAhmed J. AliAbdullah Mohammed Abdullah
Copyright (c) 2024 NTU Journal of Engineering and Technology
https://creativecommons.org/licenses/by/4.0
2024-03-152024-03-153110.56286/ntujet.v3i1.799Network Attack Detection for Business Safety
https://journals.ntu.edu.iq/index.php/NTU-JET/article/view/535
<p>In the technology age, the use of networks has hugely increased. this led to an increment in the number of attackers. A network attack is an try to achieve unauthorized access to personnel of an organization’s network, steal data or perform other malicious activity. Machine Learning is a subset of artificial Intelligence techniques that teaches machines to learn from historical information. In this paper, a machine learning-based approach was developed to detect network attacks. Two Machine learning models were used: Support vector machine and Artificial neural network. In this approach, a feature selection step based on the p-value is executed first to reduce the size of the dataset. After that, training and testing steps were performed. The proposed approach was tested on a real dataset collected from Kaggle. Confusion matrix, recall, precision, and f1 score were used to test the performance of the used ML techniques. The result shows the efficiency of this approach.</p>Fadia Abduljabbar SaeedGhalia NassreddineJoumana Younis
Copyright (c) 2024 NTU Journal of Engineering and Technology
https://creativecommons.org/licenses/by/4.0
2024-03-152024-03-153110.56286/ntujet.v3i1.535Influence of Using ACO Algorithm in STATCOM Performance
https://journals.ntu.edu.iq/index.php/NTU-JET/article/view/821
<p>Flexible alternating current transmission systems (FACTS) are technologies that rely on the use of high-power electronic equipment and advanced control methods to increase the ability of electrical transmission lines to transmit the largest amount of electrical power.Static_ synchronous _compensator (STATCOM) is one of FACTS_ family It has a rapid ability to supply or absorb reactive power from the system, traditional controller in STATCOM is (PID) or (PI). The controller is used to control the currents and voltages. In (STATCOM) there are two control loop, the inner loop which is represented by controlling the source current, and the outer loop which is used to control the voltage of the DC-link energy –storage- capacitor (vdc). Many algorithms are used in optimization to predict a specific behavior and to find the best solution for it. Two optimization methods were used Ant Colony Algorithm (ACO) and Genetic Algorithm (GA) to adjust the parameters of the outer PI controller. This unit is responsible for adjusting (vdc). The capacitor voltage is converted by the STATCOM inverter into a three-phase voltage, which is used to supply the load with required reactive power. Through the simulation and control process, the results demonstrated the effectiveness of the compensator in supplying the reactive power to the linear or non-linear loads, The results also showed that using the ACO technique that the integrated time absolute error ( ITAE) was reduced which gives more precise in adjusting the PI control parameters Which is achieved best Vd.c response ,compared with the GA and ziklur-nichlos method , by measuring the response of the lowest settling time (TS) and minimal peak overshoot (P-ov) .</p> <p> </p>Maha Al-Flaiyeh
Copyright (c) 2024 NTU Journal of Engineering and Technology
https://creativecommons.org/licenses/by/4.0
2024-03-152024-03-153110.56286/ntujet.v3i1.821Translating Sumerian Symbols into French Letters
https://journals.ntu.edu.iq/index.php/NTU-JET/article/view/660
<p>Sumerian symbols, which look like cuneiform letters, were used in a very old writing style. In this paper, a new method to translate the Sumerian symbols into French letters is introduced. It is based on the Cascade-Forward Neural Network (CFNN). The CFNN is exploited and adapted for the translation issue. It accepts a cuneiform letter image as an input and produces an appropriate output that refers to the translated french letter. Reasonable image augmentations are employed. These augmentations are for the: left direction rotations, right direction rotations and multiple translation directions (to the left, right, bottom and top). Total of 780 images are utilized for rotations and 338 images are collected for translations. This work can successfully attain the performance of 100%.</p>Raid Rafi Omar Al-NimaLubab H. AlbakArwa Hamed Al-Hamdany
Copyright (c) 2024 NTU Journal of Engineering and Technology
https://creativecommons.org/licenses/by/4.0
2024-03-152024-03-153110.56286/ntujet.v3i1.660Preserving Big Data Privacy in Cloud Environments Based on Homomorphic Encryption and Distributed Clustering
https://journals.ntu.edu.iq/index.php/NTU-JET/article/view/861
<p>Cloud computing has grown in popularity in recent years because to its efficiency, flexibility, scalability, and the services it provides for data storage and processing. Still, big businesses and organizations have severe concerns about protecting privacy and data security while processing these massive volumes of data.</p> <p>This paper proposes approach that intends to enhance efficiency in delivering advanced data protection, hence filling security holes, by enhancing data protection from various big data sources. A partial homomorphic encryption system is used to encrypt data created by many sources or users and processed in the cloud without decrypting it, hence protecting data from attackers. Extremely Distributed Clustering (EDC) has also been applied to partition large datasets into many cloud computing node subsets. This method can ensure privacy and protect data while also enhancing the effectiveness and performance of big data analytics. According to the results, the proposed technique was faster and gave improved encryption performance by around 23-28%.</p>Shatha A. Baker
Copyright (c) 2024 NTU Journal of Engineering and Technology
https://creativecommons.org/licenses/by/4.0
2024-03-152024-03-153110.56286/ntujet.v3i1.861