R. Aljarrah, Jumana Abu-Hamad, M. Al-Omary, Qusay Salem
{"title":"Research on The Impact of 100% PV Penetration in Power Distribution Systems","authors":"R. Aljarrah, Jumana Abu-Hamad, M. Al-Omary, Qusay Salem","doi":"10.1109/EICEEAI56378.2022.10050466","DOIUrl":"https://doi.org/10.1109/EICEEAI56378.2022.10050466","url":null,"abstract":"This paper investigates the impact of increased penetration of renewable energy, more specifically, PV systems, in future distribution systems. As it is known, grid-connected PVs at the distribution level serve as promising solutions to the growth in electrical demand and a cleaner, more eco-friendly environment in many countries worldwide. Due to the rise in electrical demand, consumption, and greenhouse gas levels, there is great potential that the total demand would be met by PV systems in some appropriate conditions, hence, operating the power distribution network with a 100% PV penetration scenario. Thus, it is a topic with great interest to most researchers and power system operators to analyze the effects of 100% PV penetration on distribution systems. This paper is focused on steady-state analysis and harmonics at full load conditions with 100% PV penetration. The simulation results of this paper have demonstrated the level of suitability of 100% PV penetration on distribution systems. The results of this paper are concerned with the effects of 100% PV penetration on the voltage level, the losses, the reverse power flow, and the harmonics level in the system. Although it is a target to increase the share of PVs in future scenarios, the analysis results show that it is worthwhile to consider the negative impacts associated with it. These negative impacts might include the violation of voltage limits, reverse power flow into the system, and harmonic order levels, especially at low load conditions. The simulations are performed in DIgSILENT Power Factory, where a modified version of the IEEE 13- node test system is used to demonstrate the findings of this paper.","PeriodicalId":426838,"journal":{"name":"2022 International Engineering Conference on Electrical, Energy, and Artificial Intelligence (EICEEAI)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126540184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pouya Khomand, M. Sabeti, R. Boostani, E. Moradi, Mahmoud Odeh, M. Al-Mousa
{"title":"Deep Learning for Automatic Determination of Bone Age in Children","authors":"Pouya Khomand, M. Sabeti, R. Boostani, E. Moradi, Mahmoud Odeh, M. Al-Mousa","doi":"10.1109/EICEEAI56378.2022.10050468","DOIUrl":"https://doi.org/10.1109/EICEEAI56378.2022.10050468","url":null,"abstract":"Skeletal bone age assessment (SBAA) is very important for both sides of parents and physicians to evaluate the irregular growth of children. SBAA process is carried out by radiologists who visually inspect the radiology image of the left hand according to the Greulich and Pyle (GP) or the Tanner-Whitehouse 2 (TW2) methods. However, human eyes have their own limitations and therefore the visual inspection procedure by radiologist involves a degree of error and also intra personal variability. To address these drawbacks, a deep learning-based approach is proposed here to precisely act on these X-ray images. The employed database contains 1391 X-ray left-hand image from Los Angeles children's hospital and 200 left hand x-ray image from different age and gender from Iranian children from Namazi hospital of Shiraz. Our results demonstrate the efficiency of proposed model (mean absolute error of 0.89) in this field.","PeriodicalId":426838,"journal":{"name":"2022 International Engineering Conference on Electrical, Energy, and Artificial Intelligence (EICEEAI)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114065673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Heidari, Babak Rostami-Dogolsara, Ebrahim Heydari, I. Mansour, Babak Janjan, Shahram Bahadori-Haghighi
{"title":"An Insight into The Surface Plasmon-Polariton Propagation in The Graphene Heterostructure","authors":"M. Heidari, Babak Rostami-Dogolsara, Ebrahim Heydari, I. Mansour, Babak Janjan, Shahram Bahadori-Haghighi","doi":"10.1109/EICEEAI56378.2022.10050475","DOIUrl":"https://doi.org/10.1109/EICEEAI56378.2022.10050475","url":null,"abstract":"In this work, we analyze the reflection and the transmission of surface plasmons (SPs) between a single-mode and a multimode dielectric-loaded graphene plasmon waveguides. An effective index method (EIM) in combination with mode matching theory (MMT) is used to calculate the power transmittance and reflectance. The EIM is employed to find effective refractive indices of modes of single-mode and multimode sections. We introduce an analytical model for SPs modes based on procedures. Then the MMT is utilized at the junction of two waveguides to find the transmittance and reflectance of the mode coming from the single-mode section to the multimode section.","PeriodicalId":426838,"journal":{"name":"2022 International Engineering Conference on Electrical, Energy, and Artificial Intelligence (EICEEAI)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127590290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
O. Akbarzadeh, Mohammad Hossein Khosravi, Taisir Ismail
{"title":"Implementation and Test of FIR and IIR Audio Filtering on the DSP Platform","authors":"O. Akbarzadeh, Mohammad Hossein Khosravi, Taisir Ismail","doi":"10.1109/EICEEAI56378.2022.10050461","DOIUrl":"https://doi.org/10.1109/EICEEAI56378.2022.10050461","url":null,"abstract":"Implementing FIR and IIR filtering functions according to different structures, considering both floating-point and fixed-point representations. The fixed-point versions will then be tested in real time, implementing an audio loop. Afterwards, several experiments were conducted with the DSP techniques, such as linear and circular buffers and fixed-point implementation. Moreover, implementing and testing an audio compression/decompression algorithm on the DSP platform has been performed.","PeriodicalId":426838,"journal":{"name":"2022 International Engineering Conference on Electrical, Energy, and Artificial Intelligence (EICEEAI)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134033176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohammad Aljaidi, A. Alsarhan, G. Samara, Raed Alazaidah, S. Almatarneh, Muhammad Khalid, Y. Al-Gumaei
{"title":"NHS WannaCry Ransomware Attack: Technical Explanation of The Vulnerability, Exploitation, and Countermeasures","authors":"Mohammad Aljaidi, A. Alsarhan, G. Samara, Raed Alazaidah, S. Almatarneh, Muhammad Khalid, Y. Al-Gumaei","doi":"10.1109/EICEEAI56378.2022.10050485","DOIUrl":"https://doi.org/10.1109/EICEEAI56378.2022.10050485","url":null,"abstract":"To ascertain the consequences of the 2017 WannaCry ransomware attack on the National Health Service (NHS), a systematic investigation of Hospital Episodes Statistics (HES) data was conducted to identify the missed appointments, fatalities, and financial expenses linked to the WannaCry ransomware attack. Outpatient appointment cancellations, hospital emergency and elective admissions, visits to accident and emergency (A&E), and deaths in A&E were the key output tracked. During the week of the ransomware incident, there was no appreciable difference in overall activity between all trusts compared to the baseline. Trusts had 1% fewer accident and emergency visits a day than at baseline, and 1% more admission to the emergency departments. Although there were much fewer elective and emergency admissions in hospitals that had been directly infected by the ransomware, there was nevertheless a daily drop in admissions of roughly 6%, with 4% fewer emergency departments visits, and 9% fewer elective admissions. There was no discernible mortality difference. The reduced activity at the affected trusts over this time had a total economic impact of £5.9 million, which included £0.6 million in lost accident and emergency activity, £1.3 million in lost outpatient consultations, and £4 million in missed inpatient admissions. There was a considerable drop in attendance and admissions among hospitals targeted and affected by the WannaCry ransomware attack, resulting to a loss of hospital activity of £5.9 million. Even though this is a rudimentary indicator of patient damage, there was no documented increase in mortality. To fully understand how a cyberattack or IT problems may affect patient safety and care delivery, more research is required.","PeriodicalId":426838,"journal":{"name":"2022 International Engineering Conference on Electrical, Energy, and Artificial Intelligence (EICEEAI)","volume":"204 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131873822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mahdi Abbasi, M. Zareie, A. Amer, Mohammad Hossein Khosravi
{"title":"Accurate Reconstruction of Electrical Impedance Tomography Images Using Genetic Algorithm","authors":"Mahdi Abbasi, M. Zareie, A. Amer, Mohammad Hossein Khosravi","doi":"10.1109/EICEEAI56378.2022.10050491","DOIUrl":"https://doi.org/10.1109/EICEEAI56378.2022.10050491","url":null,"abstract":"One of the methods to solve the inverse problem of electrical impedance tomography is D-bar method, which is the direct and no repetition solution. In this method, a specific operator called a is used. In the D-bar integral equation, range of integration is considered a circle with the center of origin of coordinates and radius R. This integration is non-zero value only for $k$ ≤ | $R$ |. In this equation, the used radius R, is effective in the resolution of the reconstructed image. In this paper, we used genetic algorithm to obtain the best radius to produce the optimized image with minimum mean square error. Therefore, the considered model was meshed up to three stages, by increasing the discretization nodes and implemented genetic algorithm was evaluated on it. We showed that the optimum radius was increased and mean square error was decreased at each step.","PeriodicalId":426838,"journal":{"name":"2022 International Engineering Conference on Electrical, Energy, and Artificial Intelligence (EICEEAI)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117251197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Cost-Effective DC Link Multi-Winding Series Connected 40-Pulse Rectifier System","authors":"Saiid Bashir, Muhammad Ahmad Khurshid, T. Mahmood","doi":"10.1109/EICEEAI56378.2022.10050449","DOIUrl":"https://doi.org/10.1109/EICEEAI56378.2022.10050449","url":null,"abstract":"Power quality is a key feature of rectifier systems. This paper describes the power quality performance for multiple DC loads of the series-connected 40-pulse rectifier (PR) system. The main technique to obtain a better harmonic reduction impact on the DC network is the perfect layout of a Harmonic Injection Transformer (HIT). The first step is to calculate the turn ratio of the purposed transformation method. During the second step, the accuracy of the general method is validated on a 5 -Φ rectifier-based multi-pulse rectifier (MPR). For validation, the harmonic reduction technique is implemented after the operation of the harmonic reduction circuit (HRC) on the DC side. In this article, the major target is to develop a harmonic injection transformer to keep the input voltage total harmonic distortion at a minimum level. As a result, we obtained a cost-effective and reduced volume of the proposed system as compared to the previous techniques in terms of reliability, realization, harmonic reduction capability, and minimization of voltage ripple coefficient. The MATLAB/SIMULINK model elaborates on the effectiveness of the proposed work.","PeriodicalId":426838,"journal":{"name":"2022 International Engineering Conference on Electrical, Energy, and Artificial Intelligence (EICEEAI)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127682093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CiteScore-Based Quartiles for Scientometric Analysis of Computer Science and Communications Journals: The Essentiality","authors":"M. Khosravi, Mohammed Alghanim, Hani Attar","doi":"10.1109/EICEEAI56378.2022.10050489","DOIUrl":"https://doi.org/10.1109/EICEEAI56378.2022.10050489","url":null,"abstract":"This paper addresses the essentiality and importance of CiteScore as the most recent Scopus indicator to evaluate periodical publications in the area of computer science and communications (CSC), indexed and abstracted by Scopus (mainly including journals and magazines). Currently, the old indicator of Scopus, SJR (through Scimago journal report), is the most common way of calculating scientometric quartiles through Scopus. The study shows that CiteScore is the best alternative of SJR to find Scopus-related quartiles for the CSC publications. In fact, it may be the best rival for the IF-based quartiles (as the representative of WoS), at least for the CSC journals.","PeriodicalId":426838,"journal":{"name":"2022 International Engineering Conference on Electrical, Energy, and Artificial Intelligence (EICEEAI)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125358263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohammad Aljaidi, A. Alsarhan, G. Samara, Y. Al-Khassawneh, Y. Al-Gumaei, Hamzeh Aljawawdeh, Abdullah AlQammaz
{"title":"A Critical Evaluation of A Recent Cybersecurity Attack on iTunes Software Updater","authors":"Mohammad Aljaidi, A. Alsarhan, G. Samara, Y. Al-Khassawneh, Y. Al-Gumaei, Hamzeh Aljawawdeh, Abdullah AlQammaz","doi":"10.1109/EICEEAI56378.2022.10050464","DOIUrl":"https://doi.org/10.1109/EICEEAI56378.2022.10050464","url":null,"abstract":"A rising number of businesses are embracing the Industry 4.0 paradigm by connecting their industrial systems and implementing a variety of cutting-edge technologies (such as cloud computing, smart devices, and data mining analytical), which in turn make Operations become more productive and efficient. However, this development and improvement on these businesses has been accompanied by the emergence of different types of cybersecurity difficulties and attacks. In this paper, a critical assessment for the recent iTunes software updater attack will be investigated and analyzed. A security vulnerability was discovered in iTunes software updater has been exploited to run ransomware on the targeted environment. Attacks could have taken advantage of an unquoted file path in the assigned system service that handled iTunes software update, which instead of running the targeted updater executable, it would have executed ransomware instead on the target computer. The ransomware sat undetected due to it be not containing a file extension and therefore was not scanned by antivirus software. Its malicious behavior was also not detected by antivirus software due to the iTunes updater being signed and trusted, so antiviruses thought the ransomware was trusted as well. Potential victims who had iTunes previously installed on their device was also vulnerable due to the updater being left behind when iTunes is uninstalled. This created a bigger number of potential victims that could have been exploited. While this exploit was not taken advantage of, this exploit existed and still exists in other applications because of developer error and lack of testing for this exploit.","PeriodicalId":426838,"journal":{"name":"2022 International Engineering Conference on Electrical, Energy, and Artificial Intelligence (EICEEAI)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114418069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Inter net of Things Machine Learning Comprehensive Overview, Security Intelligence, Approaches, and Directions of Research","authors":"Hani H. Attar","doi":"10.1109/EICEEAI56378.2022.10050490","DOIUrl":"https://doi.org/10.1109/EICEEAI56378.2022.10050490","url":null,"abstract":"The Internet of Things (IoT) has enormous potential to raise everyone's standard of living. Cyber-attacks and threats in the IoT ecosystem significantly impact smart applications. Outdated IoT security measures are inadequate, given the variety of threats and attacks. Machine and Deep learning technologies are essential for the IoT system of the next generation to provide a constantly updated and current security solution. The purpose of this article is to serve as a technical resource and guide for cybersecurity specialists and scientists interested in the field of IoT.","PeriodicalId":426838,"journal":{"name":"2022 International Engineering Conference on Electrical, Energy, and Artificial Intelligence (EICEEAI)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122070432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}