The Electrical power system has become vast and more complex, so it is subjected to sudden changes in load levels. Stability is an important concept which determines the stable operation of the power system. Transient stability analysis has become one of the significant studies in the power system to ensure the system stability to withstand a considerable disturbance. The effect of temporary occurrence can lead to malfunction of electronic control equipment. The application of flexible AC transmission systems (FACTS) devices in the transmission system have introduced several changes in the power system. These changes have a significant impact on the power system protection, due to differences inline impedance, line curre
... Show MoreThis study was conducted to determine the ability of water treatment system (Vortisand) to reduce some chemical and physical properties for tigris river raw water, It consisted of turbidity, electrical conductivity, pH, total hardness, calcium Hardness as well as temperature in order to determine the unit`s efficiency for reducing their concentration as compared to those in the water produced by some classical potable water projects (Dora and Wathba) in Baghdad. Samples were collected during the cold months (December 2016 and January 2017) and during the hot months (May and June 2017). The results showed that this system has the ability to reduce some properties such as turbidity, the values were 215NTU in raw water and decreased to NTU
... Show MoreThe research presents the reliability. It is defined as the probability of accomplishing any part of the system within a specified time and under the same circumstances. On the theoretical side, the reliability, the reliability function, and the cumulative function of failure are studied within the one-parameter Raleigh distribution. This research aims to discover many factors that are missed the reliability evaluation which causes constant interruptions of the machines in addition to the problems of data. The problem of the research is that there are many methods for estimating the reliability function but no one has suitable qualifications for most of these methods in the data such
Net pay is one of the most important parameters used in determining initial oil in place of a reservoir. It can be delineated through the using of limiting values of the petrophysical properties of the reservoir. Those limiting values are named as the cutoff. This paper provides an insight into the application of regression line method in estimating porosity, clay volume and water saturation cutoff values in Mishrif reservoir/ Missan oil fields. The study included 29 wells distributed in seven oilfields of Halfaya, Buzurgan, Dujaila, Noor, Fauqi, Amara and Kumait.
This study is carried out by applying two types of linear regressions: Least square and Reduce Major Axis Regression.
The Mishrif formation was
... Show MoreIntroduction/Aim. Roughly six percent of all malignancies diagnosed in children are malignant bone tumors. They have a dramatic effect on psychological status of children and their families. The aim of the study was to analyze the clinico-pathological features of bone tumors in Iraqi children and to assess response to treatment, outcome, and survival. Patients and methods. Over an eleven-year period, a retrospective study was done for children with bone tumors conducted on patients data that included a battery of pre-treatment investigations including a complete blood count, serum electrolyte, hepatic, and renal profile, bone marrow aspirate and biopsy, fine-needle aspiration, and imaging studies. Results. Data of 41 children with b
... Show MoreIf we go beyond the technical aspects of the Web 2.0, and we focus specifically on its interactive characteristics, we may say it represents not only a fundamental shift in the structure of the press institutions and its practices but also a shift in the relationships that existed, previously, between the press and the audience. Web 2.0 has enabled the newspapers to renovate their representations and practices of the profession and opens to the new horizons either in terms of readership or advertising revenues. Parallel to that it also has empowered the user to transcend the passivity he has always been confined in and has become a more active participant in the creation and generation of media contents even though this practice is somew
... Show MoreAbstract:
Objective: To assess old age behaviors toward cardiovascular health promotion. Find out the association between old age behaviors toward cardiovascular health promotion with certain sociodemographic characteristic and type of geriatric home.
Methodology: A descriptive study is conducted throughout the period of (April 12th 2022 to august 22nd, 2023) presented to assess of old age behaviors toward cardiovascular health promotion. Purposive sample of (140) old age were selected from males and female’s participants from public and private Geriatric Homes at Baghdad city questi
... Show MoreSoftware Defined Network (SDN) is a new technology that separate the control plane from the data plane. SDN provides a choice in automation and programmability faster than traditional network. It supports the Quality of Service (QoS) for video surveillance application. One of most significant issues in video surveillance is how to find the best path for routing the packets between the source (IP cameras) and destination (monitoring center). The video surveillance system requires fast transmission and reliable delivery and high QoS. To improve the QoS and to achieve the optimal path, the SDN architecture is used in this paper. In addition, different routing algorithms are used with different steps. First, we eva
... Show MoreMobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show MoreIn recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show More