Preferred Language
Articles
/
alkej-174
Enhancement of a Power System Transient Stability Using Static Synchronous Series Compensator SSSC
...Show More Authors

Static Synchronous Series Compensator (SSSC) is a well known device for effectively regulating the active power flow in a power system. In this paper, the SSSC linearized power flow equations are incorporated into Newton-Raphson algorithm in a MATLAB written program to investigate the control of active poweer flow and the transient stability of a five bus and a thirty bus IEEE test systems, during abnormal conduction (three phase fault near buses). A comparison of the results obtained for the base case without SSSC and with it to investigate the effectiveness of the device on both of the active power flow and the transient stability.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jun 23 2022
Journal Name
American Scientific Research Journal For Engineering, Technology, And Sciences
A Review of TCP Congestion Control Using Artificial Intelligence in 4G and 5G Networks
...Show More Authors

In recent years, the field of research around the congestion problem of 4G and 5G networks has grown, especially those based on artificial intelligence (AI). Although 4G with LTE is seen as a mature technology, there is a continuous improvement in the infrastructure that led to the emergence of 5G networks. As a result of the large services provided in industries, Internet of Things (IoT) applications and smart cities, which have a large amount of exchanged data, a large number of connected devices per area, and high data rates, have brought their own problems and challenges, especially the problem of congestion. In this context, artificial intelligence (AI) models can be considered as one of the main techniques that can be used to solve ne

... Show More
View Publication
Publication Date
Sat Sep 30 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Performance of Electro-Fenton Process for Phenol Degradation Using Nickel Foam as a Cathode
...Show More Authors

Toxic substances have been released into water supplies in recent decades because of fast industrialization and population growth. Fenton electrochemical process has been addressed to treat wastewater which is very popular because of its high efficiency and straightforward design. One of the advanced oxidation processes (AOPs) is electro-Fenton (EF) process, and electrode material significantly affects its performance. Nickel foam was chosen as the source of electro-generated hydrogen peroxide (H2O2) due to its good characteristics. In the present study, the main goals were to explore the effects of operation parameters (FeSO4 concentration, current density, and electrolysis time) on the catalytic performance that was optimized by r

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Wed Apr 05 2023
Journal Name
Journal Of Engineering
A Developed Model for Selecting Optimum Locations of Water Harvesting Dams Using GIS Techniques
...Show More Authors

An integrated GIS-VBA (Geographical Information System – Visual Basic for Application), model is developed for selecting an optimum water harvesting dam location among an available locations in a watershed. The proposed model allows quick and precise estimation of an adopted weighted objective function for each selected location. In addition to that for each location, a different dam height is used as a nominee for optimum selection. The VBA model includes an optimization model with a weighted objective function that includes beneficiary items (positive) , such as the available storage , the dam height allowed by the site as an indicator for the potential of hydroelectric power generation , the rainfall rate as a source of water . In a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Mechanical Engineering Research And Developments
Development of natural convection heat transfer in heat sink using a new fin design
...Show More Authors

Scopus (2)
Scopus
Publication Date
Tue Jan 01 2013
Journal Name
Al-mustansiriyah Journal Of Science
Encrypting a Text by Using Affine Cipher and Hiding it in the Colored Image by Using the Quantization stage
...Show More Authors

ST Alawi, NA Mustafa, Al-Mustansiriyah Journal of Science, 2013

View Publication
Publication Date
Tue Dec 20 2022
Journal Name
2022 International Conference On Computer And Applications (icca)
IoT E-health System for Cardiac Telemonitoring
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Sat Jun 01 2024
Journal Name
Journal Of Engineering
Intelligent Dust Monitoring System Based on IoT
...Show More Authors

Dust is a frequent contributor to health risks and changes in the climate, one of the most dangerous issues facing people today. Desertification, drought, agricultural practices, and sand and dust storms from neighboring regions bring on this issue. Deep learning (DL) long short-term memory (LSTM) based regression was a proposed solution to increase the forecasting accuracy of dust and monitoring. The proposed system has two parts to detect and monitor the dust; at the first step, the LSTM and dense layers are used to build a system using to detect the dust, while at the second step, the proposed Wireless Sensor Networks (WSN) and Internet of Things (IoT) model is used as a forecasting and monitoring model. The experiment DL system

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Sun Mar 04 2018
Journal Name
Baghdad Science Journal
CVOTING: An Anonymous Ballot E-Voting System
...Show More Authors

One of the concerns of adopting an e-voting systems in the pooling place of any critical elections is the possibility of compromising the voting machine by a malicious piece of code, which could change the votes cast systematically. To address this issue, different techniques have been proposed such as the use of vote verification techniques and the anonymous ballot techniques, e.g., Code Voting. Verifiability may help to detect such attack, while the Code Voting assists to reduce the possibility of attack occurrence. In this paper, a new code voting technique is proposed, implemented and tested, with the aid of an open source voting. The anonymous ballot improved accordingly the paper audit trail used in this machine. The developed system,

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Tue Dec 20 2022
Journal Name
2022 International Conference On Computer And Applications (icca)
Design Mobile Application for Blood Donation System
...Show More Authors

View Publication
Scopus (2)
Crossref (4)
Scopus Crossref
Publication Date
Thu Jun 04 2020
Journal Name
Journal Of Discrete Mathematical Sciences And Cryptography
User authentication system based specified brain waves
...Show More Authors

A security system can be defined as a method of providing a form of protection to any type of data. A sequential process must be performed in most of the security systems in order to achieve good protection. Authentication can be defined as a part of such sequential processes, which is utilized in order to verify the user permission to entree and utilize the system. There are several kinds of methods utilized, including knowledge, and biometric features. The electroencephalograph (EEG) signal is one of the most widely signal used in the bioinformatics field. EEG has five major wave patterns, which are Delta, Theta, Alpha, Beta and Gamma. Every wave has five features which are amplitude, wavelength, period, speed and frequency. The linear

... Show More
Scopus (7)
Scopus