Preferred Language
Articles
/
alkej-174
Enhancement of a Power System Transient Stability Using Static Synchronous Series Compensator SSSC
...Show More Authors

Static Synchronous Series Compensator (SSSC) is a well known device for effectively regulating the active power flow in a power system. In this paper, the SSSC linearized power flow equations are incorporated into Newton-Raphson algorithm in a MATLAB written program to investigate the control of active poweer flow and the transient stability of a five bus and a thirty bus IEEE test systems, during abnormal conduction (three phase fault near buses). A comparison of the results obtained for the base case without SSSC and with it to investigate the effectiveness of the device on both of the active power flow and the transient stability.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Sep 01 2015
Journal Name
Journal Of Engineering
Cost of Optimum Design of Trunk Mains Network Using Geographical Information System and Support Programs
...Show More Authors

Sewer network is one of the important utilities in modern cities which discharge the sewage from all facilities. The increase of population numbers consequently leads to the increase in water consumption; hence waste water generation. Sewer networks work is very expensive and need to be designed accurately. Thus construction effective sewer network system with minimum cost is very necessary to handle waste water generation.

 In this study trunk mains networks design was applied which connect the pump stations together by underground pipes for too long distances. They usually have large diameters with varying depths which consequently need excavations and gathering from pump stations and transport the sewage

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Engineering
Seismic Effects and Static Analysis for the Artificial Damped Outrigger Systems in Tall R.C Buildings
...Show More Authors

This paper studies the combination fluid viscous dampers in the outrigger system to add supplementary damping into the structure, which purpose to remove the dependability of the structure to lower variable intrinsic damping. It works by connecting the central core, comprising either shear walls or braced frames, to the outer perimeter columns.

     The modal considered is a 36 storey square high rise reinforced concrete building. By constructing a discrete lumped mass model, and using frequency-based response function, two systems of dampers, parallel and series systems are studied. The maximum lateral load at the top of the building is calculated, and  this load  w

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 31 2020
Journal Name
International Journal Of Heat And Technology
Enhancement of Natural Convection Heat Transfer of Hybrid Design Heat Sink
...Show More Authors

View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue May 23 2023
Journal Name
Journal Of Engineering
Enhancement of the Detection of the TCP SYN Flooding (DDoS) Attack
...Show More Authors

The major of DDoS attacks use TCP protocol and the TCP SYN flooding attack is the most common one among them. The SYN Cookie mechanism is used to defend against the TCP SYN flooding attack. It is an effective defense, but it has a disadvantage of high calculations and it doesn’t differentiate spoofed packets from legitimate packets. Therefore, filtering the spoofed packet can effectively enhance the SYN Cookie activity. Hop Count Filtering (HCF) is another mechanism used at the server side to filter spoofed packets. This mechanism has a drawback of being not a perfect and final solution in defending against the TCP SYN flooding attack. An enhanced mechanism of Integrating and combining the SYN Cookie with Hop Count Filtering (HCF) mech

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Apr 01 2020
Journal Name
Isa Transactions
Design of a Complex fractional Order PID controller for a First Order Plus Time Delay system
...Show More Authors

View Publication
Scopus (51)
Crossref (43)
Scopus Clarivate Crossref
Publication Date
Sat Oct 01 2022
Journal Name
Advances In Structural Engineering
Experimental and FE analysis of composite RC beams with encased pultruded GFRP I-beam under static loads
...Show More Authors

Publication Date
Sat Oct 01 2022
Journal Name
Advances In Structural Engineering
Experimental and FE analysis of composite RC beams with encased pultruded GFRP I-beam under static loads
...Show More Authors

Encasing glass fiber reinforced polymer (GFRP) beam with reinforced concrete (RC) improves stability, prevents buckling of the web, and enhances the fire resistance efficiency. This paper provides experimental and numerical investigations on the flexural performance of RC specimens composite with encased pultruded GFRP I-sections. The effect of using shear studs to improve the composite interaction between the GFRP beam and concrete was explored. Three specimens were tested under three-point loading. The deformations, strains in the GFRP beams, and slippages between the GFRP beams and concrete were recorded. The embedded GFRP beam enhanced the peak loads by 65% and 51% for the composite specimens with and without shear connectors,

... Show More
View Publication
Crossref (24)
Clarivate Crossref
Publication Date
Mon Apr 24 2017
Journal Name
8th International Visible Conference On Educational Studies And Applied Linguistics
Woman’s Emotional Conflict and the Healing Power of Love in Nathaniel
...Show More Authors

In Nathaniel Hawthorn's The Scarlet Letter, love and hate appear as independent powers that consume their holders. In this novel, Nathaniel Hawthorn presents a picture of the Puritans which shows an important part of American history. The Scarlet Letter outlines the American's brief moment of theocracy and extreme social order. Hawthorn is one of the first American writers to explore the hidden motivations of his characters. The Puritans wanted to establish an ideal community in America that can act as a model of influence for what they saw as a corrupted civil and religious order in England. This sense of mission is the core of their religious and social identity. That is why they required a strict moral regulation. The research tackles th

... Show More
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
A New Audio Steganography System Based on Auto-Key Generator
...Show More Authors

Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.

In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested

... Show More
View Publication Preview PDF
Publication Date
Tue Oct 01 2019
Journal Name
2019 Ieee 9th International Conference On System Engineering And Technology (icset)
A Digital Signature System Based on Real Time Face Recognition
...Show More Authors

This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref