In this paper a new structure for the AVR of the power system exciter is proposed and designed using digital-based LQR. With two weighting matrices R and Q, this method produces an optimal regulator that is used to generate the feedback control law. These matrices are called state and control weighting matrices and are used to balance between the relative importance of the input and the states in the cost function that is being optimized. A sample power system composed of single machine connected to an infinite- bus bar (SMIB) with both a conventional and a proposed Digital AVR (DAVR) is simulated. Evaluation results show that the DAVR damps well the oscillations of the terminal voltage and presents a faster response than that of the conventional AVR.
Our dear country faces many and varied challenges aimed at its history, civilization, its people, the scourge of drugs and psychotropic substances and their misuse. Therefore, we have a historical, ethical and professional responsibility to coordinate efforts and cooperation between all concerned to protect the Iraqi society from the threat of this scourge. Creative sources have varied in the variety of expressive means in politics, literature and the arts, in their style and technical treatment of various topics with innovative manifestations and intuitive interactive with visions as well as influences Psychological expressive descriptions of visual scene, it is one of the media and propaganda that contribute to the raising and developm
... Show MoreIn this paper, an approach for object tracking that is inspired from human oculomotor system is proposed and verified experimentally. The developed approach divided into two phases, fast tracking or saccadic phase and smooth pursuit phase. In the first phase, the field of the view is segmented into four regions that are analogue to retinal periphery in the oculomotor system. When the object of interest is entering these regions, the developed vision system responds by changing the values of the pan and tilt angles to allow the object lies in the fovea area and then the second phase will activate. A fuzzy logic method is implemented in the saccadic phase as an intelligent decision maker to select the values of the pan and tilt angle based
... Show MoreStrangeness in design generally and in advertisement design specifically is manifested in various images and creative propositions and shapes that depart the traditional and conventional framework to elevate design to virtual intellectual worlds related to the inspirational and imaginative range of the creative designer, which makes the forms of strangeness a means for persuasion and astonishment which achieves the functional and aesthetic objectives of the advertisement. The two researchers identified the research question "what is the concept of strangeness in the commercial advertisements design? The research objective has been determined by identifying the concept of strangeness in the commercial advertisement design. Strangen
... Show MoreAlthough the majority of trends confirm the design aspects of the performance, functional and aesthetic design of the product. However, the attention was more focused on the nature of the plastic for those results, it is through the appearance of formal and guaranteed career such as designing Achieved adopt us the extent of the impact Relations Association between the elements and principles of design to achieve complementarity in the completed design of aesthetic and functional significance expressive and symbolic and in doing so has introduced a lot of new concepts for the arrangement and organization, coordination and functional classification of the unfinished design gave way to show diversity trends in the design of industrial produ
... Show MoreHoneywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t
... Show MoreThe design of fabrics and fashion is manifested by aesthetic advantages betting with the movement of society in its quest to develop as an independent art in itself that is linked to the values and aesthetic concepts of other arts and what appears in them of intellectual systems calling for renewal and modernity. Which brought about a wide change in public taste, as well as a desire for innovation . Which made fashion an interesting aesthetic phenomenon and taste is always subject to change constantly to comply with the social variables that occur in human life, as the fashion that appears in a certain era of time and takes a great distance from spreading as something new and out of the ordinary is in fact the fruit of the development of
... Show MoreThe primary objective of this paper is to improve a biometric authentication and classification model using the ear as a distinct part of the face since it is unchanged with time and unaffected by facial expressions. The proposed model is a new scenario for enhancing ear recognition accuracy via modifying the AdaBoost algorithm to optimize adaptive learning. To overcome the limitation of image illumination, occlusion, and problems of image registration, the Scale-invariant feature transform technique was used to extract features. Various consecutive phases were used to improve classification accuracy. These phases are image acquisition, preprocessing, filtering, smoothing, and feature extraction. To assess the proposed
... Show MoreFree Space Optical (FSO) technology offers highly directional, high bandwidth communication channels. This technology can provide fiber-like data rate over short distances. In order to improve security associated with data transmission in FSO networks, a secure communication method based on chaotic technique is presented. In this paper, we have turned our focus on a specific class of piece wise linear one-dimensional chaotic maps. Simulation results indicate that this approach has the advantage of possessing excellent correlation property. In this paper we examine the security vulnerabilities of single FSO links and propose a solution to this problem by implementing the chaotic signal generator “reconfigurable tent map”. As synchronizat
... Show More