The insulation system of a machine coil includes several layers made of materials with different characteristics. The effective insulation design of machine coils, especially in the machine end winding, depends upon an accurate model of the stress grading system. This paper proposes a modeling approach to predict the transient overvoltage, electric field, and heat generation in machine coils with a stress grading system, considering the variation of physical properties in the insulation layers. A non-uniform line model is used to divide the coil in different segments based on material properties and lengths: overhang, stress grading and slot. The cascaded connection of chain matrices is used to connect segments for the representation of the complete machine coil. The resulting model is able to simulate the transient overvoltages due to the application of fast rise time pulses such as those observed with pulse width modulation from adjustable speed drives, considering coils with different insulation topologies and under pulses with different rise times. The parameters in each coil region are calculated using the finite element method (FEM). Additionally, the resistive heat and electric field distribution in the machine coil are calculated for excitations with different rise times by means of 3-dimensional FEM simulations.
The study aimed to identify the degree of commitment of social workers working in the Ministry of Social Development to the professional principles of the social work profession in light of the Corona pandemic, and the sample consisted of (135) specialists. The study reached several results: the most important one is the degree of commitment of social workers working in the Ministry of Social Development to the professional principles of social service was great. The other result is the absence of statistically significant differences according to the variables of sex and place of residence. Moreover, the results also showed the absence of statistically significant differences in the principles of ( Acceptance o
... Show MoreFuzzy logic is used to solve the load flow and contingency analysis problems, so decreasing computing time and its the best selection instead of the traditional methods. The proposed method is very accurate with outstanding computation time, which made the fuzzy load flow (FLF) suitable for real time application for small- as well as large-scale power systems. In addition that, the FLF efficiently able to solve load flow problem of ill-conditioned power systems and contingency analysis. The FLF method using Gaussian membership function requires less number of iterations and less computing time than that required in the FLF method using triangular membership function. Using sparsity technique for the input Ybus sparse matrix data gi
... Show MoreEnsuring security, integrity, and reliability of the election process consider as the main challenges in the electronic voting system. This paper describes the e-voting system by integrating the biometric authentication, advanced encryption, and watermarking techniques towards meeting such challenges. The system employs the fingerprint authentication by utilizing the Scale-Invariant Feature Transform (SIFT) for verifying the identity of the voter to ensure genuineness and non-repudiation of the service. The vote will be encrypted with the AES-GCM technique to be employed in securing the voting process, thus ensuring both data privacy and integrity. Hybrid Blind Watermarking employs the technique of Discrete Wavelet Transform (DWT) a
... Show MoreThe liver is one of the largest glands in the digestive system and performs 13 various functions, including the secretion of hormones and enzymes. The gallbladder serves as a storage reservoir for secretions before they are released into the digestive system through the duodenum. The bile ducts branch from the liver’s lobes and ultimately connect to the digestive system, making this structure significant and distinct among different animal species. This review focuses on the differences between dogs and cats, highlighting the importance of these differences from both health and pathological perspectives. After conducting a detailed scientific review of the biliary tree in dogs and cats, we concluded that cats are more susceptible to the d
... Show MoreThe liver is one of the largest glands in the digestive system and performs 13 various functions, including the secretion of hormones and enzymes. The gallbladder serves as a storage reservoir for secretions before they are released into the digestive system through the duodenum. The bile ducts branch from the liver’s lobes and ultimately connect to the digestive system, making this structure significant and distinct among different animal species. This review focuses on the differences between dogs and cats, highlighting the importance of these differences from both health and pathological perspectives. After conducting a detailed scientific review of the biliary tree in dogs and cats, we concluded that cats are more susceptible
... Show MoreIn recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the roads in all the sections of the country. Arabic vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the proposed system consists of three phases, vehicle license plate localization, character segmentation, and character recognition, the
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreThe long-term monitoring of land movements represents the most successful application of the Global Navigation Satellite System (GNSS), particularly the Global Positioning System. However, the application of long term monitoring of land movements depends on the availability of homogenous and consistent daily position time series of stations over a period of time. Such time series can be produced very efficiently by using Precise Point Positioning and Double Difference techniques based on particular sophisticated GNSS processing softwares. Nonetheless, these rely on the availability of GNSS products which are precise satellite orbit and clock, and Earth orientation parameters. Unfortunately, several changes and modifications have been mad
... Show MoreIn today's digital era, the importance of securing information has reached critical levels. Steganography is one of the methods used for this purpose by hiding sensitive data within other files. This study introduces an approach utilizing a chaotic dynamic system as a random key generator, governing both the selection of hiding locations within an image and the amount of data concealed in each location. The security of the steganography approach is considerably improved by using this random procedure. A 3D dynamic system with nine parameters influencing its behavior was carefully chosen. For each parameter, suitable interval values were determined to guarantee the system's chaotic behavior. Analysis of chaotic performance is given using the
... Show More