The Electrical power system has become vast and more complex, so it is subjected to sudden changes in load levels. Stability is an important concept which determines the stable operation of the power system. Transient stability analysis has become one of the significant studies in the power system to ensure the system stability to withstand a considerable disturbance. The effect of temporary occurrence can lead to malfunction of electronic control equipment. The application of flexible AC transmission systems (FACTS) devices in the transmission system have introduced several changes in the power system. These changes have a significant impact on the power system protection, due to differences inline impedance, line current and voltage. On the distance relaying protection system to identify essential issues that protection engineers need to consider during the stages of design and operation of the protection system. Transient analysis can be conducted using a simulation software package. One of the commercial simulation software package used by industry worldwide is Siemens Power System Simulation for Engineering (PSS/E). The object of this work is to improve the Transient stability and to clear critical fault times of the Kurdistan Region Government (KRG) network by using optimal FACTS devices in different optimal locations under fault conditions.
Subjected Find winged bull Assyrian monetary analysis in order to identify the formative relations in terms of percentages, movement and public swab for being aesthetic values upon which the mechanisms of artistic composition, which did not give researchers artistic interest that affects the status of these sculptures and the like of the achievements of the Iraqi civilization in Assyria.
Resulting analysis to a number of the most important results, the percentages approved in the calculation of the parts to do with all when viewed status horizontal with a realistic formulas while in the case of considering frontally clear for Ras stylized proportions and head size larger in length, a ratio confirmed by previous studies, and
... Show MoreThis paper presents a fully computerized method to backup the router configuration file. The method consists of a friendly graphical interface programmed by Java programming language.
The proposed method is compared with the two existing methods, namely: TFTP server method and Copy/Paste method. The comparison reveals that the proposed method has many advantages over the existing ones. The proposed method has been implemented on Cisco routers (series 2500, 2600 and 2800).
Ganciclovir (GCV) is a drug included in BCS-Class III, having high solubility and low permeability. It is a synthetic acyclic nucleoside analog of 2′-deoxyguanosine, considered a potent inhibitor of herpes viruses and cytomegalovirus (CMV) infection. Herpes simplex virus (HSV) infections are very common and are also considered a major cause of corneal blindness. This study intended to advance a pioneering nanostructured lipid carriers (NLCs) system for improving the ocular permeability of GCV. Several procedures were used for the preparation. Cold homogenization, solvent injection, and emulsifi cationultrasonication methods. A mixture of palmitic acid (PA) and oleic acid (OA) as a lipid matrix, cremophore EL, and transcutol HP wer
... Show MoreSustainable crop production in a coarse soil texture is challenging due to high water permeability and low soil water holding capacity. In this paper, subsurface water retention technology (SWRT) through impermeable polyethylene membranes was placed at depth 35 cm below ground surface and within the root zone to evaluate and compare the impact of these membranes and control treatment (without using the membranes) on yield and water use efficiency of eggplant inside the greenhouse. The study was conducted in Al-Fahamah Township, Baghdad, Iraq during spring growing season 2017. Results demonstrated the yield and water use efficiencies were 3.483 kg/m2 and 5.653 kg/m3, respectively for SWRT treatment p
... Show MoreThis paper present a study about effect of the random phase and expansion of the scale sampling factors to improve the monochrome image hologram and compared it with previous produced others. Matlab software is used to synthesize and reconstruction hologram.
Computer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi
... Show MoreThe major objective of this study is to establish a network of Ground Control Points-GCPs which can use it as a reference for any engineering project. Total Station (type: Nikon Nivo 5.C), Optical Level and Garmin Navigator GPS were used to perform traversing. Traversing measurement was achieved by using nine points covered the selected area irregularly. Near Civil Engineering Department at Baghdad University Al-jadiriya, an attempt has been made to assess the accuracy of GPS by comparing the data obtained from the Total Station. The average error of this method is 3.326 m with the highest coefficient of determination (R2) is 0.077 m observed in Northing. While in
