Preferred Language
Articles
/
joe-2065
Application of Wavelet Packet and S Transforms for Differential Protection of Power Transformer
...Show More Authors

The differential protection of power transformers appears to be more difficult than any type of protection for any other part or element in a power system. Such difficulties arise from the existence of the magnetizing inrush phenomenon. Therefore, it is necessary to recognize between inrush current and the current arise from internal faults. In this paper, two approaches based on wavelet packet transform (WPT) and S-transform (ST) are applied to recognize different types of currents following in the transformer. In WPT approach, the selection of optimal mother wavelet and the optimal number of resolution is carried out using minimum description length (MDL) criteria before taking the decision for the extraction features from the WPT tree. In ST approach,
the spectral energy index and the standard deviation (STD) are calculated from the S-matrix obtained by discrete S-transform. The two approaches are tested for generating a trip signal and disconnecting the transformer supply experimentally using 1KVA, 220/110V, 50Hz, ∆ / Y threephase transformer. The experimental results show that the trip signal is initiated faster in WPT approach while the transformer is disconnected from the supply after a delay of 10-15msec in the
two approaches due to computer interface and the relay circuit used.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Periodicals Of Engineering And Natural Sciences
Steganography using dual tree complex wavelet transform with LSB indicator technique
...Show More Authors

Image steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p

... Show More
Preview PDF
Scopus (5)
Crossref (5)
Scopus Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Theoretical Studies of Sum Optical Properties for InAs (001) by Surface Differential Reflectivity
...Show More Authors

The real and imaginary part of complex dielectric constant for InAs(001) by adsorption of oxsagen atoms has been calculated, using numerical analysis method (non-linear least square fitting). As a result a mathematical model built-up and the final result show a fairly good agreement with other genuine published works.

View Publication Preview PDF
Crossref
Publication Date
Mon Jul 01 2019
Journal Name
Journal Of Physics: Conference Series
Fusion Power Density and Radiation Losses Characteristics for Tritium Fusion Reactions
...Show More Authors

A new data for Fusion power density has been obtained for T-3He and T-T fusion reactions, power density is a substantial term in the researches related to the fusion energy generation and ignition calculations of magnetic confined systems. In the current work, thermal nuclear reactivities, power densities of a fusion reactors and the ignition condition inquiry are achieved by using a new and accurate formula of cross section, the maximum values of fusion power density for T-3He and TT reaction are 1.1×107 W/m3 at T=700 KeV and 4.7×106 W/m3 at T=500 KeV respectively, While Zeff suggested to be 1.44 for the two reactions. Bremsstrahlung radiation has also been determined to reaching self- sustaining reactors, Bremsstrahlung values are 4.5×

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Tue May 01 2018
Journal Name
International Journal Of Computer Trends And Technology
Two Phase Approach for Copyright Protection and Deduplication of Video Content in Cloud using H.264 and SHA-512
...Show More Authors

Cloud computing offers a new way of service provision by rearranging various resources over the Internet. The most important and popular cloud service is data storage. In order to preserve the privacy of data holders, data are often stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for big data storage and processing in the cloud. Traditional deduplication schemes cannot work on encrypted data. Among these data, digital videos are fairly huge in terms of storage cost and size; and techniques that can help the legal aspects of video owner such as copyright protection and reducing the cloud storage cost and size are always desired. This paper focuses on v

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 05 2010
Journal Name
Baghdad Science Journal
Stability of Nonlinear Systems of Fractional Order Differential Equations
...Show More Authors

In this paper, a sufficient condition for stability of a system of nonlinear multi-fractional order differential equations on a finite time interval with an illustrative example, has been presented to demonstrate our result. Also, an idea to extend our result on such system on an infinite time interval is suggested.

View Publication Preview PDF
Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Political Sciences Journal
US strategy in conflict management: between hard power and soft power
...Show More Authors

تتحقق اهداف الدول عبر توظيف امكانياتها ومواردها ، وهذا التوظيف يقترن بوسائل مختلفة باختلاف الامكانيات المتاحة. وتتفاوت هذه الوسائل ما بين الاكراه والترغيب ، واحياناً من الممكن استخدام كلا الوسيلتين ، وتندرج هذه الوسائل من حيث تصنيفها ضمن نوعين رئيسين هما: القوة الصلبة ]القوة العسكرية والاقتصادية[ والقوة الناعمة ]استخدام جميع ادوات الترغيب وتسخيرها من اجل ان تُعجب بها الدول الاخرى وتنصاع

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Apr 29 2016
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
The net effect of the nominal protection coefficients in the production of table eggs and poultry meat in Iraq For the period 1990- 2013.: The net effect of the nominal protection coefficients in the production of table eggs and poultry meat in Iraq For the period 1990- 2013.
...Show More Authors

The research aims to measure the net nominal protection coefficients for the products table eggs and poultry meat and the extent of its impact on domestic production volume for the period of 1990- 2013 has been the use of mathematical formulas simplified in the calculation of the transaction process with a view to the extent of support and protection offered by the state pricing policy for products Resources Sector Animal in Iraq and reach search Highlights and most important, there are volatile price state policy with regard to eggs and poultry meat, as it ranged net nominal protection coefficients between the larger and less than the right one, which means that values are unstable to support local producers or consumers, and can be The

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 01 2018
Journal Name
Journal Of Engineering
Flexible Genetic Algorithm Based Optimal Power Flow of Power Systems
...Show More Authors

Nowadays, the power plant is changing the power industry from a centralized and vertically integrated form into regional, competitive and functionally separate units. This is done with the future aims of increasing efficiency by better management and better employment of existing equipment and lower price of electricity to all types of customers while retaining a reliable system. This research is aimed to solve the optimal power flow (OPF) problem. The OPF is used to minimize the total generations fuel cost function. Optimal power flow may be single objective or multi objective function. In this thesis, an attempt is made to minimize the objective function with keeping the voltages magnitudes of all load buses, real outp

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed May 13 2020
Journal Name
Nonlinear Engineering
Two meshless methods for solving nonlinear ordinary differential equations in engineering and applied sciences
...Show More Authors
Abstract<p>In this paper, two meshless methods have been introduced to solve some nonlinear problems arising in engineering and applied sciences. These two methods include the operational matrix Bernstein polynomials and the operational matrix with Chebyshev polynomials. They provide an approximate solution by converting the nonlinear differential equation into a system of nonlinear algebraic equations, which is solved by using <italic>Mathematica</italic>® 10. Four applications, which are the well-known nonlinear problems: the magnetohydrodynamic squeezing fluid, the Jeffery-Hamel flow, the straight fin problem and the Falkner-Skan equation are presented and solved using the proposed methods. To ill</p> ... Show More
View Publication
Crossref (11)
Crossref
Publication Date
Wed May 13 2020
Journal Name
Nonlinear Engineering
Two meshless methods for solving nonlinear ordinary differential equations in engineering and applied sciences
...Show More Authors
Abstract<p>In this paper, two meshless methods have been introduced to solve some nonlinear problems arising in engineering and applied sciences. These two methods include the operational matrix Bernstein polynomials and the operational matrix with Chebyshev polynomials. They provide an approximate solution by converting the nonlinear differential equation into a system of nonlinear algebraic equations, which is solved by using <italic>Mathematica</italic>® 10. Four applications, which are the well-known nonlinear problems: the magnetohydrodynamic squeezing fluid, the Jeffery-Hamel flow, the straight fin problem and the Falkner-Skan equation are presented and solved using the proposed methods. To ill</p> ... Show More
Scopus (16)
Crossref (11)
Scopus Clarivate Crossref