Preferred Language
Articles
/
joe-2065
Application of Wavelet Packet and S Transforms for Differential Protection of Power Transformer
...Show More Authors

The differential protection of power transformers appears to be more difficult than any type of protection for any other part or element in a power system. Such difficulties arise from the existence of the magnetizing inrush phenomenon. Therefore, it is necessary to recognize between inrush current and the current arise from internal faults. In this paper, two approaches based on wavelet packet transform (WPT) and S-transform (ST) are applied to recognize different types of currents following in the transformer. In WPT approach, the selection of optimal mother wavelet and the optimal number of resolution is carried out using minimum description length (MDL) criteria before taking the decision for the extraction features from the WPT tree. In ST approach,
the spectral energy index and the standard deviation (STD) are calculated from the S-matrix obtained by discrete S-transform. The two approaches are tested for generating a trip signal and disconnecting the transformer supply experimentally using 1KVA, 220/110V, 50Hz, ∆ / Y threephase transformer. The experimental results show that the trip signal is initiated faster in WPT approach while the transformer is disconnected from the supply after a delay of 10-15msec in the
two approaches due to computer interface and the relay circuit used.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Apr 01 2025
Journal Name
Materials Today Communications
Engineered Composition and Morphology: Unveiling 2D Bi₂(W₁₋ₓMox)O₆ Nanosheets for Enhanced Optical and Ionizing Protection Applications
...Show More Authors

View Publication
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu May 14 2026
Journal Name
Journal Of Baghdad College Of Dentistry
Immunohistochemical expression of MMP9, as a marker of local invasion in Hodgkin’s and Non-Hodgkin’s lymphoma of the head and neck region
...Show More Authors

Background: Malignant lymphoma is the generic term given to tumors of the lymphoid system and specifically of lymphocytes and their precursor cells, While all lymphomas are malignant neoplasms, there is a wide spectrum of clinical behavior, with some following an indolent clinical course and others behaving in an aggressive manner (will causing death in a short time frame if left untreated). The metastatic process involves intravasation and extravasation of tumor cells, followed by reimplantation of tumor cells, formation of a new tumor stoma, Degradation of the extracellular matrix and components of the basement membrane by proteases facilitates the detachment of tumor cells, their crossing of tissue boundaries, and invasion into adjacent

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Interdisciplinary Mathematics
On S-acts and bounded linear operators
...Show More Authors

The relation between faithful, finitely generated, separated acts and the one-to-one operators was investigated, and the associated S-act of coshT and its attributes have been examined. In this paper, we proved for any bounded Linear operators T, VcoshT is faithful and separated S-act, and if a Banach space V is finite-dimensional, VcoshT is infinitely generated.

View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Sat Dec 01 2012
Journal Name
2012 Ieee-embs Conference On Biomedical Engineering And Sciences
Compatibility of mother wavelet functions with the electroencephalographic signal
...Show More Authors

View Publication
Scopus (27)
Crossref (22)
Scopus Crossref
Publication Date
Sat Nov 05 2022
Journal Name
Sensors
Enhancement of the CAST Block Algorithm Based on Novel S-Box for Image Encryption
...Show More Authors

Background and Aim: due to the rapid growth of data communication and multimedia system applications, security becomes a critical issue in the communication and storage of images. This study aims to improve encryption and decryption for various types of images by decreasing time consumption and strengthening security. Methodology: An algorithm is proposed for encrypting images based on the Carlisle Adams and Stafford Tavares CAST block cipher algorithm with 3D and 2D logistic maps. A chaotic function that increases the randomness in the encrypted data and images, thereby breaking the relation sequence through the encryption procedure, is introduced. The time is decreased by using three secure and private S-Boxes rather than using si

... Show More
View Publication
Crossref (20)
Crossref
Publication Date
Thu Jun 30 2022
Journal Name
Muthanna Journal For Agricultural Sciences
Developing and testing of automated sprayer for agrochemicals application trials in Iraq
...Show More Authors

The field experiment was conducted with the aim of developing and testing an automatic sprayer for agricultural spray experiments and studying the effect of spray pressure, spray speed and spray height on the spraying process. The effects of the major spraying factors (pressure, speed, and height) on the spraying performance of the automatic sprayer were studied. This study included several traits: First - the drop sizes - Second - the penetration of the spray into the vegetation cover - Third, the spray wasted. The results showed: - First: - Increase in coverage percentage when using the first speed, 2 km / h, which amounted to 26.85%. An increment in the spraying penetration of the vegetation cover was observed at the second speed

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Mon Jan 29 2024
Journal Name
Advances In Systems Analysis, Software Engineering, And High Performance Computing
Evaluating Antivirus Effectiveness Against Malware in Ascending Order for Increasing Blockchain Endpoint Protection
...Show More Authors

Blockchain represents a new promising technology with a huge economic impact resulting from its uses in various fields such as digital currency and banking; malware represents a serious threat to users, and there are many differences in the effectiveness of antivirus software used to deal with the problem of malware. This chapter has developed a coefficient for measuring the effectiveness of antivirus software. This chapter evaluates the effectiveness of antivirus software by conducting tests on a group of protection programs using a folder containing an amount of data. These programs are applied to combat viruses contained in this folder. The study revealed that the effectiveness of antivirus software is as follows: AVG scored 0%,

... Show More
View Publication
Crossref (14)
Crossref
Publication Date
Tue Jul 01 2014
Journal Name
Political Sciences Journal
For assuming the presidency of the political power in contemporary Islamic thought
...Show More Authors

مدة تولي رئاسة السلطة في الفكر السياسي الاسلامي المعاصر

View Publication Preview PDF
Crossref
Publication Date
Sun Nov 14 2021
Journal Name
2021 North American Power Symposium (naps)
Laplace Domain Modeling of Power Components for Transient Converter-Grid Interaction Studies
...Show More Authors

This paper introduces a Laplace-based modeling approach for the study of transient converter-grid interactions. The proposed approach is based on the development of two-port admittance models of converters and other components, combined with the use of numerical Laplace transforms. The application of a frequency domain method is aimed at the accurate and straightforward computation of transient system responses while preserving the wideband frequency characteristics of power components, such as those due to the use of high frequency semiconductive switches, electromagnetic interaction between inductive and capacitive components, as well as wave propagation and frequency dependence in transmission systems.

View Publication
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Fri Apr 01 2011
Journal Name
Desalination
Cathodic protection system of copper–zinc–saline water in presence of bacteria
...Show More Authors

Rate of zinc consumption during the cathodic protection of copper pipeline which carries saline water was measured by weight loss technique in the absence and presence of bacteria. Variables studied were solution flow rate, temperature, time and NaCl concentration. It was found that within the present range of variables; the rate of zinc consumption increases with the increase of all operating conditions. The presence of bacteria increases the zinc consumption. Fourth order multi-term model and one-term model were suggested to represent the consumption data. Nonlinear regression analysis was used to estimate the coefficients of these models, while statistical analysis was used to determine the effect of each coefficient. Both models were re

... Show More
Crossref (36)
Crossref