The differential protection of power transformers appears to be more difficult than any type of protection for any other part or element in a power system. Such difficulties arise from the existence of the magnetizing inrush phenomenon. Therefore, it is necessary to recognize between inrush current and the current arise from internal faults. In this paper, two approaches based on wavelet packet transform (WPT) and S-transform (ST) are applied to recognize different types of currents following in the transformer. In WPT approach, the selection of optimal mother wavelet and the optimal number of resolution is carried out using minimum description length (MDL) criteria before taking the decision for the extraction features from the WPT tree. In ST approach,
the spectral energy index and the standard deviation (STD) are calculated from the S-matrix obtained by discrete S-transform. The two approaches are tested for generating a trip signal and disconnecting the transformer supply experimentally using 1KVA, 220/110V, 50Hz, ∆ / Y threephase transformer. The experimental results show that the trip signal is initiated faster in WPT approach while the transformer is disconnected from the supply after a delay of 10-15msec in the
two approaches due to computer interface and the relay circuit used.
The polymer was used to inhibit the corrosion of copper metal in salt media in different concentrations at room temperature using potentiometric polarization measurement. The polymer was prepared by mixing (0.1 M) 4-Hydroxy aniline (C6H7NO) with (0.25M) of ammonium persulfate as the initiator using the electro-deposition technique. The polymer’s results showed that copper in (3.5%) NaCl had good corrosion resistance. The findings demonstrate that the %IE for polymer-induced copper corrosion is 89.32% at 10 ppm concentration as a result of the 4-hydroxy aniline polymer’s adsorption from salt solution on the surface of copper metal. The numbers from the polarization method and the acquired standard data agree well. The coated copper by po
... Show MoreThe polymer was used to inhibit the corrosion of copper metal in salt media in di erent concentrations at room temperature using potentiometric polarization measurement. The polymer was prepared by mixing (0.1 M) 4-Hydroxy aniline (C6H7NO) with (0.25M) of ammonium persulfate as the initiator using the electro-deposition technique. The polymer’s results showed that copper in (3.5%) NaCl had good corrosion resistance. The ndings demonstrate that the %IE for polymer-induced copper corrosion is 89.32% at 10 ppm concentration as a result of the 4-hydroxy aniline polymer’s adsorption from salt solution on the surface of copper metal. The numbers from the polarization method and the acquired standard data agree well. The coated copper by poly
... Show MoreAn approximate solution of the liner system of ntegral cquations fot both fredholm(SFIEs)and Volterra(SIES)types has been derived using taylor series expansion.The solusion is essentailly
Sarcophaga africa Fall. considered to be medical and veterinary importance, therefore, its third larval instar was described by digital camera under compound and dissecting microscope. This description includes spines type, shaped and cephalopharyngeal skeleton. Furthermore the anterior and posterior spiracles were also studied.
في تعزيز بيئة الانتاج الرشيق استخدام اسلوب S -5
Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc
... Show More