Preferred Language
Articles
/
joe-374
A Real-Time Fuzzy Load Flow and Contingency Analysis Based on Gaussian Distribution System
...Show More Authors

Fuzzy logic is used to solve the load flow and contingency analysis problems, so decreasing computing time and its the best selection instead of the traditional methods. The proposed  method is very accurate with outstanding computation time, which made the fuzzy load flow (FLF) suitable for real time application for small- as well as large-scale power systems. In addition that, the FLF efficiently able to solve load flow problem of ill-conditioned power systems and contingency analysis. The FLF method using Gaussian membership function requires less number of iterations and less computing time than that required in the FLF method using triangular membership function. Using sparsity technique for the input Ybus sparse matrix data gives reduction in overall computation time and storage requirements. The performance of the used methods had been tested on two typical test systems being the IEEE 14-bus and 30-bus systems in addition to the 362-bus Iraqi National Grid. All the obtained results under normal operating conditions show that the computation time of the fuzzy Load Flow (FLF) is less than the fast decoupled load flow (FDLF).

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Feb 01 2022
Journal Name
Int. J. Nonlinear Anal. Appl.
Finger Vein Recognition Based on PCA and Fusion Convolutional Neural Network
...Show More Authors

Finger vein recognition and user identification is a relatively recent biometric recognition technology with a broad variety of applications, and biometric authentication is extensively employed in the information age. As one of the most essential authentication technologies available today, finger vein recognition captures our attention owing to its high level of security, dependability, and track record of performance. Embedded convolutional neural networks are based on the early or intermediate fusing of input. In early fusion, pictures are categorized according to their location in the input space. In this study, we employ a highly optimized network and late fusion rather than early fusion to create a Fusion convolutional neural network

... Show More
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Image encryption algorithm based on the density and 6D logistic map
...Show More Authors

One of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera

... Show More
View Publication
Scopus (22)
Crossref (10)
Scopus Crossref
Publication Date
Thu Oct 31 2013
Journal Name
Al-khwarizmi Engineering Journal
Theoretical and Practical Investigation of Blood Flow through Stenosed Coronary Lad Artery
...Show More Authors

Atherosclerosis is the most common causes of vascular diseases and it is associated with a restriction in the lumen of blood vessels. So; the study of blood flow in arteries is very important to understand the relation between hemodynamic characteristics of blood flow and the occurrence of atherosclerosis.

looking for the physical factors and correlations that explain the phenomena of existence the atherosclerosis disease in the proximal site of LAD artery in some people rather than others is achieved in this study by analysis data from coronary angiography as well as estimating the blood velocity from coronary angiography scans without having a required data on velocity by using some mathematical equations and physical laws. Fif

... Show More
View Publication Preview PDF
Publication Date
Wed Sep 01 2010
Journal Name
Journal Of Economics And Administrative Sciences
Finding Mixture Weibull Distribution
...Show More Authors

In this paper a new idea was introduced which is finding a new distribution from other distributions using mixing parameters; wi  where  0 < wi < 1 ­and . Therefore we can get many mixture distributions with a number of parameters. In this paper I introduced the idea of a mixture Weibull distribution which is produced from mixing two Weibull distributions; the first with two parameters, the scale parameter , and the shape parameter,  and the second also has the scale parameter , and the shape parameter,  in addition to the location parameter, . These two distributions were mixed using a new parameter which is the mixing parameter w which represents the proportion

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Oct 03 2025
Journal Name
Journal Of Baghdad College Of Dentistry
In-Vitro evaluation of load-deflection characteristics and force levels of nickel titanium orthodontic archwires
...Show More Authors

Background: Nickel-titanium (NiTi) archwires have become increasingly popular because of their ability to release constant light forces, which are especially useful during initial alignment and leveling phase. The aim of the present study was to investigate and compare the load–deflection characteristics of four commercially available NiTi archwires. Materials and methods: 200 NiTi 0.014, 0.016, 0.018, 0.016x0.022 and 0.019x0.025-inch nickel–titanium archwires from four different manufacturers (3M, Ortho Technology, Jiscop and Astar) were tested. The load-deflection properties of these archwires were evaluated by a full arch bending test in both palatal and gingival directionsat 37°C temperature using a universal material t

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
Fme Transaction
The influence of frictional facing thickness on the contact pressure distribution of multi-disc dry clutches
...Show More Authors

Frictional heat is generated when the clutch starts to engag. As a result of this operation the surface temperature is increased rapidly due to the difference in speed between the driving and driven parts. The influence of the thickness of frictional facing on the distribution of the contact pressure of the multi-disc clutches has been investigated using a numerical approach (the finite element method). The analysis of contact problem has been carried out for a multiple disc dry clutch (piston, clutch discs, separators and pressure plate). The results present the distribution of the contact pressure on all tShe surfaces of friction discs that existed in the friction clutch system. Axisymmetric finite element models have been developed to ac

... Show More
View Publication
Scopus (9)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Tue Jun 30 2020
Journal Name
Journal Of Planner And Development
Real estate acquisition barrier and its impact on urban development projects" Study Area: Infrastructure project in the capital Baghdad (North East Sewage Line project AL khansaa)
...Show More Authors

The increase the rates of natural growth, urbanization and continuous migration, this has generated constant pressure and, as a result, the capital city of Baghdad faces a number of challenges related to its urban environment, including the challenge of acquiring real estate.

 

 and this research examines the impact of these holdings, representing the main base from which the various projects originate Urban in all areas (economic, social, and recreational).

 

this leads us to the research problem of the obstacles that arise during the process of acquiring real estate to carry out development projects, and to achieve the objectives of research, namely (work to create a regulatory methodology

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 31 2012
Journal Name
Al-khwarizmi Engineering Journal
Experimental Study on the Impact of External Geometrical Shape on Free and Forced Convection Time Dependent Average Heat Transfer Coefficient during Cooling Process
...Show More Authors

In this research, an experimental study was conducted to high light the impact of the exterior shape of a cylindrical body on the forced and free convection heat transfer coefficients when the body is hold in the entrance of an air duct. The impact of changing the body location within the air duct and the air speed are also demonstrated. The cylinders were manufactured with circular, triangular and square sections of copper for its high thermal conductivity with appropriate dimensions, while maintaining the surface area of all shapes to be the same. Each cylinder was heated to a certain temperature and put inside the duct at certain locations. The temperature of the cylinder was then monitored. The heat transfer coefficient were then cal

... Show More
View Publication Preview PDF
Publication Date
Thu Feb 01 2018
Journal Name
Iet Signal Processing
Signal compression and enhancement using a new orthogonal‐polynomial‐based discrete transform
...Show More Authors

View Publication
Scopus (41)
Crossref (42)
Scopus Clarivate Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Journal Of Engineering
A An Authentication and Access Control Model for Healthcare based Cloud Services
...Show More Authors

Electronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s

... Show More
View Publication Preview PDF
Crossref (8)
Crossref