Preferred Language
Articles
/
joe-394
Optimal Location of Static Synchronous Compensator (STATCOM) for IEEE 5-Bus Standard System Using Genetic Algorithm
...Show More Authors

Heuristic approaches are traditionally applied to find the optimal size and optimal location of Flexible AC Transmission Systems (FACTS) devices in power systems. Genetic Algorithm (GA) technique has been applied to solve power engineering optimization problems giving better results than classical methods. This paper shows the application of GA for optimal sizing and allocation of a Static Compensator (STATCOM) in a power system. STATCOM devices used to increase transmission systems capacity and enhance voltage stability by regulate the voltages at its terminal by controlling the amount of reactive power injected into or absorbed from the power system. IEEE 5-bus standard system is used as an example to illustrate the technique used. Results showed that the STATCOM was able to reduce the voltage deviation and the apparent power losses with minimum possible size of installation capacity for STATCOM devices. GA plays its own requirements by finding best location and best size of STATCOM devices.

 

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 01 2019
Journal Name
Indian Journal Of Ecology
Evaluation of maize hybrids, their inbred lines and estimation of genetic divergence based on cluster analysis
...Show More Authors

Scopus (4)
Scopus
Publication Date
Tue Jun 01 2021
Journal Name
International Journal Of Statistical
Evaluating the performance of introduced varieties of maize (Zea Mays L.) and estimating some genetic parameters
...Show More Authors

Scopus (13)
Scopus
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc

... Show More
View Publication
Crossref
Publication Date
Wed May 06 2015
Journal Name
16th Conference In Natural Science And Mathematics
Efficient digital Image filtering method based on fuzzy algorithm
...Show More Authors

Recently, Image enhancement techniques can be represented as one of the most significant topics in the field of digital image processing. The basic problem in the enhancement method is how to remove noise or improve digital image details. In the current research a method for digital image de-noising and its detail sharpening/highlighted was proposed. The proposed approach uses fuzzy logic technique to process each pixel inside entire image, and then take the decision if it is noisy or need more processing for highlighting. This issue is performed by examining the degree of association with neighboring elements based on fuzzy algorithm. The proposed de-noising approach was evaluated by some standard images after corrupting them with impulse

... Show More
View Publication
Publication Date
Wed Jan 01 2020
Journal Name
Aip Conference Proceedings
Developing a lightweight cryptographic algorithm based on DNA computing
...Show More Authors

This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of

... Show More
Crossref (7)
Crossref
Publication Date
Sat Mar 01 2014
Journal Name
Glob. J. Mol. Evol. Genom
Genetic diversity and relationships among Verbascum species in Iraq by RAPD-PCR technique
...Show More Authors

Publication Date
Wed Feb 22 2023
Journal Name
Iraqi Journal Of Science
Synthesis, Identification and evaluation of antibacterial activity of some new substituted N-benzyl-5-Bromo Isatin
...Show More Authors

This research includes synthesis of new heterocyclic derivatives of N-benzyl-5-bromoisatin. New 1, 2, 4-triazole, oxazoline and thiazoline derivatives of [N-benzyl-5-bromo-3-(Ethyliminoacetate)-indole-2-one] (2) have been synthesized. The preparation process started by the reaction of 5-bromoisatin with sodium hydride in dimethylformamide (DMF) at 0°C, gave suspension of sodium salt of 5-bromoisatin and subsequent reaction with benzylchloride to give N-benzyl-5-bromoisatin (1). Compound (1) reacted with ethylglycinate (Schiff base) obtained the intermediate compound (2) which reacted with different reagents in two ways. The first way, compound (2) reacted with (hydrazine hydrate, semicarbazide, phenylsemicarbazide and thiosemicarbazide)

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 26 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Design, Synthesis and Kinetic Study of Coumarin-Based Mutual Prodrug of 5-Fluorouracil and Dichloroacetic acid
...Show More Authors

On the basis of known coumarin-based prodrug system, a novel coumarin-based mutual prodrug of 5-fluorouracil and dichloroacetic acid was designed, synthesized and evaluated as a promising oral chemotherapeutic agent basing on in vitro stability study in HCl buffer (pH 1.2) and in phosphate buffer (pH 7.4), as well as in vitro release study in human serum. The chemical structure of prodrug was confirmed by analyzing its FTIR, 1H NMR, 13C NMR and MS-ESI spectra. The results of in vitro kinetic study indicated that the prodrug was significantly stable in HCl and in phosphate buffers, and was hydrolyzed in human serum followed pseudo first order kinetics.

Keywords: Coumarin-bas

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Preparation of some azo compounds by diazotization and coupling of 2- amino -5 – thiol -1,3,4- thiadizaole
...Show More Authors

2- amino -5- thiol-1,3,4- thiadiazole (S1) was prepared by cyclic locking of thiosemicarbazide in the presence of anhydrous sodium carbonate and CS2. diazotization of (S1) compound gave diazonium salt (S2) that reacts with different activated aromatic compounds to get the following azo compounds ,2 [(4- aminophenyl) diazenyl ] 1,3,4- thiazdiazole-5- thiol (S3) ,2-[4-amino- 1-naphthyl diazenyl] -1,3,4 – thiazdiazole-5-thiol (S4) , 3-amino-4-[(5- mercapto -1,3,4- thiadiazole -2-yl) diazenyl ] phenol(S5) ,1-[(5-mercapto-1,3,4-thiadiazole-2-yl) diazenyl] -2-naphthol (S6) , 5-{[4-(dimethylamino) phenyl] diazenyl}-1,3,4-thiadiazole-2- thiol(S7) ,5-{[4-(diethylamino) phenyl] diazenyl}-1,3,4- thiadiazole-2- thiol(S8) ,2- amino-5-[(5-mercapto-1,3

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Oct 28 2015
Journal Name
Journal Of Mathematics And System Science
Simulating Particle Swarm Optimization Algorithm to Estimate Likelihood Function of ARMA(1, 1) Model
...Show More Authors

Crossref