Preferred Language
Articles
/
joe-430
A Real-Coded Genetic Algorithm with System Reduction and Restoration for Rapid and Reliable Power Flow Solution of Power Systems
...Show More Authors

The paper presents a highly accurate power flow solution, reducing the possibility of ending at local minima, by using Real-Coded Genetic Algorithm (RCGA) with system reduction and restoration. The proposed method (RCGA) is modified to reduce the total computing time by reducing the system in size to that of the generator buses, which, for any realistic system, will be smaller in number, and the load buses are eliminated. Then solving the power flow problem for the generator buses only by real-coded GA to calculate the voltage phase angles, whereas the voltage magnitudes are specified resulted in reduced computation time for the solution. Then the system is restored by calculating the voltages of the load buses in terms of the calculated voltages of the generator buses, after a derivation of equations for calculating the voltages of the load busbars. The proposed method was demonstrated on 14-bus IEEE test systems and the practical system 362-busbar IRAQI NATIONAL GRID (ING). The proposed method has reliable convergence, a highly accurate solution and less computing time for on-line applications. The method can conveniently be applied for on-line analysis and planning studies of large power systems.                                                           

 

  

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Mar 18 2020
Journal Name
Baghdad Science Journal
The A Comparative Study of the Adsorption of Crystal Violet Dye from Aqueous Solution on Rice Husk and Charcoal
...Show More Authors

            In this work, the adsorption of crystal violet dye from aqueous solution on charcoal and rice husk has been investigated, where the impact of variable factors (contact time; the dosage of adsorbent, pH, temperature, and ionic strength) have been studied. It has been found that charcoal and rice husk have an appropriate adsorption limit with regards to the expulsion of crystal violet dye from fluid arrangements. The harmony adsorption is for all intents and purposes accomplished in 45 min for charcoal and 60 min for rice husk. The amount of crystal violet dye adsorbed (0.4 g of charcoal and 0.5 g of rice husk) increased with an increasing pH and the value of 11 is the best

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Mar 18 2020
Journal Name
Baghdad Science Journal
The A Comparative Study of the Adsorption of Crystal Violet Dye from Aqueous Solution on Rice Husk and Charcoal
...Show More Authors

n this work, the adsorption of crystal violet dye from aqueous solution on charcoal and rice husk has been investigated, where the impact of variable factors (contact time; the dosage of adsorbent, pH, temperature, and ionic strength) have been studied. It has been found that charcoal and rice husk have an appropriate adsorption limit with regards to the expulsion of crystal violet dye from fluid arrangements. The harmony adsorption is for all intents and purposes accomplished in 45 min for charcoal and 60 min for rice husk. The amount of crystal violet dye adsorbed (0.4 g of charcoal and 0.5 g of rice husk) increased with an increasing pH and the value of 11 is the best. The effect of temperature on the adsorption process was studied

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Dec 14 2016
Journal Name
Journal Of Baghdad College Of Dentistry
Gingival Marginal Leakage of Different Tooth Colored Materials Combination as an Intermediate Layer in Class II Composite Restoration (A Comparative In Vitro Study)
...Show More Authors

Background: The aim of this in vitro study was to evaluate and compare the microleakage between Vertise Flow T M composite material and other conventional (Filtek Z250, riva light cure and SDR) composite materials when restoring CII mesial box only cavity at gingival margin through die penetration test Materials and methods: Forty maxillary first premolars were prepared with class II box design only cavities. Samples were divided into four groups of ten teeth according to material used: group I (FiltekZ250 only). Group II (SDR+FiltekZ250). Group III (Vertise Flow +FiltekZ250). Group IV (Riva light cure+ FiltekZ250). After 24 hrs. immersion in 2% in methylene blue, samples were sectioned and micro leakage was estimated. Results: None of the

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Oct 28 2022
Journal Name
Political Sciences Journal
A future view for the political systems of the Arab Gulf states After normalization ... the United Arab Emirates as a case study
...Show More Authors

The dangers of (Israel's) integration with Arab countries in the middle east region will threaten the Arab security structure dimension, which the latter makes the Arab regional system vulnerable for distortion due to its nominal and symbolic value which is far from the Arab self and questioning with its effectiveness in comparing with the real capabilities to Arab countries in achieving the common targets. So, how to assess the different problems that began to hit the structure of the Arab regional system? and how to pledge an allegiance after putting forward what is known as the American Deal of the Century for the administration of former US President Donald Trump for making another step toward normalization with (Israel)?. The reveal

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Nov 01 2024
Journal Name
Plos One
Psychological flow and mental immunity as predictors of job performance for mental health care practitioners during COVID-19
...Show More Authors

Background Numerous studies indicated that workers in the health sector suffer from work stress, hassles, and mental health problems associated with COVID-19, which negatively affect the completion of their job tasks. These studies pointed out the need to search for mechanisms that enable workers to cope with job stress effectively. Objectives This study investigated psychological flow, mental immunity, and job performance levels among the mental health workforce in Saudi Arabia. It also tried to reveal the psychological flow (PF) and mental immunity (MI) predictability of job performance (JP). Method A correlational survey design was employed. The study sample consisted of 120 mental health care practitioners (therapists, psychologists, co

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue May 10 2022
Journal Name
Himalayan Journal Of Economics And Business Management
Information Systems Ethics and Its Role in Achieving Banking Discrimination Analytical Research in a Sample of Private Banks
...Show More Authors

The research aims to shed light on the ethics of information systems and their role in achieving banking excellence for a sample of private banks in the province of Baghdad. It is important to focus on studying the ethics of banking information systems, which has become one of the most important basic and strategic resources that banks rely on to achieve outstanding performance. Achieving banking leadership in the Iraqi banking market. The researchers adopted the descriptive analytical approach to the research, and the questionnaire was considered as a main tool for collecting information in addition to personal interviews. The research reached the most important results that there is an acceptable correlation relationship between the ethic

... Show More
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc

... Show More
View Publication
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Aip Conference Proceedings
Developing a lightweight cryptographic algorithm based on DNA computing
...Show More Authors

This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of

... Show More
Crossref (7)
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm
...Show More Authors

Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Fri Oct 02 2020
Journal Name
International Journal Of Pharmaceutical Research
Detection of Toxoplasma gondii in blood and milk of infected goats and Pregnant women by Rapid test cassette and conventional -PCR methods in AL-Qadisiyah province, Iraq
...Show More Authors

Aim: The study aimed to investigate the presence of the specific B1 gene T gondii in blood and milk samples from natural infected cattle and pregnant women (16-30 weeks) whose examination performed by the officers at the women's and children's Educational hospital in Al-Diwaniyah, Iraq. Materials and methods: A total of 150 serum samplings were collected analysed and scanned for Anti-T gondi antibodies (75 naturally-infected goats and 75 pregnant women with Toxoplasma). Polymerase chain reaction (PCR) was used to detect of B1(399pb) gene in 26 goat's blood samples and 7 samples from pregnant women. Results: A quick-test anti-cassette gondii results showed 26 positive samples of goats in a percentage of 34,666 percent, while a higher percent

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref