Preferred Language
Articles
/
joe-847
Demand Priority in a Power System With Wind Power Contribution Load Shedding Scheme Based
...Show More Authors

The load shedding  scheme has been extensively implemented as a fast solution for unbalance conditions. Therefore, it's crucial to investigate supply-demand balancing in order to protect the network from collapsing and to sustain stability as possible, however its implementation is mostly undesirable. One of the solutions to minimize the amount of load shedding is the integration renewable energy  resources, such as wind power, in the electric power generation could contribute significantly to minimizing power cuts as it is ability to positively improving the stability of the electric grid. In this paper propose a method for shedding the load base on the priority demands with incorporating the wind power generated. The higher priority demands are fed with a reliable wind energy resource in order to protect them from shedding under contingency condition such as high overloading by the real time monitoring of the network accompanied with power reducing for the lower priority demands. The simulation results prove effectiveness and practicality of the applied method paving the way for possible applications in power systems.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Dec 01 2018
Journal Name
2018 Third Scientific Conference Of Electrical Engineering (scee)
A UWB Monopole Antenna Design based RF Energy Harvesting Technology
...Show More Authors

Recently, wireless charging based RF harvesting has interfered our lives [1] significantly through the different applications including biomedical, military, IoT, RF energy harvesting, IT-care, and RFID technologies. Wirelessly powered low energy devices become significantly essential for a wide spectrum of sensing applications [1]. Such devices require for low energy resources from sunlight, mechanical vibration, thermal gradients, convection flows or other forms of harvestable energy [2]. One of the emerging power extraction resources based on passive devices is harvesting radio frequency (RF) signals powers [3]–[5]. Such applications need devices that can be organized in very large numbers, so, making separate node battery impractical.

... Show More
View Publication
Scopus (14)
Crossref (9)
Scopus Crossref
Publication Date
Sat Feb 21 2026
Journal Name
Journal Of Engineering
Construction of a General-Purpose Infrastructure for Rfid – Based Applications
...Show More Authors

View Publication
Publication Date
Sat Sep 30 2017
Journal Name
Al-khwarizmi Engineering Journal
Programming a Pneumatic Processes Sequence based on PLC by Demonstration
...Show More Authors

Abstract

Pneumatic processes sequence (PPS) is used widely in industrial applications. It is common to do a predetermined PPS to achieve a specific larger task within the industrial application like the PPS achieved by the pick and place industrial robot arm. This sequence may require change depending on changing the required task and usually this requires the programmer intervention to change the sequence’ sprogram, which is costly and may take long time. In this research a PLC-based PPS control system is designed and implemented, in which the PPS is programmed by demonstration. The PPS could be changed by demonstrating the new required sequence via the user by following simple series of manual steps without h

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Apr 01 2011
Journal Name
Al-mustansiriyah Journal Of Science
A Genetic Algorithm Based Approach For Generating Unit Maintenance Scheduling
...Show More Authors

Publication Date
Mon Jun 05 2023
Journal Name
Journal Of Engineering
A Fuzzy Logic Controller Based Vector Control of IPMSM Drives
...Show More Authors

This paper explores a fuzzy-logic based speed controller of an interior permanent magnet synchronous motor (IPMSM) drive based on vector control. PI controllers were mostly used in a speed control loop based field oriented control of an IPMSM. The fundamentals of fuzzy logic algorithms as related to drive control applications are illustrated. A complete comparison between two tuning algorithms of the classical PI controller and the fuzzy PI controller is explained. A simplified fuzzy logic controller (FLC) for the IPMSM drive has been found to maintain high performance standards with a much simpler and less computation implementation. The Matlab simulink results have been given for different mechanical operating conditions. The simulated

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Oct 01 2008
Journal Name
2008 First International Conference On Distributed Framework And Applications
A strategy for Grid based t-way test data generation
...Show More Authors

View Publication
Scopus (22)
Crossref (17)
Scopus Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
A New Cipher Based on Feistel Structure and Chaotic Maps
...Show More Authors

Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,

            While using chaotic maps, in the suggested system, called

... Show More
View Publication Preview PDF
Scopus (22)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sat Oct 01 2022
Journal Name
Baghdad Science Journal
A Crime Data Analysis of Prediction Based on Classification Approaches
...Show More Authors

Crime is considered as an unlawful activity of all kinds and it is punished by law. Crimes have an impact on a society's quality of life and economic development. With a large rise in crime globally, there is a necessity to analyze crime data to bring down the rate of crime. This encourages the police and people to occupy the required measures and more effectively restricting the crimes. The purpose of this research is to develop predictive models that can aid in crime pattern analysis and thus support the Boston department's crime prevention efforts. The geographical location factor has been adopted in our model, and this is due to its being an influential factor in several situations, whether it is traveling to a specific area or livin

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Sat Oct 29 2022
Journal Name
Computers
Intelligent Robotic Welding Based on a Computer Vision Technology Approach
...Show More Authors

Robots have become an essential part of modern industries in welding departments to increase the accuracy and rate of production. The intelligent detection of welding line edges to start the weld in a proper position is very important. This work introduces a new approach using image processing to detect welding lines by tracking the edges of plates according to the required speed by three degrees of a freedom robotic arm. The two different algorithms achieved in the developed approach are the edge detection and top-hat transformation. An adaptive neuro-fuzzy inference system ANFIS was used to choose the best forward and inverse kinematics of the robot. MIG welding at the end-effector was applied as a tool in this system, and the wel

... Show More
View Publication Preview PDF
Scopus (14)
Crossref (13)
Scopus Crossref