The differential protection of power transformers appears to be more difficult than any type of protection for any other part or element in a power system. Such difficulties arise from the existence of the magnetizing inrush phenomenon. Therefore, it is necessary to recognize between inrush current and the current arise from internal faults. In this paper, two approaches based on wavelet packet transform (WPT) and S-transform (ST) are applied to recognize different types of currents following in the transformer. In WPT approach, the selection of optimal mother wavelet and the optimal number of resolution is carried out using minimum description length (MDL) criteria before taking the decision for the extraction features from the WPT tree
... Show MoreOscillation criteria are obtained for all solutions of the first-order linear delay differential equations with positive and negative coefficients where we established some sufficient conditions so that every solution of (1.1) oscillate. This paper generalized the results in [11]. Some examples are considered to illustrate our main results.
Although Friction Stir Welding (FSW) is broadly invested in joining aluminum alloys, welding T-joint configurations display revealing challenges due to the interface’s intricate material flow and stress development. Defect formation, including voids and lack of fusion, as well as sudden response forces and residual stresses, can substantially undermine joint performance. This study presents an innovative three-dimensional finite element model to predict the coupled thermomechanical conditions experienced during the friction stir welding (FSW) of AA 6061-T6 lap T-joint design. The study identifies the geometrical parameters of the FSW tool, including shoulder and pin diameters, as well as pin form (cylindrical and tapered), as critical var
... Show MoreCloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many
... Show MoreThe study included three topics, the definition of the personality of Imam al-Bazazi, his scientific biography, his elders, his writings, his students and his death, selected issues of his weightiness related to purity, and the Imam al-Bazazi is Muhammad ibn Muhammad ibnShihabibn Yusuf, known in al-Kardari al-Hanafi al-Balzazi. The other doctrines, the author relied in his book on the sources of the previous scholars of the Hanafis, and make them the basis in his book, the author did not adopt the definitions of language and terminology, and rarely mention the evidence Shariah adopted by scientists in their opinions, and limited to mention only opinions, In front of the first issue spotlessly water user, and the second issue that sleep l
... Show MoreE.M. Forster (1879-1970) is one of the important novelists who dealt with the personal and social lives of the people in England during the early beginning of the twentieth century. During his literary career, he developed gradually his views about man and his position in society.
In his first novel, Where Angels Fear to Tread (1902), the focus is laid on local and personal issues in the lives of the characters. It is limited to the relations between neighbours in small communities. Though the setting is shifted to Italy, Forster does not make full use of this shift to present cultural or racial conflicts; rather he limits his plot to the private tr
... Show MoreIn this research design was treated gap laser mathematically and practically Bashaddam model Raasi simple and new and we have found that there is a good match in the practical and theoretical results
Graphic design art depends on changeable cognitive systems which their relation and items relying on the accumulation of humane knowledge and thong and the humane look to the venality and his explanation to the relation between him and the venality , then the graphic design art becomes an important item of this accumulation knowledge besides , it is on kind of knowledge kinds . The technological advancement in communication lauds to increasing in communication media and design methods , where the computer and its application in graphic design promotes the design process because of it's capalebities which lead to in creasing in production process , minimizing the cost and time and achieving creative and aesthetic aspect because of it's fe
... Show More