Preferred Language
Articles
/
uhZWiocBVTCNdQwCcFS8
A review on power consumption reduction techniques on OFDM
...Show More Authors

Scopus
Publication Date
Wed Jul 01 2020
Journal Name
Journal Of Engineering
Utilizing Load and Loss Factors in Determination of the Technical Power Losses in Distribution System’s Feeders: Case Study
...Show More Authors

This study uses load factor and loss factor to determine the power losses of the electrical feeders. An approach is presented to calculate the power losses in the distribution system. The feeder’s technical data and daily operation recorded data are used to calculate and analyze power losses.

This paper presents more realistic method for calculating the power losses based on load and loss factors instead of the traditional methods of calculating the power losses that uses the RMS value of the load current which not consider the load varying with respect to the time. Eight 11kV feeders are taken as a case study for our work to calculate load factor, loss factor and power losses. Four of them (F40, F42, F43 and F

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue May 15 2018
Pre‐low noise amplifier (LNA) filtering linearisation method for low‐power ultra‐wideband complementary metal oxide semiconductor LNA
...Show More Authors

View Publication
Crossref (3)
Clarivate Crossref
Publication Date
Thu Jan 02 2025
Journal Name
مجلة كلية القانون للعلوم القانونية والسياسية
Employment of Chinese Cyber Power in Regional Conflict Management Strategies The Case of Conflict with Japan After 2014
...Show More Authors

Abstract:- Cyberspace is a new arena for conflict between international powers, especially since the cost of cyber-conflict is less than its traditional warfare counterparts regardless of the nature of the weapons used, whether traditional or non-traditional. Cyber conflict is necessarily based on strategies to deter, attack, and defend. The aim of the cybercrime conflict is to ensure the defensive sufficiency of the state, ensuring its national security and safeguarding its supreme interests. Despite Japan-China relations characterized by convergence and cooperation in post-Cold War economic spheres, Japan continues to retain the growing Chinese influence in East Asia. These variables prompted Japan to announce a hedging strategy due to un

... Show More
View Publication
Publication Date
Fri Sep 01 2017
Journal Name
2017 9th Computer Science And Electronic Engineering (ceec)
Modelling the power cost and trade-off of live migration the virtual machines in cloud-radio access networks
...Show More Authors

View Publication
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Sun Jan 14 2018
Journal Name
Journal Of Engineering
A Nonlinear MIMO-PID Neural Controller Design for Vehicle Lateral Dynamics model based on Modified Elman Neural Network
...Show More Authors

This paper presents a new design of a nonlinear multi-input multi-output PID neural controller of the active brake steering force and the active front steering angle for a 2-DOF vehicle model based on modified Elman recurrent neural. The goal of this work is to achieve the stability and to improve the vehicle dynamic’s performance through achieving the desired yaw rate and reducing the lateral velocity of the vehicle in a minimum time period for preventing the vehicle from slipping out the road curvature by using two active control actions: the front steering angle and the brake steering force. Bacterial forging optimization algorithm is used to adjust the parameters weights of the proposed controller. Simulation resul

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2025
Journal Name
Iv. International Rimar Congress Of Pure, Applied Sciences
A New Intrusion Detection Approach Based on RNA Encoding and K-Means Clustering Algorithm Using KDD-Cup99 Dataset
...Show More Authors

Intrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis

... Show More
Preview PDF
Publication Date
Wed Feb 01 2023
Journal Name
Journal Of Engineering
Study the Effect of Adding Aluminum Nanoparticles to a Smart Alloy (Cu-Al-Ni) on Hardness and Porosity
...Show More Authors

This work deals with the effect of adding aluminum nanoparticles on the mechanical properties, micro-hardness and porosity of memory-shape alloys (Cu-Al-Ni). These alloys have wide applications in various industrial fields such as (high damping compounds and self-lubricating applications). The samples are manufactured using the powder metallurgy method, which involved pressing in only one direction and sintered in a furnace surrounded by an inert gas. Four percentages (0%, 5%, 10%, and 15%) of aluminum nanoparticles were fabricated, which depended on the weight of aluminum powder (13%) in the sample under study. To find out which phase is responsible for the reliability of the formation of this type of alloy and its porosity, X-ray diffr

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Italian Journal Of Pure And Applied Mathematics
A note on (m, n)-full stability Banach algebra modules relative to an ideal H of Am×n
...Show More Authors

In this paper the concept of (m, n)- fully stable Banach Algebra-module relative to ideal (F − (m, n) − S − B − A-module relative to ideal) is introducing, we study some properties of F − (m, n) − S − B − A-module relative to ideal and another characterization is given

Publication Date
Fri May 01 2015
Journal Name
Ieee Transactions On Microwave Theory And Techniques
On the Design of Gyroelectric Resonators and Circulators Using a Magnetically Biased 2-D Electron Gas (2-DEG)
...Show More Authors

View Publication
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun Jan 25 2026
Journal Name
Al–bahith Al–a'alami
MOTIVES FOR STUDENTS TO BE EXPOSED TO EDUCATIONAL PROGRAMS ON TV CHANNELS (Iraqi educational channels as a model)
...Show More Authors

The educational function of television is one of the basic functions in light of the technical development that included the specialized satellite channels in all its fields, including the educational field, as its role became parallel to the role of educational institutions. These studies are among the descriptive studies in terms of the type of study methodology that describes the phenomenon, interprets its and extract the results and relationships between the variables. The study sample was multistage (random and intentional) included the students of the sixth academic and literary preparatory stage in the city of Baghdad.
The study problem was summarized by the following main question:
( What are the motives for the exposure of

... Show More
View Publication Preview PDF
Crossref